2018/9/21. La abstracción de la Red Un Campus de usuarios Víctor Jiménez Ramos Chief Engineer.

Slides:



Advertisements
Presentaciones similares
1 1.Prepare and Install 1.1 You have to know before installation 1.2 Hardware Installation 2. How to use Bluetooth Printer Adapter’s Services 2.1 Connect.
Advertisements

Exsource Group Technology consortium of El Salvador.
Sembrando confianza en el CLOUD Oscar López Área I+D+i XV Jornadas de Seguridad NEXTEL S.A. 27/06/2013.
10 de abril de 2014 Bioinformática Nuevas Capacidades para un Nuevo País Carlos Vásquez Director Nacional de Tecnología y Competitividad Microsoft Colombia.
/1 R1 / Rafael Rodriguez Sistemas de Comunicaciones Móviles FACULTAD DE INGENIERIA U.C.V. Escuela de Ingeniería Eléctrica Introduction to Wireless Communication.
Una plataforma de Integracion legítima. 2 Integracion Administracion Habilitada Los Jefes de seguridad pueden controlar todos los sitios desde una sola.
A demanda elástica De amplio Acceso Servicios medibles Recursos mancomunados.
CMMI Carlos Mario Zapata J. 4/13/2017 Calidad de Software.
Launch with Confidence User Experience (UX) Diseñando una experiencia por y para los usuarios Presentado por: Rob [Senior Engineer]
CLOUD COMPUTING AS A FACILITATOR TOOL FOR THE ENTREPENEURSHIP IN COLOMBIA Carlos Andrés Osorio Toro Teacher– Researcher CESA
El valor de IBM en la era del negocio digital
de septiembre.  ¿Qué hora es? La participación #1 = dibuja una FLOR GRAN DE 3. 4.
Cloud Computing. ¿Qué es Cloud Computing? Definiciones Refers to the bigger picture…basically the broad concept of using the internet to allow people.
Sistemas de Información Agosto-Diciembre 2007 Sesión # 3.
Nombre de equipo: abaddon Camilo ramos rojas Grupo :6 Pista # 2 Traductor y motor de búsqueda : google Miércoles 1 de septiembre 2010 Pagina de respuesta.
Aplicaciones en la Nube (Cloud Computing): CRM Napoleón Castillo Consultor.
Bluemix (PaaS) – Overview
WWW. WIRELESS WIFI Wireless-Fidelity Es un mecanismo de conexión de dispositivos electrónicos de forma inalámbrica.
Los días de la semana Days of the week Notes #13.
Sistemas de Información Agosto-Diciembre 2007 Sesión # 10.
Tareas Básicas de un Network Administrator Prof. Carlos Rodríguez Sánchez.
Asking For Help. The verbs Querer and Poder Stem-changing verbs The verb querer (to want) and poder (to be able to) are both stem- changing verbs. The.
Prioridades del Negocio Virtualization Digital Collaboration Green ITSaaS & Cloud Computing Social Computing Mobility Next Gen User Experience Soluciones.
Seminario de Tecnologías de Información Emergentes Agosto-Diciembre, 2007 Sesión # 7.
Please choose five pictures. Por favor, elija cinco fotografías. Make a list of words about each picture that you choose. Haga una lista de palabras sobre.
Bogota, Mayo 21/2015. © 2013 JDS Uniphase Corporation | JDSU CONFIDENTIAL AND PROPRIETARY INFORMATION  Sondas. Para que?  Situación actual de las sondas.
INTELIGENCIA DE NEGOCIOS Agosto Procesamiento de una gran masa de datos Analisis Avanzado Analisis de las decisiones coorporativas BUSINESS INTELLIGENCE.
Interval Priority4.1 Develop a strategy to align the security zones with the requirements of FA1 High1. Authentication & Authorization High2.
Bluemix, plataforma ágil para la construcción y ejecución de las soluciones en el mundo digital Manuel Rodriguez, Evangelista Cloud
ALC 69 Hoy es miércoles el 28 de marzo de Escribe en español e inglés 1.With me 2.With you 3.Hey! 4.I’m sorry. 5.I have to study. 6.What a shame!
Present tense of Querer with infinitives p. 90. To say what you or others want, use a form of the verb querer. The form you use depends on the subject.
© 2010 VMware Inc. All rights reserved Virtualización, el primer paso en el camino hacia la nube. Andres P Giarletta Senior Partner Systems Engineer VMware.
1 © Copyright Fortinet Inc. All rights reserved. Security Fabric - Seguridad Sin Comprimiso Jose Luis Laguna SE Manager Fortinet Iberia.
INTELIGENCIA DE NEGOCIOS Business Intelligence (BI) is: “Business intelligence (BI) is an umbrella term that includes the applications, infrastructure.
© Granta Design, Título del Proyecto Tutor: Nombre y Apellidos Alumno/s: Nombre y Apellidos 1 Nombre y Apellidos.
1 CONECTAMOS EXPERIENCIAS EN LAS UNIVERSIDADES Transición a la nube.
Input Devices. An input device is a piece of equipment used for entering data or controlling a computer, for example, a mouse, a keyboard, a scanner,
Soluciones Peer-to-peer
Cómo asignar IP Address estáticos en un host
header Oscar Fernando Jerez Rey
Para conectarse a Internet
CHILEAN GEO CLIENT APPLICATION FOR DISASTERS RODRIGO SUÁREZ VILLARROEL
English to Spanish Meeting Notes (2/21/17 09:23) ok
Los adjetivos Descriptivos
Centro de Operaciones de John Deere
Strategy A world in which every child grows up free from violence
Introduction & Agenda Introduction to Microchip Device Blocksets Introduction to MATLAB Plug-In in MPLAB®IDE Creating a SIMULINK model with Microchip.
C. Jaramillo*, J. M. Jaramillo, J. E. Correa  Universidad EAFIT
Page 1 CITS Active Directory Implementation UMass Dartmouth.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
| CITSmart ITSM.
IBM Cloud Flexible Choice of Infrastructure VMware | Openstack | Hardware | IaaS Kubernetes-based Platform Developer Productivity | Operational Efficiency.
Rational Tool Overview. Introduction Requirements-Driven Software Development with Rational Analyst Studio. Tafadzwa Nzara Analysis & Design Consultant.
WHAT IS THE BLOCKCHAIN? The Blockchain is a distributed ledger, or a decentralized data base in which digital transactions are recorded. This data base,
Internet de las Cosas (Parte I)
Capítulo 4: Contenidos 4.1 Introducción Plano de datos
--To be pleasing to --Your likes & dislikes
DIGITAL SECURITY ? HOW TO IMPROVE. WHAT IS DIGITAL SECURITY? Digital security is the protection of your digital identity. Protects and keeps things like.
Introduction to CAN. What is CAN and what are some of its features? Serial communication Multi-Master Protocol Compact –Twisted Pair Bus line 1 Megabit.
Virtual LAN Design Switches also have enabled the creation of Virtual LANs (VLANs). VLANs provide greater opportunities to manage the flow of traffic on.
AIDC application Presentation ATN 2.4A By Mike Asbury, FAA
SAFETY MANAGEMENT SYSTEM. SMS: THE JOURNEY SMS: THE PRODUCT Safety is not the manual, it is what happens on the ground that counts.
Connectivity MODELS OF NETWORK COMPUTING Centralized computing Distributed computing Collaborative or cooperative computing.
CARRYING CAPACITY. SILVIA What’s carrying capacity? Why is carrying capacity important in the world?
Welcome to PowerPoint gdskcgdskfcbskjc. Designer helps you get your point across PowerPoint Designer suggests professional designs for your presentation,
“ The Heart of a Leader ” based on the book by Ken Blanchard presentation written by Michelle Spradley, CPS/CAP presented by Emily Garner, CAP-OM.
Capítulo 4: Contenidos 4.1 Introducción Plano de datos
Mejoras de Seguridad José María Genzor Security Senior Consultant Winmat IT Security Services.
Introduction to Fortinet Unified Threat Management.
Transcripción de la presentación:

La abstracción de la Red Un Campus de usuarios Víctor Jiménez Ramos Chief Engineer

2018/9/21

¿Cuál es el objetivo final de nuestra red? WAN DC IoT Campus

¿Si el usuario de la red Campus no cambia, porque se sigue pensando en sistemas separados?

La abstracción de la red INFRAESTRUCTURA

La abstracción en el DC parece bastante clara Abstracción de la red, que nos permita adaptarnos STP Ayer CSS/SVF VxLAN TRILL Hoy ? Mañana Conectarnos con las principales plataformas del mercado Ajuste fino de las operaciones de O&M Application monitoring Capacity planning SLA management Network monitoring Fabric Cloud OS

¿Cómo conseguimos la abstracción del Campus?

Redes campus orientadas a usuarios y servicios Automatic Network Deployment The administrator defines policies based on natural language. Service language Controller The Controller automatically translates policies. UCL6000 src-group 1 dst-group 10.3.1.0/24 permit src-group 3 dst-group 10.3.2.0/24 deny src-group 2 dst-group 10.3.1.0/24 permit src-group 1 dst-group 10.3.2.0/24 permit src-group 1 dst-group 3 deny src-group 1 dst-group 2 deny Network language Delivers policies. Centralized control, Accompanied policies, User-centered refined management Natural language-based policy configuration and ease of use Network-wide policy planning and one-click deployment

Le falta algo al concepto de SDN Ubiquitous Network Access Quick Adaptation to Changing Demands Openness and Collaboration Reliability and Security Chipset Network Devices Centralized Control Network Capability Openness Network Virtualization Fully Programmable Quality Awareness Smooth Evolution Software-Defined Networking (SDN) Huawei’s Enhanced Architecture

Chipset programable para una rápida transformación Controller 6 months Agile Device Software-defined Traditional Device 24 Hardware- defined Mobile Cloud Computing UC Industry Services Big Data IoT New Protocols Nuevos servicios digitales

Calidad de la comunicación WAN Internet SVN NGFW Quality monitoring 3.36% 0.% 0.27% 0.43% 5.52% 2. Identificación de los paquetes 3. Analisis de la experiencia 1. Auto-descubrimiento Application link quality analysis Estadística y analisis Analisis de la congestión y recomendaciones

Evolución progresiva Control Plane Control Plane Control Plane I can only use the device as-is. Device Vendor / Service Operator Split Programmability Control Plane Control I can do what the device has supported. Data Plane “Gray Box” Service Operator driven Programmability Control Plane Program Data Plane “White Box” I can do whatever I want. Management Control Plane “Black Box” Data Plane Device Vendor driven Programmability Closed and proprietary design that meets the pre-defined service requirements Open interface using existing technology building blocks for limited programmability Open interface using generic network programming model, enable full programmability

El camino a la convergencia