際際滷shows by User: JeffGreen9 / http://www.slideshare.net/images/logo.gif 際際滷shows by User: JeffGreen9 / Tue, 24 Aug 2021 15:58:15 GMT 際際滷Share feed for 際際滷shows by User: JeffGreen9 Where is the beef with 6 e /slideshow/where-is-the-beef-with-6-e/250041206 whereisthebeefwith6e-210824155815
Where is the 6 GHz beef? The low number of channels available today forces users to share available bandwidth and creates congestion. As each client station waits to transmit (or receive) data, congestion is caused by devices, Access Points and Stations, sharing the same channel. To better describe the impact of 6GHZ wifi, let us borrow the catchphrase "Where is the beef?". As a visual aid, begin with a hamburger bun with a 2.4GHz and 5GHz spectrum in the middle. The picture below may exaggerate a 20 years spectrum limitation. However, the visual expresses the potential of the 6GHz range to deliver the spectrum beef.]]>

Where is the 6 GHz beef? The low number of channels available today forces users to share available bandwidth and creates congestion. As each client station waits to transmit (or receive) data, congestion is caused by devices, Access Points and Stations, sharing the same channel. To better describe the impact of 6GHZ wifi, let us borrow the catchphrase "Where is the beef?". As a visual aid, begin with a hamburger bun with a 2.4GHz and 5GHz spectrum in the middle. The picture below may exaggerate a 20 years spectrum limitation. However, the visual expresses the potential of the 6GHz range to deliver the spectrum beef.]]>
Tue, 24 Aug 2021 15:58:15 GMT /slideshow/where-is-the-beef-with-6-e/250041206 JeffGreen9@slideshare.net(JeffGreen9) Where is the beef with 6 e JeffGreen9 Where is the 6 GHz beef? The low number of channels available today forces users to share available bandwidth and creates congestion. As each client station waits to transmit (or receive) data, congestion is caused by devices, Access Points and Stations, sharing the same channel. To better describe the impact of 6GHZ wifi, let us borrow the catchphrase "Where is the beef?". As a visual aid, begin with a hamburger bun with a 2.4GHz and 5GHz spectrum in the middle. The picture below may exaggerate a 20 years spectrum limitation. However, the visual expresses the potential of the 6GHz range to deliver the spectrum beef. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/whereisthebeefwith6e-210824155815-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Where is the 6 GHz beef? The low number of channels available today forces users to share available bandwidth and creates congestion. As each client station waits to transmit (or receive) data, congestion is caused by devices, Access Points and Stations, sharing the same channel. To better describe the impact of 6GHZ wifi, let us borrow the catchphrase &quot;Where is the beef?&quot;. As a visual aid, begin with a hamburger bun with a 2.4GHz and 5GHz spectrum in the middle. The picture below may exaggerate a 20 years spectrum limitation. However, the visual expresses the potential of the 6GHz range to deliver the spectrum beef.
Where is the beef with 6 e from Jeff Green
]]>
155 0 https://cdn.slidesharecdn.com/ss_thumbnails/whereisthebeefwith6e-210824155815-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Where is the beef /JeffGreen9/where-is-the-beef whereisthebeeftmi-210824155652
Where is the 6 GHz beef? The low number of channels available today forces users to share available bandwidth and creates congestion. As each client station waits to transmit (or receive) data, congestion is caused by devices, Access Points and Stations, sharing the same channel. To better describe the impact of 6GHZ wifi, let us borrow the catchphrase "Where is the beef?". As a visual aid, begin with a hamburger bun with a 2.4GHz and 5GHz spectrum in the middle. The picture below may exaggerate a 20 years spectrum limitation. However, the visual expresses the potential of the 6GHz range to deliver the spectrum beef.]]>

Where is the 6 GHz beef? The low number of channels available today forces users to share available bandwidth and creates congestion. As each client station waits to transmit (or receive) data, congestion is caused by devices, Access Points and Stations, sharing the same channel. To better describe the impact of 6GHZ wifi, let us borrow the catchphrase "Where is the beef?". As a visual aid, begin with a hamburger bun with a 2.4GHz and 5GHz spectrum in the middle. The picture below may exaggerate a 20 years spectrum limitation. However, the visual expresses the potential of the 6GHz range to deliver the spectrum beef.]]>
Tue, 24 Aug 2021 15:56:51 GMT /JeffGreen9/where-is-the-beef JeffGreen9@slideshare.net(JeffGreen9) Where is the beef JeffGreen9 Where is the 6 GHz beef? The low number of channels available today forces users to share available bandwidth and creates congestion. As each client station waits to transmit (or receive) data, congestion is caused by devices, Access Points and Stations, sharing the same channel. To better describe the impact of 6GHZ wifi, let us borrow the catchphrase "Where is the beef?". As a visual aid, begin with a hamburger bun with a 2.4GHz and 5GHz spectrum in the middle. The picture below may exaggerate a 20 years spectrum limitation. However, the visual expresses the potential of the 6GHz range to deliver the spectrum beef. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/whereisthebeeftmi-210824155652-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Where is the 6 GHz beef? The low number of channels available today forces users to share available bandwidth and creates congestion. As each client station waits to transmit (or receive) data, congestion is caused by devices, Access Points and Stations, sharing the same channel. To better describe the impact of 6GHZ wifi, let us borrow the catchphrase &quot;Where is the beef?&quot;. As a visual aid, begin with a hamburger bun with a 2.4GHz and 5GHz spectrum in the middle. The picture below may exaggerate a 20 years spectrum limitation. However, the visual expresses the potential of the 6GHz range to deliver the spectrum beef.
Where is the beef from Jeff Green
]]>
92 0 https://cdn.slidesharecdn.com/ss_thumbnails/whereisthebeeftmi-210824155652-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
6 e security /slideshow/6-e-security/250041140 6esecurity-210824154344
Where is the 6 GHz beef?]]>

Where is the 6 GHz beef?]]>
Tue, 24 Aug 2021 15:43:44 GMT /slideshow/6-e-security/250041140 JeffGreen9@slideshare.net(JeffGreen9) 6 e security JeffGreen9 Where is the 6 GHz beef? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/6esecurity-210824154344-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Where is the 6 GHz beef?
6 e security from Jeff Green
]]>
60 0 https://cdn.slidesharecdn.com/ss_thumbnails/6esecurity-210824154344-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Where is the 6 GHz beef? /slideshow/where-is-the-6-ghz-beef/250041123 6esecurity-210824153857
Where is the 6 GHz beef? The low number of channels available today forces users to share available bandwidth and creates congestion. As each client station waits to transmit (or receive) data, congestion is caused by devices, Access Points and Stations, sharing the same channel. To better describe the impact of 6GHZ wifi, let us borrow the catchphrase "Where is the beef?". As a visual aid, begin with a hamburger bun with a 2.4GHz and 5GHz spectrum in the middle. The picture below may exaggerate a 20 years spectrum limitation. However, the visual expresses the potential of the 6GHz range to deliver the spectrum beef.]]>

Where is the 6 GHz beef? The low number of channels available today forces users to share available bandwidth and creates congestion. As each client station waits to transmit (or receive) data, congestion is caused by devices, Access Points and Stations, sharing the same channel. To better describe the impact of 6GHZ wifi, let us borrow the catchphrase "Where is the beef?". As a visual aid, begin with a hamburger bun with a 2.4GHz and 5GHz spectrum in the middle. The picture below may exaggerate a 20 years spectrum limitation. However, the visual expresses the potential of the 6GHz range to deliver the spectrum beef.]]>
Tue, 24 Aug 2021 15:38:56 GMT /slideshow/where-is-the-6-ghz-beef/250041123 JeffGreen9@slideshare.net(JeffGreen9) Where is the 6 GHz beef? JeffGreen9 Where is the 6 GHz beef? The low number of channels available today forces users to share available bandwidth and creates congestion. As each client station waits to transmit (or receive) data, congestion is caused by devices, Access Points and Stations, sharing the same channel. To better describe the impact of 6GHZ wifi, let us borrow the catchphrase "Where is the beef?". As a visual aid, begin with a hamburger bun with a 2.4GHz and 5GHz spectrum in the middle. The picture below may exaggerate a 20 years spectrum limitation. However, the visual expresses the potential of the 6GHz range to deliver the spectrum beef. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/6esecurity-210824153857-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Where is the 6 GHz beef? The low number of channels available today forces users to share available bandwidth and creates congestion. As each client station waits to transmit (or receive) data, congestion is caused by devices, Access Points and Stations, sharing the same channel. To better describe the impact of 6GHZ wifi, let us borrow the catchphrase &quot;Where is the beef?&quot;. As a visual aid, begin with a hamburger bun with a 2.4GHz and 5GHz spectrum in the middle. The picture below may exaggerate a 20 years spectrum limitation. However, the visual expresses the potential of the 6GHz range to deliver the spectrum beef.
Where is the 6 GHz beef? from Jeff Green
]]>
81 0 https://cdn.slidesharecdn.com/ss_thumbnails/6esecurity-210824153857-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The next generation ethernet gangster (part 3) /slideshow/the-next-generation-ethernet-gangster-part-3-162153131/162153131 thenextgenerationethernetgangsterpart3-190808013553
The original competitors in the Ethernet market remind me of gang members who each had their unique advantages to win over their turf. Over the past few years, Extreme assembled seven gangers from a variety of backgrounds with their strengths to perform a mission and deliver a new level of value to our customers. Extreme has adopted a gangster strategy going against the grain of the market leader. So far, the gangster strategy has been a winning strategy. When market leaders are proposing proprietary solutions, Extreme went open Linux with superspec. When they pushed DNA and its additional complexity, Extreme responded by re-thinking the way networks are designed, deployed, and managed without vendor lock-in. Final-ly, when they tied to service and to licensing together with Cisco One, Extreme responded with added flexibility in both licensing, services, and Extreme-as-a-service. ]]>

The original competitors in the Ethernet market remind me of gang members who each had their unique advantages to win over their turf. Over the past few years, Extreme assembled seven gangers from a variety of backgrounds with their strengths to perform a mission and deliver a new level of value to our customers. Extreme has adopted a gangster strategy going against the grain of the market leader. So far, the gangster strategy has been a winning strategy. When market leaders are proposing proprietary solutions, Extreme went open Linux with superspec. When they pushed DNA and its additional complexity, Extreme responded by re-thinking the way networks are designed, deployed, and managed without vendor lock-in. Final-ly, when they tied to service and to licensing together with Cisco One, Extreme responded with added flexibility in both licensing, services, and Extreme-as-a-service. ]]>
Thu, 08 Aug 2019 01:35:53 GMT /slideshow/the-next-generation-ethernet-gangster-part-3-162153131/162153131 JeffGreen9@slideshare.net(JeffGreen9) The next generation ethernet gangster (part 3) JeffGreen9 The original competitors in the Ethernet market remind me of gang members who each had their unique advantages to win over their turf. Over the past few years, Extreme assembled seven gangers from a variety of backgrounds with their strengths to perform a mission and deliver a new level of value to our customers. Extreme has adopted a gangster strategy going against the grain of the market leader. So far, the gangster strategy has been a winning strategy. When market leaders are proposing proprietary solutions, Extreme went open Linux with superspec. When they pushed DNA and its additional complexity, Extreme responded by re-thinking the way networks are designed, deployed, and managed without vendor lock-in. Final-ly, when they tied to service and to licensing together with Cisco One, Extreme responded with added flexibility in both licensing, services, and Extreme-as-a-service. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/thenextgenerationethernetgangsterpart3-190808013553-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The original competitors in the Ethernet market remind me of gang members who each had their unique advantages to win over their turf. Over the past few years, Extreme assembled seven gangers from a variety of backgrounds with their strengths to perform a mission and deliver a new level of value to our customers. Extreme has adopted a gangster strategy going against the grain of the market leader. So far, the gangster strategy has been a winning strategy. When market leaders are proposing proprietary solutions, Extreme went open Linux with superspec. When they pushed DNA and its additional complexity, Extreme responded by re-thinking the way networks are designed, deployed, and managed without vendor lock-in. Final-ly, when they tied to service and to licensing together with Cisco One, Extreme responded with added flexibility in both licensing, services, and Extreme-as-a-service.
The next generation ethernet gangster (part 3) from Jeff Green
]]>
328 8 https://cdn.slidesharecdn.com/ss_thumbnails/thenextgenerationethernetgangsterpart3-190808013553-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The next generation ethernet gangster (part 2) /JeffGreen9/the-next-generation-ethernet-gangster-part-2-162152759 thenextgenerationethernetgangsterpart2-190808013418
The original competitors in the Ethernet market remind me of gang members who each had their unique advantages to win over their turf. Over the past few years, Extreme assembled seven gangers from a variety of backgrounds with their strengths to perform a mission and deliver a new level of value to our customers. Extreme has adopted a gangster strategy going against the grain of the market leader. So far, the gangster strategy has been a winning strategy. When market leaders are proposing proprietary solutions, Extreme went open Linux with superspec. When they pushed DNA and its additional complexity, Extreme responded by re-thinking the way networks are designed, deployed, and managed without vendor lock-in. Final-ly, when they tied to service and to licensing together with Cisco One, Extreme responded with added flexibility in both licensing, services, and Extreme-as-a-service. ]]>

The original competitors in the Ethernet market remind me of gang members who each had their unique advantages to win over their turf. Over the past few years, Extreme assembled seven gangers from a variety of backgrounds with their strengths to perform a mission and deliver a new level of value to our customers. Extreme has adopted a gangster strategy going against the grain of the market leader. So far, the gangster strategy has been a winning strategy. When market leaders are proposing proprietary solutions, Extreme went open Linux with superspec. When they pushed DNA and its additional complexity, Extreme responded by re-thinking the way networks are designed, deployed, and managed without vendor lock-in. Final-ly, when they tied to service and to licensing together with Cisco One, Extreme responded with added flexibility in both licensing, services, and Extreme-as-a-service. ]]>
Thu, 08 Aug 2019 01:34:18 GMT /JeffGreen9/the-next-generation-ethernet-gangster-part-2-162152759 JeffGreen9@slideshare.net(JeffGreen9) The next generation ethernet gangster (part 2) JeffGreen9 The original competitors in the Ethernet market remind me of gang members who each had their unique advantages to win over their turf. Over the past few years, Extreme assembled seven gangers from a variety of backgrounds with their strengths to perform a mission and deliver a new level of value to our customers. Extreme has adopted a gangster strategy going against the grain of the market leader. So far, the gangster strategy has been a winning strategy. When market leaders are proposing proprietary solutions, Extreme went open Linux with superspec. When they pushed DNA and its additional complexity, Extreme responded by re-thinking the way networks are designed, deployed, and managed without vendor lock-in. Final-ly, when they tied to service and to licensing together with Cisco One, Extreme responded with added flexibility in both licensing, services, and Extreme-as-a-service. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/thenextgenerationethernetgangsterpart2-190808013418-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The original competitors in the Ethernet market remind me of gang members who each had their unique advantages to win over their turf. Over the past few years, Extreme assembled seven gangers from a variety of backgrounds with their strengths to perform a mission and deliver a new level of value to our customers. Extreme has adopted a gangster strategy going against the grain of the market leader. So far, the gangster strategy has been a winning strategy. When market leaders are proposing proprietary solutions, Extreme went open Linux with superspec. When they pushed DNA and its additional complexity, Extreme responded by re-thinking the way networks are designed, deployed, and managed without vendor lock-in. Final-ly, when they tied to service and to licensing together with Cisco One, Extreme responded with added flexibility in both licensing, services, and Extreme-as-a-service.
The next generation ethernet gangster (part 2) from Jeff Green
]]>
227 4 https://cdn.slidesharecdn.com/ss_thumbnails/thenextgenerationethernetgangsterpart2-190808013418-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The next generation ethernet gangster (part 1) /slideshow/the-next-generation-ethernet-gangster-part-1-162152304/162152304 thenextgenerationethernetgangsterpart1-190808013222
The original competitors in the Ethernet market remind me of gang members who each had their unique advantages to win over their turf. Over the past few years, Extreme assembled seven gangers from a variety of backgrounds with their strengths to perform a mission and deliver a new level of value to our customers. Extreme has adopted a gangster strategy going against the grain of the market leader. So far, the gangster strategy has been a winning strategy. When market leaders are proposing proprietary solutions, Extreme went open Linux with superspec. When they pushed DNA and its additional complexity, Extreme responded by re-thinking the way networks are designed, deployed, and managed without vendor lock-in. Final-ly, when they tied to service and to licensing together with Cisco One, Extreme responded with added flexibility in both licensing, services, and Extreme-as-a-service. ]]>

The original competitors in the Ethernet market remind me of gang members who each had their unique advantages to win over their turf. Over the past few years, Extreme assembled seven gangers from a variety of backgrounds with their strengths to perform a mission and deliver a new level of value to our customers. Extreme has adopted a gangster strategy going against the grain of the market leader. So far, the gangster strategy has been a winning strategy. When market leaders are proposing proprietary solutions, Extreme went open Linux with superspec. When they pushed DNA and its additional complexity, Extreme responded by re-thinking the way networks are designed, deployed, and managed without vendor lock-in. Final-ly, when they tied to service and to licensing together with Cisco One, Extreme responded with added flexibility in both licensing, services, and Extreme-as-a-service. ]]>
Thu, 08 Aug 2019 01:32:22 GMT /slideshow/the-next-generation-ethernet-gangster-part-1-162152304/162152304 JeffGreen9@slideshare.net(JeffGreen9) The next generation ethernet gangster (part 1) JeffGreen9 The original competitors in the Ethernet market remind me of gang members who each had their unique advantages to win over their turf. Over the past few years, Extreme assembled seven gangers from a variety of backgrounds with their strengths to perform a mission and deliver a new level of value to our customers. Extreme has adopted a gangster strategy going against the grain of the market leader. So far, the gangster strategy has been a winning strategy. When market leaders are proposing proprietary solutions, Extreme went open Linux with superspec. When they pushed DNA and its additional complexity, Extreme responded by re-thinking the way networks are designed, deployed, and managed without vendor lock-in. Final-ly, when they tied to service and to licensing together with Cisco One, Extreme responded with added flexibility in both licensing, services, and Extreme-as-a-service. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/thenextgenerationethernetgangsterpart1-190808013222-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The original competitors in the Ethernet market remind me of gang members who each had their unique advantages to win over their turf. Over the past few years, Extreme assembled seven gangers from a variety of backgrounds with their strengths to perform a mission and deliver a new level of value to our customers. Extreme has adopted a gangster strategy going against the grain of the market leader. So far, the gangster strategy has been a winning strategy. When market leaders are proposing proprietary solutions, Extreme went open Linux with superspec. When they pushed DNA and its additional complexity, Extreme responded by re-thinking the way networks are designed, deployed, and managed without vendor lock-in. Final-ly, when they tied to service and to licensing together with Cisco One, Extreme responded with added flexibility in both licensing, services, and Extreme-as-a-service.
The next generation ethernet gangster (part 1) from Jeff Green
]]>
252 4 https://cdn.slidesharecdn.com/ss_thumbnails/thenextgenerationethernetgangsterpart1-190808013222-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The next generation ethernet gangster (part 3) /slideshow/the-next-generation-ethernet-gangster-part-3/162151717 thenextgenerationethernetgangsterpart3-190808012952
Today Extreme can be more aggressive, with confidence in knowing we can compete with anyone in the market. As the #1 market alternative, there are three critical reasons for including Extreme in your technology considerations: our end-to-end portfolio, our fabric, and our customer service. We are moving Extreme from a reactive, tactical vendor to a pro-active, strategic partner. When Extreme gets a seat at the table, and we bring our unique sizzle, we are the customers choice. Our customer retention rate is unmatched in the industry, according to Gartner. Jeff Green Extreme Networks jgreen@extremenetworks.com Mobile (772) 925-2345 https://prezi.com/view/BFLC71PVkoYVKBOffPAv/ ]]>

Today Extreme can be more aggressive, with confidence in knowing we can compete with anyone in the market. As the #1 market alternative, there are three critical reasons for including Extreme in your technology considerations: our end-to-end portfolio, our fabric, and our customer service. We are moving Extreme from a reactive, tactical vendor to a pro-active, strategic partner. When Extreme gets a seat at the table, and we bring our unique sizzle, we are the customers choice. Our customer retention rate is unmatched in the industry, according to Gartner. Jeff Green Extreme Networks jgreen@extremenetworks.com Mobile (772) 925-2345 https://prezi.com/view/BFLC71PVkoYVKBOffPAv/ ]]>
Thu, 08 Aug 2019 01:29:52 GMT /slideshow/the-next-generation-ethernet-gangster-part-3/162151717 JeffGreen9@slideshare.net(JeffGreen9) The next generation ethernet gangster (part 3) JeffGreen9 Today Extreme can be more aggressive, with confidence in knowing we can compete with anyone in the market. As the #1 market alternative, there are three critical reasons for including Extreme in your technology considerations: our end-to-end portfolio, our fabric, and our customer service. We are moving Extreme from a reactive, tactical vendor to a pro-active, strategic partner. When Extreme gets a seat at the table, and we bring our unique sizzle, we are the customers choice. Our customer retention rate is unmatched in the industry, according to Gartner. Jeff Green Extreme Networks jgreen@extremenetworks.com Mobile (772) 925-2345 https://prezi.com/view/BFLC71PVkoYVKBOffPAv/ <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/thenextgenerationethernetgangsterpart3-190808012952-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Today Extreme can be more aggressive, with confidence in knowing we can compete with anyone in the market. As the #1 market alternative, there are three critical reasons for including Extreme in your technology considerations: our end-to-end portfolio, our fabric, and our customer service. We are moving Extreme from a reactive, tactical vendor to a pro-active, strategic partner. When Extreme gets a seat at the table, and we bring our unique sizzle, we are the customers choice. Our customer retention rate is unmatched in the industry, according to Gartner. Jeff Green Extreme Networks jgreen@extremenetworks.com Mobile (772) 925-2345 https://prezi.com/view/BFLC71PVkoYVKBOffPAv/
The next generation ethernet gangster (part 3) from Jeff Green
]]>
178 5 https://cdn.slidesharecdn.com/ss_thumbnails/thenextgenerationethernetgangsterpart3-190808012952-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The next generation ethernet gangster (part 2) /slideshow/the-next-generation-ethernet-gangster-part-2/162151082 thenextgenerationethernetgangsterpart2-190808012715
Today Extreme can be more aggressive, with confidence in knowing we can compete with anyone in the market. As the #1 market alternative, there are three critical reasons for including Extreme in your technology considerations: our end-to-end portfolio, our fabric, and our customer service. We are moving Extreme from a reactive, tactical vendor to a pro-active, strategic partner. When Extreme gets a seat at the table, and we bring our unique sizzle, we are the customers choice. Our customer retention rate is unmatched in the industry, according to Gartner. Jeff Green Extreme Networks jgreen@extremenetworks.com Mobile (772) 925-2345 https://prezi.com/view/BFLC71PVkoYVKBOffPAv/ ]]>

Today Extreme can be more aggressive, with confidence in knowing we can compete with anyone in the market. As the #1 market alternative, there are three critical reasons for including Extreme in your technology considerations: our end-to-end portfolio, our fabric, and our customer service. We are moving Extreme from a reactive, tactical vendor to a pro-active, strategic partner. When Extreme gets a seat at the table, and we bring our unique sizzle, we are the customers choice. Our customer retention rate is unmatched in the industry, according to Gartner. Jeff Green Extreme Networks jgreen@extremenetworks.com Mobile (772) 925-2345 https://prezi.com/view/BFLC71PVkoYVKBOffPAv/ ]]>
Thu, 08 Aug 2019 01:27:15 GMT /slideshow/the-next-generation-ethernet-gangster-part-2/162151082 JeffGreen9@slideshare.net(JeffGreen9) The next generation ethernet gangster (part 2) JeffGreen9 Today Extreme can be more aggressive, with confidence in knowing we can compete with anyone in the market. As the #1 market alternative, there are three critical reasons for including Extreme in your technology considerations: our end-to-end portfolio, our fabric, and our customer service. We are moving Extreme from a reactive, tactical vendor to a pro-active, strategic partner. When Extreme gets a seat at the table, and we bring our unique sizzle, we are the customers choice. Our customer retention rate is unmatched in the industry, according to Gartner. Jeff Green Extreme Networks jgreen@extremenetworks.com Mobile (772) 925-2345 https://prezi.com/view/BFLC71PVkoYVKBOffPAv/ <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/thenextgenerationethernetgangsterpart2-190808012715-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Today Extreme can be more aggressive, with confidence in knowing we can compete with anyone in the market. As the #1 market alternative, there are three critical reasons for including Extreme in your technology considerations: our end-to-end portfolio, our fabric, and our customer service. We are moving Extreme from a reactive, tactical vendor to a pro-active, strategic partner. When Extreme gets a seat at the table, and we bring our unique sizzle, we are the customers choice. Our customer retention rate is unmatched in the industry, according to Gartner. Jeff Green Extreme Networks jgreen@extremenetworks.com Mobile (772) 925-2345 https://prezi.com/view/BFLC71PVkoYVKBOffPAv/
The next generation ethernet gangster (part 2) from Jeff Green
]]>
175 5 https://cdn.slidesharecdn.com/ss_thumbnails/thenextgenerationethernetgangsterpart2-190808012715-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Places in the network (featuring policy) /slideshow/places-in-the-network-featuring-policy/95525411 placesinthenetworkfeaturingpolicy-180430182736
Networks of the Future will be about a great user experience, devices and things In an industry thats already defined, Extreme Networks recent announcement of The Automated Campus is a significant advance in networking. For the first time, all the essential technologies, products, procedures and support are gathered together and integrated. All too often, the piecemeal/piecewise growth strategy, typically applied in network evolutions, results in too many tools, procedures, and techniques. The patchwork quilt approach precludes fast responsiveness, optimal operations staff productivity, and sacrifices the accuracy and efficiency required to keep end-users productive as well. The most important opportunity to improve efficiency for governments today is in boosting both the productivity of end-users and network operators. The automated campus must address the productivity of network planners and network operations managers and staff. The often-significant number of elements required in an installation can demand significant staff time and can, consequentially, have an adverse impact on operating expenses (OpEx). While It is possible to build traditional networks that, when running correctly and optimally get the job done, they often embody such high operating expenses that cost becomes the overriding factor controlling the evolution of the campus network. The Automated Campus will allow XYZ Account to address all these issues and concerns. A key goal must be for XYZ Account to reduce the number of moving parts required to build and operate any campus and introduce a level of simplicity and automation that will address your future. Extremes strategy for Campus Automation begins with re-thinking the way networks are designed, deployed and managed. Extremes Fabric-based networks enable faster configuration and troubleshooting; As a result, there is less opportunity for misconfiguration. Several automation solutions designed to enhance security often force network managers to accept complexity and degraded resilience to secure the network to meet local policies. Should a breach occur, containment to that segment protects even more sensitive parts of the network, resulting in a true dead-end for the hacker. With Extremes Automated Campus services can easily be defined and provisioned on-the-fly without disruption. Network operators specify what services are allowed or prohibited across the network. ]]>

Networks of the Future will be about a great user experience, devices and things In an industry thats already defined, Extreme Networks recent announcement of The Automated Campus is a significant advance in networking. For the first time, all the essential technologies, products, procedures and support are gathered together and integrated. All too often, the piecemeal/piecewise growth strategy, typically applied in network evolutions, results in too many tools, procedures, and techniques. The patchwork quilt approach precludes fast responsiveness, optimal operations staff productivity, and sacrifices the accuracy and efficiency required to keep end-users productive as well. The most important opportunity to improve efficiency for governments today is in boosting both the productivity of end-users and network operators. The automated campus must address the productivity of network planners and network operations managers and staff. The often-significant number of elements required in an installation can demand significant staff time and can, consequentially, have an adverse impact on operating expenses (OpEx). While It is possible to build traditional networks that, when running correctly and optimally get the job done, they often embody such high operating expenses that cost becomes the overriding factor controlling the evolution of the campus network. The Automated Campus will allow XYZ Account to address all these issues and concerns. A key goal must be for XYZ Account to reduce the number of moving parts required to build and operate any campus and introduce a level of simplicity and automation that will address your future. Extremes strategy for Campus Automation begins with re-thinking the way networks are designed, deployed and managed. Extremes Fabric-based networks enable faster configuration and troubleshooting; As a result, there is less opportunity for misconfiguration. Several automation solutions designed to enhance security often force network managers to accept complexity and degraded resilience to secure the network to meet local policies. Should a breach occur, containment to that segment protects even more sensitive parts of the network, resulting in a true dead-end for the hacker. With Extremes Automated Campus services can easily be defined and provisioned on-the-fly without disruption. Network operators specify what services are allowed or prohibited across the network. ]]>
Mon, 30 Apr 2018 18:27:36 GMT /slideshow/places-in-the-network-featuring-policy/95525411 JeffGreen9@slideshare.net(JeffGreen9) Places in the network (featuring policy) JeffGreen9 Networks of the Future will be about a great user experience, devices and things In an industry thats already defined, Extreme Networks recent announcement of The Automated Campus is a significant advance in networking. For the first time, all the essential technologies, products, procedures and support are gathered together and integrated. All too often, the piecemeal/piecewise growth strategy, typically applied in network evolutions, results in too many tools, procedures, and techniques. The patchwork quilt approach precludes fast responsiveness, optimal operations staff productivity, and sacrifices the accuracy and efficiency required to keep end-users productive as well. The most important opportunity to improve efficiency for governments today is in boosting both the productivity of end-users and network operators. The automated campus must address the productivity of network planners and network operations managers and staff. The often-significant number of elements required in an installation can demand significant staff time and can, consequentially, have an adverse impact on operating expenses (OpEx). While It is possible to build traditional networks that, when running correctly and optimally get the job done, they often embody such high operating expenses that cost becomes the overriding factor controlling the evolution of the campus network. The Automated Campus will allow XYZ Account to address all these issues and concerns. A key goal must be for XYZ Account to reduce the number of moving parts required to build and operate any campus and introduce a level of simplicity and automation that will address your future. Extremes strategy for Campus Automation begins with re-thinking the way networks are designed, deployed and managed. Extremes Fabric-based networks enable faster configuration and troubleshooting; As a result, there is less opportunity for misconfiguration. Several automation solutions designed to enhance security often force network managers to accept complexity and degraded resilience to secure the network to meet local policies. Should a breach occur, containment to that segment protects even more sensitive parts of the network, resulting in a true dead-end for the hacker. With Extremes Automated Campus services can easily be defined and provisioned on-the-fly without disruption. Network operators specify what services are allowed or prohibited across the network. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/placesinthenetworkfeaturingpolicy-180430182736-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Networks of the Future will be about a great user experience, devices and things In an industry thats already defined, Extreme Networks recent announcement of The Automated Campus is a significant advance in networking. For the first time, all the essential technologies, products, procedures and support are gathered together and integrated. All too often, the piecemeal/piecewise growth strategy, typically applied in network evolutions, results in too many tools, procedures, and techniques. The patchwork quilt approach precludes fast responsiveness, optimal operations staff productivity, and sacrifices the accuracy and efficiency required to keep end-users productive as well. The most important opportunity to improve efficiency for governments today is in boosting both the productivity of end-users and network operators. The automated campus must address the productivity of network planners and network operations managers and staff. The often-significant number of elements required in an installation can demand significant staff time and can, consequentially, have an adverse impact on operating expenses (OpEx). While It is possible to build traditional networks that, when running correctly and optimally get the job done, they often embody such high operating expenses that cost becomes the overriding factor controlling the evolution of the campus network. The Automated Campus will allow XYZ Account to address all these issues and concerns. A key goal must be for XYZ Account to reduce the number of moving parts required to build and operate any campus and introduce a level of simplicity and automation that will address your future. Extremes strategy for Campus Automation begins with re-thinking the way networks are designed, deployed and managed. Extremes Fabric-based networks enable faster configuration and troubleshooting; As a result, there is less opportunity for misconfiguration. Several automation solutions designed to enhance security often force network managers to accept complexity and degraded resilience to secure the network to meet local policies. Should a breach occur, containment to that segment protects even more sensitive parts of the network, resulting in a true dead-end for the hacker. With Extremes Automated Campus services can easily be defined and provisioned on-the-fly without disruption. Network operators specify what services are allowed or prohibited across the network.
Places in the network (featuring policy) from Jeff Green
]]>
475 6 https://cdn.slidesharecdn.com/ss_thumbnails/placesinthenetworkfeaturingpolicy-180430182736-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Elephant &amp; mice flows /slideshow/elephant-amp-mice-flows/89214731 elephantmiceflows-180228202421
The ubiquitous heavy-tailed distributions in the Internet im-plies an interesting feature of the Internet traffic: most (e.g. 80%) of the traffic is actually carried by only a small number of connections (elephants), while the remaining large amount of connections are very small in size or lifetime (mice). In a fair network environment, short connections expect rela-tively fast service than long connections. For these reasons, short TCP flows are generally more con-servative than long flows and thus tend to get less than their fair share when they compete for the bottleneck bandwidth. In this paper, we propose to give preferential treatment to short flows2 with help from an Active Queue Management (AQM) policy inside the network. We also rely on the pro-posed Differentiated Services (Diffserv) architecture [3] to classify flows into short and long at the edge of the network. More specifically, we maintain the length of each active flow (in packets3) at the edge routers and use it to classify incoming packets. ]]>

The ubiquitous heavy-tailed distributions in the Internet im-plies an interesting feature of the Internet traffic: most (e.g. 80%) of the traffic is actually carried by only a small number of connections (elephants), while the remaining large amount of connections are very small in size or lifetime (mice). In a fair network environment, short connections expect rela-tively fast service than long connections. For these reasons, short TCP flows are generally more con-servative than long flows and thus tend to get less than their fair share when they compete for the bottleneck bandwidth. In this paper, we propose to give preferential treatment to short flows2 with help from an Active Queue Management (AQM) policy inside the network. We also rely on the pro-posed Differentiated Services (Diffserv) architecture [3] to classify flows into short and long at the edge of the network. More specifically, we maintain the length of each active flow (in packets3) at the edge routers and use it to classify incoming packets. ]]>
Wed, 28 Feb 2018 20:24:21 GMT /slideshow/elephant-amp-mice-flows/89214731 JeffGreen9@slideshare.net(JeffGreen9) Elephant &amp; mice flows JeffGreen9 The ubiquitous heavy-tailed distributions in the Internet im-plies an interesting feature of the Internet traffic: most (e.g. 80%) of the traffic is actually carried by only a small number of connections (elephants), while the remaining large amount of connections are very small in size or lifetime (mice). In a fair network environment, short connections expect rela-tively fast service than long connections. For these reasons, short TCP flows are generally more con-servative than long flows and thus tend to get less than their fair share when they compete for the bottleneck bandwidth. In this paper, we propose to give preferential treatment to short flows2 with help from an Active Queue Management (AQM) policy inside the network. We also rely on the pro-posed Differentiated Services (Diffserv) architecture [3] to classify flows into short and long at the edge of the network. More specifically, we maintain the length of each active flow (in packets3) at the edge routers and use it to classify incoming packets. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/elephantmiceflows-180228202421-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The ubiquitous heavy-tailed distributions in the Internet im-plies an interesting feature of the Internet traffic: most (e.g. 80%) of the traffic is actually carried by only a small number of connections (elephants), while the remaining large amount of connections are very small in size or lifetime (mice). In a fair network environment, short connections expect rela-tively fast service than long connections. For these reasons, short TCP flows are generally more con-servative than long flows and thus tend to get less than their fair share when they compete for the bottleneck bandwidth. In this paper, we propose to give preferential treatment to short flows2 with help from an Active Queue Management (AQM) policy inside the network. We also rely on the pro-posed Differentiated Services (Diffserv) architecture [3] to classify flows into short and long at the edge of the network. More specifically, we maintain the length of each active flow (in packets3) at the edge routers and use it to classify incoming packets.
Elephant &amp; mice flows from Jeff Green
]]>
142 1 https://cdn.slidesharecdn.com/ss_thumbnails/elephantmiceflows-180228202421-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Fortinet ngf w extreme policy /slideshow/fortinet-ngf-w-extreme-policy/89213436 fortinetngfwextremepolicy-180228200858
Fortinet Firewall Integration - User to IP Mapping and Distributed Threat Response oAccurate User ID to IP mapping eliminates potential attacks and provides reliable, out of the box User Information to firewalls oImproves security by blocking/limiting user access at the point of entry without impacting other users oMore accurate network mapping for dynamic policy enforcement and reporting In an industry thats already defined, Extreme Networks recent announcement of The Automated Branch is a significant advance in networking. For the first time, all the essential technologies, products, procedures and support are gathered together and integrated. All too often, the piecemeal/piecewise growth strategy typically historically applied in organizational network evolution results in too many tools, procedures, and techniques at work, precluding fast responsiveness, optimal operations staff productivity, and the degree of accuracy and efficiency required to keep end-users productive as well. ]]>

Fortinet Firewall Integration - User to IP Mapping and Distributed Threat Response oAccurate User ID to IP mapping eliminates potential attacks and provides reliable, out of the box User Information to firewalls oImproves security by blocking/limiting user access at the point of entry without impacting other users oMore accurate network mapping for dynamic policy enforcement and reporting In an industry thats already defined, Extreme Networks recent announcement of The Automated Branch is a significant advance in networking. For the first time, all the essential technologies, products, procedures and support are gathered together and integrated. All too often, the piecemeal/piecewise growth strategy typically historically applied in organizational network evolution results in too many tools, procedures, and techniques at work, precluding fast responsiveness, optimal operations staff productivity, and the degree of accuracy and efficiency required to keep end-users productive as well. ]]>
Wed, 28 Feb 2018 20:08:58 GMT /slideshow/fortinet-ngf-w-extreme-policy/89213436 JeffGreen9@slideshare.net(JeffGreen9) Fortinet ngf w extreme policy JeffGreen9 Fortinet Firewall Integration - User to IP Mapping and Distributed Threat Response oAccurate User ID to IP mapping eliminates potential attacks and provides reliable, out of the box User Information to firewalls oImproves security by blocking/limiting user access at the point of entry without impacting other users oMore accurate network mapping for dynamic policy enforcement and reporting In an industry thats already defined, Extreme Networks recent announcement of The Automated Branch is a significant advance in networking. For the first time, all the essential technologies, products, procedures and support are gathered together and integrated. All too often, the piecemeal/piecewise growth strategy typically historically applied in organizational network evolution results in too many tools, procedures, and techniques at work, precluding fast responsiveness, optimal operations staff productivity, and the degree of accuracy and efficiency required to keep end-users productive as well. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/fortinetngfwextremepolicy-180228200858-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Fortinet Firewall Integration - User to IP Mapping and Distributed Threat Response oAccurate User ID to IP mapping eliminates potential attacks and provides reliable, out of the box User Information to firewalls oImproves security by blocking/limiting user access at the point of entry without impacting other users oMore accurate network mapping for dynamic policy enforcement and reporting In an industry thats already defined, Extreme Networks recent announcement of The Automated Branch is a significant advance in networking. For the first time, all the essential technologies, products, procedures and support are gathered together and integrated. All too often, the piecemeal/piecewise growth strategy typically historically applied in organizational network evolution results in too many tools, procedures, and techniques at work, precluding fast responsiveness, optimal operations staff productivity, and the degree of accuracy and efficiency required to keep end-users productive as well.
Fortinet ngf w extreme policy from Jeff Green
]]>
596 3 https://cdn.slidesharecdn.com/ss_thumbnails/fortinetngfwextremepolicy-180228200858-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Multi fabric sales motions jg v3 /JeffGreen9/multi-fabric-sales-motions-jg-v3 multifabricsalesmotionsjgv3-180225172829
This reference design helps organizations design and configure a small to midsize data center (be測tween 2 and 60 server racks) at headquarters or a server room at a remote site. You will learn how to configure the data center core, aggregation and access switches for connectivity to the servers and the campus network. The Avaya Fabric Connect data center design supports high-speed 10 Gbps Ethernet connect-ed servers. The design can easily scale server bandwidth with link aggregation and servers can be connected to one or more switches in order to provide the level of availability required for the services delivered by the host. The design also supports legacy and low traffic servers that need 1 Gbps Ethernet connectivity, The reference design presented in this guide is based on common network requirements and pro測vides a tested starting point for network engineers to design and deploy an Avaya data center net測work. This guide does not document every possible option and feature used to design and deploy networks but instead presents the tested and recommended options that will meet the majority of customer needs. This design uses Avaya Fabric Connect in order to provide benefits over traditional data center design. IT departments face several challenges in todays data center: 揃 Data center traffic flow is not the same as campus traffic flow. Over 80% of the traffic is east-west, server-to-server, vs. north-south, client-to-server, like in a campus. 揃 Server virtualization allows a virtual machine or workload to be located anywhere in the physi測cal data center. Data center networks can make it difficult to extend virtual local area networks (VLANs) and subnets anywhere in the data center. 揃 Server virtualization means that new services can be brought online in minutes or migrated in real time. Reconfiguring the network to support this is difficult because it can interrupt other services. 揃 Server virtualization means that the load on a physical box is much higher. Physical servers regularly host 10-50 workloads, driving network utilization well past 1 Gbps. ]]>

This reference design helps organizations design and configure a small to midsize data center (be測tween 2 and 60 server racks) at headquarters or a server room at a remote site. You will learn how to configure the data center core, aggregation and access switches for connectivity to the servers and the campus network. The Avaya Fabric Connect data center design supports high-speed 10 Gbps Ethernet connect-ed servers. The design can easily scale server bandwidth with link aggregation and servers can be connected to one or more switches in order to provide the level of availability required for the services delivered by the host. The design also supports legacy and low traffic servers that need 1 Gbps Ethernet connectivity, The reference design presented in this guide is based on common network requirements and pro測vides a tested starting point for network engineers to design and deploy an Avaya data center net測work. This guide does not document every possible option and feature used to design and deploy networks but instead presents the tested and recommended options that will meet the majority of customer needs. This design uses Avaya Fabric Connect in order to provide benefits over traditional data center design. IT departments face several challenges in todays data center: 揃 Data center traffic flow is not the same as campus traffic flow. Over 80% of the traffic is east-west, server-to-server, vs. north-south, client-to-server, like in a campus. 揃 Server virtualization allows a virtual machine or workload to be located anywhere in the physi測cal data center. Data center networks can make it difficult to extend virtual local area networks (VLANs) and subnets anywhere in the data center. 揃 Server virtualization means that new services can be brought online in minutes or migrated in real time. Reconfiguring the network to support this is difficult because it can interrupt other services. 揃 Server virtualization means that the load on a physical box is much higher. Physical servers regularly host 10-50 workloads, driving network utilization well past 1 Gbps. ]]>
Sun, 25 Feb 2018 17:28:29 GMT /JeffGreen9/multi-fabric-sales-motions-jg-v3 JeffGreen9@slideshare.net(JeffGreen9) Multi fabric sales motions jg v3 JeffGreen9 This reference design helps organizations design and configure a small to midsize data center (be測tween 2 and 60 server racks) at headquarters or a server room at a remote site. You will learn how to configure the data center core, aggregation and access switches for connectivity to the servers and the campus network. The Avaya Fabric Connect data center design supports high-speed 10 Gbps Ethernet connect-ed servers. The design can easily scale server bandwidth with link aggregation and servers can be connected to one or more switches in order to provide the level of availability required for the services delivered by the host. The design also supports legacy and low traffic servers that need 1 Gbps Ethernet connectivity, The reference design presented in this guide is based on common network requirements and pro測vides a tested starting point for network engineers to design and deploy an Avaya data center net測work. This guide does not document every possible option and feature used to design and deploy networks but instead presents the tested and recommended options that will meet the majority of customer needs. This design uses Avaya Fabric Connect in order to provide benefits over traditional data center design. IT departments face several challenges in todays data center: 揃 Data center traffic flow is not the same as campus traffic flow. Over 80% of the traffic is east-west, server-to-server, vs. north-south, client-to-server, like in a campus. 揃 Server virtualization allows a virtual machine or workload to be located anywhere in the physi測cal data center. Data center networks can make it difficult to extend virtual local area networks (VLANs) and subnets anywhere in the data center. 揃 Server virtualization means that new services can be brought online in minutes or migrated in real time. Reconfiguring the network to support this is difficult because it can interrupt other services. 揃 Server virtualization means that the load on a physical box is much higher. Physical servers regularly host 10-50 workloads, driving network utilization well past 1 Gbps. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/multifabricsalesmotionsjgv3-180225172829-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This reference design helps organizations design and configure a small to midsize data center (be測tween 2 and 60 server racks) at headquarters or a server room at a remote site. You will learn how to configure the data center core, aggregation and access switches for connectivity to the servers and the campus network. The Avaya Fabric Connect data center design supports high-speed 10 Gbps Ethernet connect-ed servers. The design can easily scale server bandwidth with link aggregation and servers can be connected to one or more switches in order to provide the level of availability required for the services delivered by the host. The design also supports legacy and low traffic servers that need 1 Gbps Ethernet connectivity, The reference design presented in this guide is based on common network requirements and pro測vides a tested starting point for network engineers to design and deploy an Avaya data center net測work. This guide does not document every possible option and feature used to design and deploy networks but instead presents the tested and recommended options that will meet the majority of customer needs. This design uses Avaya Fabric Connect in order to provide benefits over traditional data center design. IT departments face several challenges in todays data center: 揃 Data center traffic flow is not the same as campus traffic flow. Over 80% of the traffic is east-west, server-to-server, vs. north-south, client-to-server, like in a campus. 揃 Server virtualization allows a virtual machine or workload to be located anywhere in the physi測cal data center. Data center networks can make it difficult to extend virtual local area networks (VLANs) and subnets anywhere in the data center. 揃 Server virtualization means that new services can be brought online in minutes or migrated in real time. Reconfiguring the network to support this is difficult because it can interrupt other services. 揃 Server virtualization means that the load on a physical box is much higher. Physical servers regularly host 10-50 workloads, driving network utilization well past 1 Gbps.
Multi fabric sales motions jg v3 from Jeff Green
]]>
209 1 https://cdn.slidesharecdn.com/ss_thumbnails/multifabricsalesmotionsjgv3-180225172829-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Data center pov 2017 v3 /slideshow/data-center-pov-2017-v3/88900264 datacenterpov2017v3-180225171938
LANs are constantly evolving, build your XYZ Account Network with that baked-in Extreme Networks brings XYZ Account simplicity, agility, and optimized performance to your most strategic business asset. The data center is critically important to business operations in the enterprise, but often organizations have difficulty leveraging their data centers as a strategic business asset. At Extreme Networks, we focus on providing an Intelligent Enterprise Data Center Network thats purpose-built for enterprise requirements. Our OneFabric Data Center Solution: XoS can be like an elastic Fabric for XYZ Account Network Demand for application availability has changed how applications are hosted in todays datacenter. Evolutionary changes have occurred throughout the various elements of the data center, starting with server and storage virtualization and network virtualization. Motivations for server virtualization were initially associated with massive cost reduction and redundancy but have now evolved to focus on greater scalability and agility within the data center. Data center focused LAN technologies have taken a similar path; with a goal of redundancy and then to create a more scalable fabric within and between data centers. As vendors continue to tout networking architectures that decouple software from hardware, bare-metal switches are moving into the spotlight. These switches are built on merchant silicon deliver a lower-cost and more flexible switching alternative. Extreme Purple Metal switches are open enough to allow our customers to choose their network architecture based on their specific needs without going all the way to bare metal. We believe in the disaggregation of traditional enterprise networking. Extreme uses merchant silicon versus custom ASICs. Custom ASICs have fallen behind. Unless a vendor can build and compete against merchant silicon, there's no point in doing custom ASICs. ]]>

LANs are constantly evolving, build your XYZ Account Network with that baked-in Extreme Networks brings XYZ Account simplicity, agility, and optimized performance to your most strategic business asset. The data center is critically important to business operations in the enterprise, but often organizations have difficulty leveraging their data centers as a strategic business asset. At Extreme Networks, we focus on providing an Intelligent Enterprise Data Center Network thats purpose-built for enterprise requirements. Our OneFabric Data Center Solution: XoS can be like an elastic Fabric for XYZ Account Network Demand for application availability has changed how applications are hosted in todays datacenter. Evolutionary changes have occurred throughout the various elements of the data center, starting with server and storage virtualization and network virtualization. Motivations for server virtualization were initially associated with massive cost reduction and redundancy but have now evolved to focus on greater scalability and agility within the data center. Data center focused LAN technologies have taken a similar path; with a goal of redundancy and then to create a more scalable fabric within and between data centers. As vendors continue to tout networking architectures that decouple software from hardware, bare-metal switches are moving into the spotlight. These switches are built on merchant silicon deliver a lower-cost and more flexible switching alternative. Extreme Purple Metal switches are open enough to allow our customers to choose their network architecture based on their specific needs without going all the way to bare metal. We believe in the disaggregation of traditional enterprise networking. Extreme uses merchant silicon versus custom ASICs. Custom ASICs have fallen behind. Unless a vendor can build and compete against merchant silicon, there's no point in doing custom ASICs. ]]>
Sun, 25 Feb 2018 17:19:38 GMT /slideshow/data-center-pov-2017-v3/88900264 JeffGreen9@slideshare.net(JeffGreen9) Data center pov 2017 v3 JeffGreen9 LANs are constantly evolving, build your XYZ Account Network with that baked-in Extreme Networks brings XYZ Account simplicity, agility, and optimized performance to your most strategic business asset. The data center is critically important to business operations in the enterprise, but often organizations have difficulty leveraging their data centers as a strategic business asset. At Extreme Networks, we focus on providing an Intelligent Enterprise Data Center Network thats purpose-built for enterprise requirements. Our OneFabric Data Center Solution: XoS can be like an elastic Fabric for XYZ Account Network Demand for application availability has changed how applications are hosted in todays datacenter. Evolutionary changes have occurred throughout the various elements of the data center, starting with server and storage virtualization and network virtualization. Motivations for server virtualization were initially associated with massive cost reduction and redundancy but have now evolved to focus on greater scalability and agility within the data center. Data center focused LAN technologies have taken a similar path; with a goal of redundancy and then to create a more scalable fabric within and between data centers. As vendors continue to tout networking architectures that decouple software from hardware, bare-metal switches are moving into the spotlight. These switches are built on merchant silicon deliver a lower-cost and more flexible switching alternative. Extreme Purple Metal switches are open enough to allow our customers to choose their network architecture based on their specific needs without going all the way to bare metal. We believe in the disaggregation of traditional enterprise networking. Extreme uses merchant silicon versus custom ASICs. Custom ASICs have fallen behind. Unless a vendor can build and compete against merchant silicon, there's no point in doing custom ASICs. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/datacenterpov2017v3-180225171938-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> LANs are constantly evolving, build your XYZ Account Network with that baked-in Extreme Networks brings XYZ Account simplicity, agility, and optimized performance to your most strategic business asset. The data center is critically important to business operations in the enterprise, but often organizations have difficulty leveraging their data centers as a strategic business asset. At Extreme Networks, we focus on providing an Intelligent Enterprise Data Center Network thats purpose-built for enterprise requirements. Our OneFabric Data Center Solution: XoS can be like an elastic Fabric for XYZ Account Network Demand for application availability has changed how applications are hosted in todays datacenter. Evolutionary changes have occurred throughout the various elements of the data center, starting with server and storage virtualization and network virtualization. Motivations for server virtualization were initially associated with massive cost reduction and redundancy but have now evolved to focus on greater scalability and agility within the data center. Data center focused LAN technologies have taken a similar path; with a goal of redundancy and then to create a more scalable fabric within and between data centers. As vendors continue to tout networking architectures that decouple software from hardware, bare-metal switches are moving into the spotlight. These switches are built on merchant silicon deliver a lower-cost and more flexible switching alternative. Extreme Purple Metal switches are open enough to allow our customers to choose their network architecture based on their specific needs without going all the way to bare metal. We believe in the disaggregation of traditional enterprise networking. Extreme uses merchant silicon versus custom ASICs. Custom ASICs have fallen behind. Unless a vendor can build and compete against merchant silicon, there&#39;s no point in doing custom ASICs.
Data center pov 2017 v3 from Jeff Green
]]>
151 1 https://cdn.slidesharecdn.com/ss_thumbnails/datacenterpov2017v3-180225171938-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Audio video ethernet (avb cobra net dante) /JeffGreen9/audio-video-ethernet-avb-cobra-net-dante audiovideoethernetavbcobranetdante-180225171208
AVB fits low-cost, small-form-factor products such as this microphone. The overall trend is that music no longer lives on shelves or in CD racks, but in hard drives in home computers, and increasingly in the cloud. This brings about its own unique problems, not in the encoding system used, or the storage technology, but in distributing the audio from the storage media to the speakers. AVB features are all enabled by a global and port level configuration. Connecting these elements is the AVB-enabled switch (in the graphic above, the Extreme Networks速 Summit速 X440.) The role of the switch is to provide support for the control protocols: AVB is Ethernets next stage of convergence, delivering pitch perfect audio and crystal clear video seamlessly over the network IP/Ethernet is bringing simplicity and features to audio and video as it has brought to services like VoIP, Storage and many more High quality, perfectly synchronized A/V until now has been difficult to maintain Standards work by the IEEE and the AVB standard changes everything, creating interoperability and mass-marketing equipment pricing Benefits of AVB - Delivers predictable latency and precise synchronization, maximizing the functionality of AV time synchronization and quality or service Reduced complexity and Ease of use through interoperability between devices Streamlines complex network set-up and management, the Infrastructure negotiates and manages the network for optimal prioritized media transport AV traffic can co-exist with non-AV traffic on same Ethernet infrastructure Role based control at the XYZ Account - XYZ Account can identify devices and apply policies based on device type all the way down to the port and or the AP. Policies can dynamically change based on the device a user is connecting with and where that user is located. Extreme Networks provides infrastructure to deliver customizable prioritization and scalable capacity via configurable and built-in intelligence, ensuring a comprehensive, superior quality experience. Furthermore, when deployed with Extreme Wireless XYZ Account can configure the network to ensure applications receive the bandwidth they require, while still limiting or preventing high speed streaming of music of video or even games. ]]>

AVB fits low-cost, small-form-factor products such as this microphone. The overall trend is that music no longer lives on shelves or in CD racks, but in hard drives in home computers, and increasingly in the cloud. This brings about its own unique problems, not in the encoding system used, or the storage technology, but in distributing the audio from the storage media to the speakers. AVB features are all enabled by a global and port level configuration. Connecting these elements is the AVB-enabled switch (in the graphic above, the Extreme Networks速 Summit速 X440.) The role of the switch is to provide support for the control protocols: AVB is Ethernets next stage of convergence, delivering pitch perfect audio and crystal clear video seamlessly over the network IP/Ethernet is bringing simplicity and features to audio and video as it has brought to services like VoIP, Storage and many more High quality, perfectly synchronized A/V until now has been difficult to maintain Standards work by the IEEE and the AVB standard changes everything, creating interoperability and mass-marketing equipment pricing Benefits of AVB - Delivers predictable latency and precise synchronization, maximizing the functionality of AV time synchronization and quality or service Reduced complexity and Ease of use through interoperability between devices Streamlines complex network set-up and management, the Infrastructure negotiates and manages the network for optimal prioritized media transport AV traffic can co-exist with non-AV traffic on same Ethernet infrastructure Role based control at the XYZ Account - XYZ Account can identify devices and apply policies based on device type all the way down to the port and or the AP. Policies can dynamically change based on the device a user is connecting with and where that user is located. Extreme Networks provides infrastructure to deliver customizable prioritization and scalable capacity via configurable and built-in intelligence, ensuring a comprehensive, superior quality experience. Furthermore, when deployed with Extreme Wireless XYZ Account can configure the network to ensure applications receive the bandwidth they require, while still limiting or preventing high speed streaming of music of video or even games. ]]>
Sun, 25 Feb 2018 17:12:07 GMT /JeffGreen9/audio-video-ethernet-avb-cobra-net-dante JeffGreen9@slideshare.net(JeffGreen9) Audio video ethernet (avb cobra net dante) JeffGreen9 AVB fits low-cost, small-form-factor products such as this microphone. The overall trend is that music no longer lives on shelves or in CD racks, but in hard drives in home computers, and increasingly in the cloud. This brings about its own unique problems, not in the encoding system used, or the storage technology, but in distributing the audio from the storage media to the speakers. AVB features are all enabled by a global and port level configuration. Connecting these elements is the AVB-enabled switch (in the graphic above, the Extreme Networks速 Summit速 X440.) The role of the switch is to provide support for the control protocols: AVB is Ethernets next stage of convergence, delivering pitch perfect audio and crystal clear video seamlessly over the network IP/Ethernet is bringing simplicity and features to audio and video as it has brought to services like VoIP, Storage and many more High quality, perfectly synchronized A/V until now has been difficult to maintain Standards work by the IEEE and the AVB standard changes everything, creating interoperability and mass-marketing equipment pricing Benefits of AVB - Delivers predictable latency and precise synchronization, maximizing the functionality of AV time synchronization and quality or service Reduced complexity and Ease of use through interoperability between devices Streamlines complex network set-up and management, the Infrastructure negotiates and manages the network for optimal prioritized media transport AV traffic can co-exist with non-AV traffic on same Ethernet infrastructure Role based control at the XYZ Account - XYZ Account can identify devices and apply policies based on device type all the way down to the port and or the AP. Policies can dynamically change based on the device a user is connecting with and where that user is located. Extreme Networks provides infrastructure to deliver customizable prioritization and scalable capacity via configurable and built-in intelligence, ensuring a comprehensive, superior quality experience. Furthermore, when deployed with Extreme Wireless XYZ Account can configure the network to ensure applications receive the bandwidth they require, while still limiting or preventing high speed streaming of music of video or even games. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/audiovideoethernetavbcobranetdante-180225171208-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> AVB fits low-cost, small-form-factor products such as this microphone. The overall trend is that music no longer lives on shelves or in CD racks, but in hard drives in home computers, and increasingly in the cloud. This brings about its own unique problems, not in the encoding system used, or the storage technology, but in distributing the audio from the storage media to the speakers. AVB features are all enabled by a global and port level configuration. Connecting these elements is the AVB-enabled switch (in the graphic above, the Extreme Networks速 Summit速 X440.) The role of the switch is to provide support for the control protocols: AVB is Ethernets next stage of convergence, delivering pitch perfect audio and crystal clear video seamlessly over the network IP/Ethernet is bringing simplicity and features to audio and video as it has brought to services like VoIP, Storage and many more High quality, perfectly synchronized A/V until now has been difficult to maintain Standards work by the IEEE and the AVB standard changes everything, creating interoperability and mass-marketing equipment pricing Benefits of AVB - Delivers predictable latency and precise synchronization, maximizing the functionality of AV time synchronization and quality or service Reduced complexity and Ease of use through interoperability between devices Streamlines complex network set-up and management, the Infrastructure negotiates and manages the network for optimal prioritized media transport AV traffic can co-exist with non-AV traffic on same Ethernet infrastructure Role based control at the XYZ Account - XYZ Account can identify devices and apply policies based on device type all the way down to the port and or the AP. Policies can dynamically change based on the device a user is connecting with and where that user is located. Extreme Networks provides infrastructure to deliver customizable prioritization and scalable capacity via configurable and built-in intelligence, ensuring a comprehensive, superior quality experience. Furthermore, when deployed with Extreme Wireless XYZ Account can configure the network to ensure applications receive the bandwidth they require, while still limiting or preventing high speed streaming of music of video or even games.
Audio video ethernet (avb cobra net dante) from Jeff Green
]]>
387 2 https://cdn.slidesharecdn.com/ss_thumbnails/audiovideoethernetavbcobranetdante-180225171208-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Avb pov 2017 v2 /slideshow/avb-pov-2017-v2-88898904/88898904 avbpov2017v2-180225164503
The Pug is a breed of dog with a wrinkly, short-muzzled face, and curled tail. The breed has a fine, glossy coat that comes in a variety of colours, most often fawn or black, and a compact square body with well-developed muscles. Pugs were brought from China to Europe in the sixteenth century and were popularized in Western Europe by the House of Orange of the Netherlands, and the House of Stuart.In the United Kingdom, in the nineteenth century, Queen Victoria developed a passion for pugs which she passed on to other members of the Royal family. Pugs are known for being sociable and gentle companion dogs.[3] The breed remains popular into the twenty-first century, with some famous celebrity owners. A pug was judged Best in Show at the World Dog Show in 2004. Donald J. Trump For President, Inc. Why Now? On November 8, 2016, the American People delivered a historic victory and took our country back. This victory was the result of a Movement to put America first, to save the American economy, and to make America once again a shining city on the hill. But our Movement cannot stop now - we still have much work to do. This is why our Campaign Committee, Donald J. Trump for President, Inc., is still here. We will provide a beacon for this historic Movement as our lights continue to shine brightly for you 足足- the hardworking patriots who have paid the price for our freedom. While Washington flourished, our American jobs were shipped overseas, our families struggled, and our factories closed - that all ended on January 20, 2017. This Campaign will be a voice for all Americans, in every city near and far, who support a more prosperous, safe and strong America. Thats why our Campaign cannot stop now - our Movement is just getting started. Together, we will Make America Great Again! ]]>

The Pug is a breed of dog with a wrinkly, short-muzzled face, and curled tail. The breed has a fine, glossy coat that comes in a variety of colours, most often fawn or black, and a compact square body with well-developed muscles. Pugs were brought from China to Europe in the sixteenth century and were popularized in Western Europe by the House of Orange of the Netherlands, and the House of Stuart.In the United Kingdom, in the nineteenth century, Queen Victoria developed a passion for pugs which she passed on to other members of the Royal family. Pugs are known for being sociable and gentle companion dogs.[3] The breed remains popular into the twenty-first century, with some famous celebrity owners. A pug was judged Best in Show at the World Dog Show in 2004. Donald J. Trump For President, Inc. Why Now? On November 8, 2016, the American People delivered a historic victory and took our country back. This victory was the result of a Movement to put America first, to save the American economy, and to make America once again a shining city on the hill. But our Movement cannot stop now - we still have much work to do. This is why our Campaign Committee, Donald J. Trump for President, Inc., is still here. We will provide a beacon for this historic Movement as our lights continue to shine brightly for you 足足- the hardworking patriots who have paid the price for our freedom. While Washington flourished, our American jobs were shipped overseas, our families struggled, and our factories closed - that all ended on January 20, 2017. This Campaign will be a voice for all Americans, in every city near and far, who support a more prosperous, safe and strong America. Thats why our Campaign cannot stop now - our Movement is just getting started. Together, we will Make America Great Again! ]]>
Sun, 25 Feb 2018 16:45:03 GMT /slideshow/avb-pov-2017-v2-88898904/88898904 JeffGreen9@slideshare.net(JeffGreen9) Avb pov 2017 v2 JeffGreen9 The Pug is a breed of dog with a wrinkly, short-muzzled face, and curled tail. The breed has a fine, glossy coat that comes in a variety of colours, most often fawn or black, and a compact square body with well-developed muscles. Pugs were brought from China to Europe in the sixteenth century and were popularized in Western Europe by the House of Orange of the Netherlands, and the House of Stuart.In the United Kingdom, in the nineteenth century, Queen Victoria developed a passion for pugs which she passed on to other members of the Royal family. Pugs are known for being sociable and gentle companion dogs.[3] The breed remains popular into the twenty-first century, with some famous celebrity owners. A pug was judged Best in Show at the World Dog Show in 2004. Donald J. Trump For President, Inc. Why Now? On November 8, 2016, the American People delivered a historic victory and took our country back. This victory was the result of a Movement to put America first, to save the American economy, and to make America once again a shining city on the hill. But our Movement cannot stop now - we still have much work to do. This is why our Campaign Committee, Donald J. Trump for President, Inc., is still here. We will provide a beacon for this historic Movement as our lights continue to shine brightly for you 足足- the hardworking patriots who have paid the price for our freedom. While Washington flourished, our American jobs were shipped overseas, our families struggled, and our factories closed - that all ended on January 20, 2017. This Campaign will be a voice for all Americans, in every city near and far, who support a more prosperous, safe and strong America. Thats why our Campaign cannot stop now - our Movement is just getting started. Together, we will Make America Great Again! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/avbpov2017v2-180225164503-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The Pug is a breed of dog with a wrinkly, short-muzzled face, and curled tail. The breed has a fine, glossy coat that comes in a variety of colours, most often fawn or black, and a compact square body with well-developed muscles. Pugs were brought from China to Europe in the sixteenth century and were popularized in Western Europe by the House of Orange of the Netherlands, and the House of Stuart.In the United Kingdom, in the nineteenth century, Queen Victoria developed a passion for pugs which she passed on to other members of the Royal family. Pugs are known for being sociable and gentle companion dogs.[3] The breed remains popular into the twenty-first century, with some famous celebrity owners. A pug was judged Best in Show at the World Dog Show in 2004. Donald J. Trump For President, Inc. Why Now? On November 8, 2016, the American People delivered a historic victory and took our country back. This victory was the result of a Movement to put America first, to save the American economy, and to make America once again a shining city on the hill. But our Movement cannot stop now - we still have much work to do. This is why our Campaign Committee, Donald J. Trump for President, Inc., is still here. We will provide a beacon for this historic Movement as our lights continue to shine brightly for you 足足- the hardworking patriots who have paid the price for our freedom. While Washington flourished, our American jobs were shipped overseas, our families struggled, and our factories closed - that all ended on January 20, 2017. This Campaign will be a voice for all Americans, in every city near and far, who support a more prosperous, safe and strong America. Thats why our Campaign cannot stop now - our Movement is just getting started. Together, we will Make America Great Again!
Avb pov 2017 v2 from Jeff Green
]]>
48 1 https://cdn.slidesharecdn.com/ss_thumbnails/avbpov2017v2-180225164503-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Layer 2 forwarding on an spb fabric /slideshow/layer-2-forwarding-on-an-spb-fabric/88898640 layer2forwardingonanspbfabric-180225163812
In an industry thats already defined, Extreme Networks recent announcement of The Automated Campus is a significant advance in networking. For the first time, all the essential technologies, products, procedures and support are gathered together and integrated. All too often, the piecemeal/piecewise growth strategy typically historically applied in organizational network evolution results in too many tools, procedures, and techniques at work, precluding fast responsiveness, optimal operations staff productivity, and the degree of accuracy and efficiency required to keep end-users productive as well. The most important opportunity today is in boosting both productivity of end-users and network operators. The automated campus must address the productivity of network planners and network operations managers and staff. The often-significant number of elements required in an installation can demand significant staff time and can consequentially have an adverse impact on operating expenses (OpEx). While It is possible to build traditional networks that, when running correctly and optimally, get the job done unfortunately, they often embody such high operating expenses that cost becomes the overriding factor controlling the evolution of the campus network overall. The Automated Campus will allow XYZ Account to address all these issues and concerns. A key goal here must be, of course, to reduce the number of moving parts required to build and operate any campus. Extremes strategy for Campus Automation begins with re-thinking the way networks are designed, deployed and managed. Extremes Fabric-based networks enable faster configuration and troubleshooting; As a result, there is less opportunity for misconfiguration. Several automation solutions designed to enhance security often force network managers to accept complexity and degraded resilience to secure the network to meet local policies. Should a breach occur, containment to that segment protects even more sensitive parts of the network, resulting in a true dead-end for the hacker. With Extremes Automated Campus services can easily be defined and provisioned on-the-fly without disruption. Network operators specify what services are allowed or prohibited across the network. ]]>

In an industry thats already defined, Extreme Networks recent announcement of The Automated Campus is a significant advance in networking. For the first time, all the essential technologies, products, procedures and support are gathered together and integrated. All too often, the piecemeal/piecewise growth strategy typically historically applied in organizational network evolution results in too many tools, procedures, and techniques at work, precluding fast responsiveness, optimal operations staff productivity, and the degree of accuracy and efficiency required to keep end-users productive as well. The most important opportunity today is in boosting both productivity of end-users and network operators. The automated campus must address the productivity of network planners and network operations managers and staff. The often-significant number of elements required in an installation can demand significant staff time and can consequentially have an adverse impact on operating expenses (OpEx). While It is possible to build traditional networks that, when running correctly and optimally, get the job done unfortunately, they often embody such high operating expenses that cost becomes the overriding factor controlling the evolution of the campus network overall. The Automated Campus will allow XYZ Account to address all these issues and concerns. A key goal here must be, of course, to reduce the number of moving parts required to build and operate any campus. Extremes strategy for Campus Automation begins with re-thinking the way networks are designed, deployed and managed. Extremes Fabric-based networks enable faster configuration and troubleshooting; As a result, there is less opportunity for misconfiguration. Several automation solutions designed to enhance security often force network managers to accept complexity and degraded resilience to secure the network to meet local policies. Should a breach occur, containment to that segment protects even more sensitive parts of the network, resulting in a true dead-end for the hacker. With Extremes Automated Campus services can easily be defined and provisioned on-the-fly without disruption. Network operators specify what services are allowed or prohibited across the network. ]]>
Sun, 25 Feb 2018 16:38:12 GMT /slideshow/layer-2-forwarding-on-an-spb-fabric/88898640 JeffGreen9@slideshare.net(JeffGreen9) Layer 2 forwarding on an spb fabric JeffGreen9 In an industry thats already defined, Extreme Networks recent announcement of The Automated Campus is a significant advance in networking. For the first time, all the essential technologies, products, procedures and support are gathered together and integrated. All too often, the piecemeal/piecewise growth strategy typically historically applied in organizational network evolution results in too many tools, procedures, and techniques at work, precluding fast responsiveness, optimal operations staff productivity, and the degree of accuracy and efficiency required to keep end-users productive as well. The most important opportunity today is in boosting both productivity of end-users and network operators. The automated campus must address the productivity of network planners and network operations managers and staff. The often-significant number of elements required in an installation can demand significant staff time and can consequentially have an adverse impact on operating expenses (OpEx). While It is possible to build traditional networks that, when running correctly and optimally, get the job done unfortunately, they often embody such high operating expenses that cost becomes the overriding factor controlling the evolution of the campus network overall. The Automated Campus will allow XYZ Account to address all these issues and concerns. A key goal here must be, of course, to reduce the number of moving parts required to build and operate any campus. Extremes strategy for Campus Automation begins with re-thinking the way networks are designed, deployed and managed. Extremes Fabric-based networks enable faster configuration and troubleshooting; As a result, there is less opportunity for misconfiguration. Several automation solutions designed to enhance security often force network managers to accept complexity and degraded resilience to secure the network to meet local policies. Should a breach occur, containment to that segment protects even more sensitive parts of the network, resulting in a true dead-end for the hacker. With Extremes Automated Campus services can easily be defined and provisioned on-the-fly without disruption. Network operators specify what services are allowed or prohibited across the network. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/layer2forwardingonanspbfabric-180225163812-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In an industry thats already defined, Extreme Networks recent announcement of The Automated Campus is a significant advance in networking. For the first time, all the essential technologies, products, procedures and support are gathered together and integrated. All too often, the piecemeal/piecewise growth strategy typically historically applied in organizational network evolution results in too many tools, procedures, and techniques at work, precluding fast responsiveness, optimal operations staff productivity, and the degree of accuracy and efficiency required to keep end-users productive as well. The most important opportunity today is in boosting both productivity of end-users and network operators. The automated campus must address the productivity of network planners and network operations managers and staff. The often-significant number of elements required in an installation can demand significant staff time and can consequentially have an adverse impact on operating expenses (OpEx). While It is possible to build traditional networks that, when running correctly and optimally, get the job done unfortunately, they often embody such high operating expenses that cost becomes the overriding factor controlling the evolution of the campus network overall. The Automated Campus will allow XYZ Account to address all these issues and concerns. A key goal here must be, of course, to reduce the number of moving parts required to build and operate any campus. Extremes strategy for Campus Automation begins with re-thinking the way networks are designed, deployed and managed. Extremes Fabric-based networks enable faster configuration and troubleshooting; As a result, there is less opportunity for misconfiguration. Several automation solutions designed to enhance security often force network managers to accept complexity and degraded resilience to secure the network to meet local policies. Should a breach occur, containment to that segment protects even more sensitive parts of the network, resulting in a true dead-end for the hacker. With Extremes Automated Campus services can easily be defined and provisioned on-the-fly without disruption. Network operators specify what services are allowed or prohibited across the network.
Layer 2 forwarding on an spb fabric from Jeff Green
]]>
1100 3 https://cdn.slidesharecdn.com/ss_thumbnails/layer2forwardingonanspbfabric-180225163812-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
8.) xo s as a platform (on off premise) /slideshow/8-xo-s-as-a-platform-on-off-premise-68911017/68911017 8-161114161352
XoS Performance - Separation between control and forwarding planes - The "SDN Classic" model, as illustrated by this graphic from the Open Networking Foundation, offers many potential benefits: In the forwarding plane all switching, and feature implementation such as deep packet inspection , QoS scheduling, MAC learning and filtering, etc are performed in dedicated ASIC hardware Wire speed performance across entire product line (Backplane resources, packet /frame forwarding rate, Bits per second throughput) Local switching on all line cards at no additional cost ,increasing throughput and reducing latency. Dedicated stacking interfaces, and stacking over fiber. Low latency with Exceptional QoS We build networks to deliver on todays Experience Economy. Extreme Networks combines high performance wired and wireless hardware with a software-defined architecture that makes it simple, fast and smart for the user to connect with their device of choice. We provide a comprehensive portfolio, including Campus Mobility and Data Center solutions, which allow our customers to deliver a positive and consistent experience to each and every user in their environment. As SDN excitement grew, the term software-defined was adopted by marketers and applied liberally to all kinds of products and technologies: software-defined storage, software-defined security, software-defined data center. What technologies allow me to do this today? Key Features: Loop free load balancing, density, L2 overlays VXLAN fabric in EXOS / EOS MLAG: L2 Leaf/Spine with two spine members VPLS: L2 Leaf/Spine for HPC deployments SPB-V: S/K-Series for small enterprise data center Evolution ExtremeFabric: fully automated Why VxLAN? Its a really easy L2 over L3 transport MLAG technology Leaf/Spine Fabric MLAG is a special case of Leaf/Spine with only two spine members and everything on L2 (We kill the spanning tree and maintain state between the spines) Weve been leading in MLAG for a while VPLS technology Leaf/Spine Fabric We have successfully built VPLS mesh Leaf/Spine networks for HPC deployments Key Features: Loop free load balancing, density, L2 overlays We need more scale! 21.x / 22.x bring some interesting new features that fix this NEW with 21.1: The Scalable Layer 2 Fabric with VxLAN Technology VXLAN Overlay on routing for efficient load balancing and reachability OSPF extensions massively simplify deployment The Layer 2 traffic tunnels over any Layer 3 network Can be used in any topology, but highest performance is Leaf/Spine Removes the limitation on transit overlay in the spine Easy setup, small configuration X670-G2 and X770, S and K, and will be available on X870 at launch Scale to 2592 10G ports (X670-G2-72, 1:1), 512 40G (X770, 1:1) Available on EOS and EXOS NOW NEW with EXOS 22.x and EOS 8.81: Future Fabric Technology ]]>

XoS Performance - Separation between control and forwarding planes - The "SDN Classic" model, as illustrated by this graphic from the Open Networking Foundation, offers many potential benefits: In the forwarding plane all switching, and feature implementation such as deep packet inspection , QoS scheduling, MAC learning and filtering, etc are performed in dedicated ASIC hardware Wire speed performance across entire product line (Backplane resources, packet /frame forwarding rate, Bits per second throughput) Local switching on all line cards at no additional cost ,increasing throughput and reducing latency. Dedicated stacking interfaces, and stacking over fiber. Low latency with Exceptional QoS We build networks to deliver on todays Experience Economy. Extreme Networks combines high performance wired and wireless hardware with a software-defined architecture that makes it simple, fast and smart for the user to connect with their device of choice. We provide a comprehensive portfolio, including Campus Mobility and Data Center solutions, which allow our customers to deliver a positive and consistent experience to each and every user in their environment. As SDN excitement grew, the term software-defined was adopted by marketers and applied liberally to all kinds of products and technologies: software-defined storage, software-defined security, software-defined data center. What technologies allow me to do this today? Key Features: Loop free load balancing, density, L2 overlays VXLAN fabric in EXOS / EOS MLAG: L2 Leaf/Spine with two spine members VPLS: L2 Leaf/Spine for HPC deployments SPB-V: S/K-Series for small enterprise data center Evolution ExtremeFabric: fully automated Why VxLAN? Its a really easy L2 over L3 transport MLAG technology Leaf/Spine Fabric MLAG is a special case of Leaf/Spine with only two spine members and everything on L2 (We kill the spanning tree and maintain state between the spines) Weve been leading in MLAG for a while VPLS technology Leaf/Spine Fabric We have successfully built VPLS mesh Leaf/Spine networks for HPC deployments Key Features: Loop free load balancing, density, L2 overlays We need more scale! 21.x / 22.x bring some interesting new features that fix this NEW with 21.1: The Scalable Layer 2 Fabric with VxLAN Technology VXLAN Overlay on routing for efficient load balancing and reachability OSPF extensions massively simplify deployment The Layer 2 traffic tunnels over any Layer 3 network Can be used in any topology, but highest performance is Leaf/Spine Removes the limitation on transit overlay in the spine Easy setup, small configuration X670-G2 and X770, S and K, and will be available on X870 at launch Scale to 2592 10G ports (X670-G2-72, 1:1), 512 40G (X770, 1:1) Available on EOS and EXOS NOW NEW with EXOS 22.x and EOS 8.81: Future Fabric Technology ]]>
Mon, 14 Nov 2016 16:13:52 GMT /slideshow/8-xo-s-as-a-platform-on-off-premise-68911017/68911017 JeffGreen9@slideshare.net(JeffGreen9) 8.) xo s as a platform (on off premise) JeffGreen9 XoS Performance - Separation between control and forwarding planes - The "SDN Classic" model, as illustrated by this graphic from the Open Networking Foundation, offers many potential benefits: In the forwarding plane all switching, and feature implementation such as deep packet inspection , QoS scheduling, MAC learning and filtering, etc are performed in dedicated ASIC hardware Wire speed performance across entire product line (Backplane resources, packet /frame forwarding rate, Bits per second throughput) Local switching on all line cards at no additional cost ,increasing throughput and reducing latency. Dedicated stacking interfaces, and stacking over fiber. Low latency with Exceptional QoS We build networks to deliver on todays Experience Economy. Extreme Networks combines high performance wired and wireless hardware with a software-defined architecture that makes it simple, fast and smart for the user to connect with their device of choice. We provide a comprehensive portfolio, including Campus Mobility and Data Center solutions, which allow our customers to deliver a positive and consistent experience to each and every user in their environment. As SDN excitement grew, the term software-defined was adopted by marketers and applied liberally to all kinds of products and technologies: software-defined storage, software-defined security, software-defined data center. What technologies allow me to do this today? Key Features: Loop free load balancing, density, L2 overlays VXLAN fabric in EXOS / EOS MLAG: L2 Leaf/Spine with two spine members VPLS: L2 Leaf/Spine for HPC deployments SPB-V: S/K-Series for small enterprise data center Evolution ExtremeFabric: fully automated Why VxLAN? Its a really easy L2 over L3 transport MLAG technology Leaf/Spine Fabric MLAG is a special case of Leaf/Spine with only two spine members and everything on L2 (We kill the spanning tree and maintain state between the spines) Weve been leading in MLAG for a while VPLS technology Leaf/Spine Fabric We have successfully built VPLS mesh Leaf/Spine networks for HPC deployments Key Features: Loop free load balancing, density, L2 overlays We need more scale! 21.x / 22.x bring some interesting new features that fix this NEW with 21.1: The Scalable Layer 2 Fabric with VxLAN Technology VXLAN Overlay on routing for efficient load balancing and reachability OSPF extensions massively simplify deployment The Layer 2 traffic tunnels over any Layer 3 network Can be used in any topology, but highest performance is Leaf/Spine Removes the limitation on transit overlay in the spine Easy setup, small configuration X670-G2 and X770, S and K, and will be available on X870 at launch Scale to 2592 10G ports (X670-G2-72, 1:1), 512 40G (X770, 1:1) Available on EOS and EXOS NOW NEW with EXOS 22.x and EOS 8.81: Future Fabric Technology <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/8-161114161352-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> XoS Performance - Separation between control and forwarding planes - The &quot;SDN Classic&quot; model, as illustrated by this graphic from the Open Networking Foundation, offers many potential benefits: In the forwarding plane all switching, and feature implementation such as deep packet inspection , QoS scheduling, MAC learning and filtering, etc are performed in dedicated ASIC hardware Wire speed performance across entire product line (Backplane resources, packet /frame forwarding rate, Bits per second throughput) Local switching on all line cards at no additional cost ,increasing throughput and reducing latency. Dedicated stacking interfaces, and stacking over fiber. Low latency with Exceptional QoS We build networks to deliver on todays Experience Economy. Extreme Networks combines high performance wired and wireless hardware with a software-defined architecture that makes it simple, fast and smart for the user to connect with their device of choice. We provide a comprehensive portfolio, including Campus Mobility and Data Center solutions, which allow our customers to deliver a positive and consistent experience to each and every user in their environment. As SDN excitement grew, the term software-defined was adopted by marketers and applied liberally to all kinds of products and technologies: software-defined storage, software-defined security, software-defined data center. What technologies allow me to do this today? Key Features: Loop free load balancing, density, L2 overlays VXLAN fabric in EXOS / EOS MLAG: L2 Leaf/Spine with two spine members VPLS: L2 Leaf/Spine for HPC deployments SPB-V: S/K-Series for small enterprise data center Evolution ExtremeFabric: fully automated Why VxLAN? Its a really easy L2 over L3 transport MLAG technology Leaf/Spine Fabric MLAG is a special case of Leaf/Spine with only two spine members and everything on L2 (We kill the spanning tree and maintain state between the spines) Weve been leading in MLAG for a while VPLS technology Leaf/Spine Fabric We have successfully built VPLS mesh Leaf/Spine networks for HPC deployments Key Features: Loop free load balancing, density, L2 overlays We need more scale! 21.x / 22.x bring some interesting new features that fix this NEW with 21.1: The Scalable Layer 2 Fabric with VxLAN Technology VXLAN Overlay on routing for efficient load balancing and reachability OSPF extensions massively simplify deployment The Layer 2 traffic tunnels over any Layer 3 network Can be used in any topology, but highest performance is Leaf/Spine Removes the limitation on transit overlay in the spine Easy setup, small configuration X670-G2 and X770, S and K, and will be available on X870 at launch Scale to 2592 10G ports (X670-G2-72, 1:1), 512 40G (X770, 1:1) Available on EOS and EXOS NOW NEW with EXOS 22.x and EOS 8.81: Future Fabric Technology
8.) xo s as a platform (on off premise) from Jeff Green
]]>
480 3 https://cdn.slidesharecdn.com/ss_thumbnails/8-161114161352-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
12.) fabric (your next data center) /slideshow/12-fabric-your-next-data-center-68910356/68910356 12-161114160225
Extreme is rethinking the data plane, the control plane, and the management plane. Extreme is a better mouse trap which delivers new features, advanced function, and wire-speed performance. Our switches deliver deterministic performance independent of load or what features are enabled. All Extreme Switches are based on XOS, the industries first and only truly modular operating system. Having a modular OS provides higher availability of critical network resources. By isolating each critical process in its own protected memory space, a single failed process can not take down the entire switch. Application modules can be loaded and unloaded without the need for rebooting the switch. This is the level of functionality that users expect on other technology. Reaching the twenty million port milestone is a significant achievement demonstrating how our highly effective network solutions, with rich features, innovative software and integrated support for secure convergence. VoIP/Unified Communica Fons/Infrastructure/SIP Trunking (SBC) Because of strong ROI, investment in this segment remains on a very strong growth trajectory. Enterprises depend on modular switching solutions for all aspects of the enterprise network: in the enterprise core and data center, the distribution layer that lies between the core and wiring closet, and in the wiring closet itself. Modular solutions provide port diversity and density that fixed solutions simply cannot match. There are also high-capacity modular solutions that only the largest of enterprises and institutions use for high-density and high-speed deployments. Modular solutions are generally much more expensive than their fixed cousins, especially in situations where density or flexibility are not required. Fixed-configuration stackable switches are typically cost- optimized, but they offer no real port diversity on an individual switch. Port diversity means the availability of different port types, such as fiber versus copper ports. Stackable switches have gotten better at offering port diversity, but they still cannot match their modular cousins. Many of these products now offer high-end features such as 802.3af PoE, QoS, and multi-layer intelligence that were only found on modular switches in the past. This is due to the proliferation of third-party merchant silicon in the fixed configuration market. Generally, a stack of fixed configuration switches can be managed as a single virtual entity. Fixed configuration switches generally cannot be used to provision an entire large enterprise, but instead are mostly used out at the edge or departmental level as a low-cost alternative to modular products. Assumptions: Ethernet is Open Active/Active in the Fabric Therefore: Open at the Edge Active/Active at the edge ]]>

Extreme is rethinking the data plane, the control plane, and the management plane. Extreme is a better mouse trap which delivers new features, advanced function, and wire-speed performance. Our switches deliver deterministic performance independent of load or what features are enabled. All Extreme Switches are based on XOS, the industries first and only truly modular operating system. Having a modular OS provides higher availability of critical network resources. By isolating each critical process in its own protected memory space, a single failed process can not take down the entire switch. Application modules can be loaded and unloaded without the need for rebooting the switch. This is the level of functionality that users expect on other technology. Reaching the twenty million port milestone is a significant achievement demonstrating how our highly effective network solutions, with rich features, innovative software and integrated support for secure convergence. VoIP/Unified Communica Fons/Infrastructure/SIP Trunking (SBC) Because of strong ROI, investment in this segment remains on a very strong growth trajectory. Enterprises depend on modular switching solutions for all aspects of the enterprise network: in the enterprise core and data center, the distribution layer that lies between the core and wiring closet, and in the wiring closet itself. Modular solutions provide port diversity and density that fixed solutions simply cannot match. There are also high-capacity modular solutions that only the largest of enterprises and institutions use for high-density and high-speed deployments. Modular solutions are generally much more expensive than their fixed cousins, especially in situations where density or flexibility are not required. Fixed-configuration stackable switches are typically cost- optimized, but they offer no real port diversity on an individual switch. Port diversity means the availability of different port types, such as fiber versus copper ports. Stackable switches have gotten better at offering port diversity, but they still cannot match their modular cousins. Many of these products now offer high-end features such as 802.3af PoE, QoS, and multi-layer intelligence that were only found on modular switches in the past. This is due to the proliferation of third-party merchant silicon in the fixed configuration market. Generally, a stack of fixed configuration switches can be managed as a single virtual entity. Fixed configuration switches generally cannot be used to provision an entire large enterprise, but instead are mostly used out at the edge or departmental level as a low-cost alternative to modular products. Assumptions: Ethernet is Open Active/Active in the Fabric Therefore: Open at the Edge Active/Active at the edge ]]>
Mon, 14 Nov 2016 16:02:25 GMT /slideshow/12-fabric-your-next-data-center-68910356/68910356 JeffGreen9@slideshare.net(JeffGreen9) 12.) fabric (your next data center) JeffGreen9 Extreme is rethinking the data plane, the control plane, and the management plane. Extreme is a better mouse trap which delivers new features, advanced function, and wire-speed performance. Our switches deliver deterministic performance independent of load or what features are enabled. All Extreme Switches are based on XOS, the industries first and only truly modular operating system. Having a modular OS provides higher availability of critical network resources. By isolating each critical process in its own protected memory space, a single failed process can not take down the entire switch. Application modules can be loaded and unloaded without the need for rebooting the switch. This is the level of functionality that users expect on other technology. Reaching the twenty million port milestone is a significant achievement demonstrating how our highly effective network solutions, with rich features, innovative software and integrated support for secure convergence. VoIP/Unified Communica Fons/Infrastructure/SIP Trunking (SBC) Because of strong ROI, investment in this segment remains on a very strong growth trajectory. Enterprises depend on modular switching solutions for all aspects of the enterprise network: in the enterprise core and data center, the distribution layer that lies between the core and wiring closet, and in the wiring closet itself. Modular solutions provide port diversity and density that fixed solutions simply cannot match. There are also high-capacity modular solutions that only the largest of enterprises and institutions use for high-density and high-speed deployments. Modular solutions are generally much more expensive than their fixed cousins, especially in situations where density or flexibility are not required. 鐃緒申Fixed-configuration stackable switches are typically cost- optimized, but they offer no real port diversity on an individual switch. Port diversity means the availability of different port types, such as fiber versus copper ports. Stackable switches have gotten better at offering port diversity, but they still cannot match their modular cousins. Many of these products now offer high-end features such as 802.3af PoE, QoS, and multi-layer intelligence that were only found on modular switches in the past. This is due to the proliferation of third-party merchant silicon in the fixed configuration market. Generally, a stack of fixed configuration switches can be managed as a single virtual entity. Fixed configuration switches generally cannot be used to provision an entire large enterprise, but instead are mostly used out at the edge or departmental level as a low-cost alternative to modular products. Assumptions: Ethernet is Open Active/Active in the Fabric Therefore: Open at the Edge Active/Active at the edge <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/12-161114160225-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Extreme is rethinking the data plane, the control plane, and the management plane. Extreme is a better mouse trap which delivers new features, advanced function, and wire-speed performance. Our switches deliver deterministic performance independent of load or what features are enabled. All Extreme Switches are based on XOS, the industries first and only truly modular operating system. Having a modular OS provides higher availability of critical network resources. By isolating each critical process in its own protected memory space, a single failed process can not take down the entire switch. Application modules can be loaded and unloaded without the need for rebooting the switch. This is the level of functionality that users expect on other technology. Reaching the twenty million port milestone is a significant achievement demonstrating how our highly effective network solutions, with rich features, innovative software and integrated support for secure convergence. VoIP/Unified Communica Fons/Infrastructure/SIP Trunking (SBC) Because of strong ROI, investment in this segment remains on a very strong growth trajectory. Enterprises depend on modular switching solutions for all aspects of the enterprise network: in the enterprise core and data center, the distribution layer that lies between the core and wiring closet, and in the wiring closet itself. Modular solutions provide port diversity and density that fixed solutions simply cannot match. There are also high-capacity modular solutions that only the largest of enterprises and institutions use for high-density and high-speed deployments. Modular solutions are generally much more expensive than their fixed cousins, especially in situations where density or flexibility are not required. 鐃緒申Fixed-configuration stackable switches are typically cost- optimized, but they offer no real port diversity on an individual switch. Port diversity means the availability of different port types, such as fiber versus copper ports. Stackable switches have gotten better at offering port diversity, but they still cannot match their modular cousins. Many of these products now offer high-end features such as 802.3af PoE, QoS, and multi-layer intelligence that were only found on modular switches in the past. This is due to the proliferation of third-party merchant silicon in the fixed configuration market. Generally, a stack of fixed configuration switches can be managed as a single virtual entity. Fixed configuration switches generally cannot be used to provision an entire large enterprise, but instead are mostly used out at the edge or departmental level as a low-cost alternative to modular products. Assumptions: Ethernet is Open Active/Active in the Fabric Therefore: Open at the Edge Active/Active at the edge
12.) fabric (your next data center) from Jeff Green
]]>
789 3 https://cdn.slidesharecdn.com/ss_thumbnails/12-161114160225-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
10.) vxlan /slideshow/10-vxlan-68909700/68909700 10-161114155057
The Secret Sauce is the Control Plane, not the Encapsulation Host Route Distribution decoupled from the Underlay protocol Use MultiProtocol-BGP (MP-BGP) on the Leaf nodes to distribute internal Host/Subnet Routes and external reachability information Route-Reflectors deployed for scaling purposes VXLAN terminates its tunnels on VTEPs (Virtual Tunnel End Point). Each VTEP has two interfaces, one is to provide bridging function for local hosts, the other has an IP identification in the core network for VXLAN encapsulation/decapsulation. VXLAN Encapsulation and De-encapsulation occur on T2 Bridging and Gateway are independent of the port type (1/10/40G ports) Encapsulation happens on the egress port Decapsulation happens on the ingress port Service Oriented Architecture 2 or 3 layer network to Leaf & Spine High density and bandwidth required Layer 3 ECMP No oversubscription Low and uniform delay characteristic Wire & configure once network Uniform network configuration Workload Mobility Workload Placement Segmentation Scale Automation & Programmability L2 + L3 Connectivity Physical + Virtual Open ]]>

The Secret Sauce is the Control Plane, not the Encapsulation Host Route Distribution decoupled from the Underlay protocol Use MultiProtocol-BGP (MP-BGP) on the Leaf nodes to distribute internal Host/Subnet Routes and external reachability information Route-Reflectors deployed for scaling purposes VXLAN terminates its tunnels on VTEPs (Virtual Tunnel End Point). Each VTEP has two interfaces, one is to provide bridging function for local hosts, the other has an IP identification in the core network for VXLAN encapsulation/decapsulation. VXLAN Encapsulation and De-encapsulation occur on T2 Bridging and Gateway are independent of the port type (1/10/40G ports) Encapsulation happens on the egress port Decapsulation happens on the ingress port Service Oriented Architecture 2 or 3 layer network to Leaf & Spine High density and bandwidth required Layer 3 ECMP No oversubscription Low and uniform delay characteristic Wire & configure once network Uniform network configuration Workload Mobility Workload Placement Segmentation Scale Automation & Programmability L2 + L3 Connectivity Physical + Virtual Open ]]>
Mon, 14 Nov 2016 15:50:57 GMT /slideshow/10-vxlan-68909700/68909700 JeffGreen9@slideshare.net(JeffGreen9) 10.) vxlan JeffGreen9 The Secret Sauce is the Control Plane, not the Encapsulation Host Route Distribution decoupled from the Underlay protocol Use MultiProtocol-BGP (MP-BGP) on the Leaf nodes to distribute internal Host/Subnet Routes and external reachability information Route-Reflectors deployed for scaling purposes VXLAN terminates its tunnels on VTEPs (Virtual Tunnel End Point). Each VTEP has two interfaces, one is to provide bridging function for local hosts, the other has an IP identification in the core network for VXLAN encapsulation/decapsulation. VXLAN Encapsulation and De-encapsulation occur on T2 Bridging and Gateway are independent of the port type (1/10/40G ports) Encapsulation happens on the egress port Decapsulation happens on the ingress port Service Oriented Architecture 2 or 3 layer network to Leaf & Spine High density and bandwidth required Layer 3 ECMP No oversubscription Low and uniform delay characteristic Wire & configure once network Uniform network configuration Workload Mobility Workload Placement Segmentation Scale Automation & Programmability L2 + L3 Connectivity Physical + Virtual Open <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/10-161114155057-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The Secret Sauce is the Control Plane, not the Encapsulation Host Route Distribution decoupled from the Underlay protocol Use MultiProtocol-BGP (MP-BGP) on the Leaf nodes to distribute internal Host/Subnet Routes and external reachability information Route-Reflectors deployed for scaling purposes VXLAN terminates its tunnels on VTEPs (Virtual Tunnel End Point). Each VTEP has two interfaces, one is to provide bridging function for local hosts, the other has an IP identification in the core network for VXLAN encapsulation/decapsulation. VXLAN Encapsulation and De-encapsulation occur on T2 Bridging and Gateway are independent of the port type (1/10/40G ports) Encapsulation happens on the egress port Decapsulation happens on the ingress port Service Oriented Architecture 2 or 3 layer network to Leaf &amp; Spine High density and bandwidth required Layer 3 ECMP No oversubscription Low and uniform delay characteristic Wire &amp; configure once network Uniform network configuration Workload Mobility Workload Placement Segmentation Scale Automation &amp; Programmability L2 + L3 Connectivity Physical + Virtual Open
10.) vxlan from Jeff Green
]]>
1130 3 https://cdn.slidesharecdn.com/ss_thumbnails/10-161114155057-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-JeffGreen9-48x48.jpg?cb=1629828484 Data Center and Cloud Sales to support Next Generation Compute... Operating authentically is the key to my success. I don't stick to a "one size fits all" approaches. I am confident, both clients and prospects respond well to the more genuine consultative salespeople with a vested interest in their success. Of course not everything authentic sells, above in my picture, I am standing in front of a Tucker. This car was one of the most advanced automobiles conceived. Only 51 cars were made before the company folded in 1949. The Tucker's original price was $2,450. Today a Tucker like the one I am standing in front can be worth over a million dollars. In 1985, I started my first territory w... https://cdn.slidesharecdn.com/ss_thumbnails/whereisthebeefwith6e-210824155815-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/where-is-the-beef-with-6-e/250041206 Where is the beef with... https://cdn.slidesharecdn.com/ss_thumbnails/whereisthebeeftmi-210824155652-thumbnail.jpg?width=320&height=320&fit=bounds JeffGreen9/where-is-the-beef Where is the beef https://cdn.slidesharecdn.com/ss_thumbnails/6esecurity-210824154344-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/6-e-security/250041140 6 e security