Fabric Networking
Fabric Networking
Fabric Networking
by Sara Perrott
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Fabric Networking For Dummies®, Extreme Networks
Special Edition
Published by
John Wiley & Sons, Inc.
111 River St.
Hoboken, NJ 07030-5774
www.wiley.com
Copyright © 2020 by John Wiley & Sons, Inc., Hoboken, New Jersey
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any
means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections
107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the Publisher. Requests
to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111
River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/
permissions.
Trademarks: Wiley, For Dummies, the Dummies Man logo, Dummies.com, and related trade dress are trademarks
or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries,
and may not be used without written permission. Extreme Networks and the Extreme logo are trademarks or
registered trademarks of Extreme Networks, Inc. All other trademarks are the property of their respective owners.
John Wiley & Sons, Inc., is not associated with any product or vendor mentioned in this book.
For general information on our other products and services, or how to create a custom For Dummies book for your
business or organization, please contact our Business Development Department in the U.S. at 877-409-4177,
contact [email protected], or visit www.wiley.com/go/custompub. For information about licensing the For
Dummies brand for products or services, contact BrandedRights&[email protected].
10 9 8 7 6 5 4 3 2 1
Publisher’s Acknowledgments
We’re proud of this book and of the people who worked on it. For details on how to
create a custom For Dummies book for your business or organization, contact info@
dummies.biz or visit www.wiley.com/go/custompub. For details on licensing the For
Dummies brand for products or services, contact BrandedRights&[email protected].
Some of the people who helped bring this book to market include the following:
Project Editor: Martin V. Minner Business Development Representative:
Karen Hattan
Acquisitions Editor: Ashley Coffey
Production Editor: Tamilmani Varadharaj
Editorial Manager: Rev Mengle
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Table of Contents
INTRODUCTION................................................................................................ 1
About This Book.................................................................................... 1
Icons Used in This Book........................................................................ 2
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
CHAPTER 4: Examining Key Considerations in Fabric
Technology Evaluations........................................................ 29
Enabling Automation.......................................................................... 30
Network automation..................................................................... 30
Cross-domain automation............................................................ 31
AI/ML driven automation.............................................................. 32
Enhancing Visibility............................................................................. 33
On-box visibility.............................................................................. 34
Network analytics.......................................................................... 34
Integrating Ecosystem Partners........................................................ 35
Improving Security.............................................................................. 35
Integrating Wired/Wireless................................................................ 36
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
I
n today’s world, businesses grow and change at a pace that can
be difficult to keep up with. This is especially true if you are in
charge of architecting or operating the communications net-
works that enable the business to serve its employees and its
customers.
Introduction 1
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Icons Used in This Book
As you read this book, notice the icons in the margins. These
indicate information that may be of interest. The material that
accompanies the icons can enrich your understanding of fabric
networking. I highly recommend reading them!
Tips provide guidance that may save you time and effort. These
are typically based on real-world experience and are there to help
you hit the ground running with fabric networking.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Analyzing the state of networking
technology
Chapter 1
Recognizing the Need
for More Flexible and
Automated Networking
T
echnology is advancing at a rapid pace. Robotics, Internet of
Things (IoT) devices, virtual reality, and augmented reality
are all making their way onto your network. Bound by com-
plexity, traditional networks can no longer keep pace with the
speed of innovation. What’s needed is a simpler, automated, and
secure network environment.
CHAPTER 1 Recognizing the Need for More Flexible and Automated Networking 3
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
own device” (BYOD) devices that require secure connectivity, to
the requests for support of more real-time, bandwidth-intensive
traffic such as video, to the rapid growth of hybrid cloud delivery
models — all of these demands are having a significant impact on
the network.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Learning About the Types
of Fabric Networks
Fabric networks get their name from the diagram of their compo-
nent connectivity, which resembles a piece of fabric. The network
is woven together into a connectivity mesh.
CHAPTER 1 Recognizing the Need for More Flexible and Automated Networking 5
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
network), and BGP/EVPN with Virtual Extensible LAN (VXLAN)
tunnels are used for the overlay (the data plane).
The driver behind Layer 3 fabrics was the use of a single
protocol stack and single virtualization technology. By
leveraging BGP as the underlay, the network can deliver
massive scalability. These fabrics all offer the benefit of full
vendor interoperability for both the underlay and overlay
networks, allowing for vendor-agnostic network
implementations.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Better resiliency: Fabric networking provides the opportu-
nity to simplify your network by reducing the number of
protocols in use. With a simpler network, recovery times are
faster. Also, more interconnectivity means the loss of a link
or even a network device will not impact your applications.
»» Enhanced security: Fabric networks allow you to easily
implement network segmentation with the creation of
secure zones. This feature prevents lateral movement across
the network. For example, if a system is infected by a virus,
the infected system is not allowed to communicate outside
of its zone or segment.
»» Integrated wired and wireless: With certain fabric tech-
nologies you can fully integrate your wired and wireless
networks to create a unified campus network. This unifica-
tion leads to greater simplicity in deploying wireless APs and
providing a consistent quality of service across both wired
and wireless access.
»» Enhanced quality of experience (QoE): Fabric technologies
use algorithms to calculate the shortest path between any
source and destination. This capability ensures that in any
network, users and devices are connected to their applica-
tions by the shortest and most efficient path to reduce
latency.
Understanding Adjacent
Networking Technologies
This section examines important technologies that are synergistic
to fabrics:
CHAPTER 1 Recognizing the Need for More Flexible and Automated Networking 7
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Fabric networking can be deployed independently or as part
of an SDN solution. Independently, fabrics can deliver
inherent automation capabilities. Alternatively, they can be
deployed with a management system or controllers for
centralized control and automation.
»» Network functions virtualization (NFV): NFV virtualizes
network services like routing, switching, load balancing,
security, and wide area network (WAN) optimization so they
can be deployed on commodity hardware. Because fabric
networking is a feature commonly available on routing and
switch OSs, it is synergistic to NFV, since the fabric OS can
run within a hypervisor or a container-based framework
alongside other required network functions like security or
WAN optimization.
»» Multi-Chassis Link Aggregation (MLAG): MLAG logically
aggregates two or more switches to form one logical entity. It
provides link-level and device-level network resiliency and
eliminates single points of failure. Originally designed to
enable an STP-free core network, MLAG can be used in
conjunction with fabric networking for a higher degree of
resiliency, offering the ability to take nodes out of service for
software upgrades and patches without any impact to
availability. It can also provide enhanced resiliency for end
devices such as servers, firewalls, and load balancers.
»» Port extender technology: Port extender technology
replaces traditional fully-featured access layer switches with
simple port extenders that are fully managed and controlled
by an aggregation switch (typically called a controlling bridge).
Port extender technology can be used in conjunction with
fabric networking to provide a high fan-out of ports that are
controlled, operated, and managed by a fabric-enabled
aggregation switch.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Understanding data center use cases for
fabric networking
Chapter 2
Exploring the Use Cases
for Fabric Networking
D
igital transformation — and the influx of advanced tech-
nology that it brings onto your network — requires net-
working that easily adapts to changing business needs.
A step in the right direction is the use of fabric networking.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
This section shows how fabric networking can address the
challenges of the modern-day data center and enable your IT
department to work at cloud speed while becoming more agile
and responsive to business needs.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
through automation. When containers are created on a
container host, fabric networks allow you to generate the
resources the containers demand to support their
workloads.
»» IP storage connectivity requires a network that delivers the
bandwidth, performance, and reliability needed in today’s
demanding environment. Fabric networks that support
storage technologies such as Internet Small Computer
Systems Interface (iSCSI), Network File System (NFS), or
Non-Volatile Memory Express (NVMe), either in a dedicated IP
storage network or in a hyperconverged environment, allow
network administrators to architect a flexible, robust network
that scales easily to align with storage expansion needs.
»» The hybrid cloud is becoming a common way for busi-
nesses to expand their data centers by providing additional
capacity for bursting, as well as by hosting applications that
can be easily housed off premises. This is often done by
extending a virtualized infrastructure into a cloud provider’s
environment. Certain fabric technologies can extend into a
cloud provider’s environment to enable a robust, flexible,
and scalable network that works seamlessly on and off
premises — with the ability to manage both through a single
pane of glass.
»» Data Center Interconnect (DCI) connects multiple data
centers together, as shown in Figure 2-1. With multiple data
centers it is critical to have active-active connectivity to ensure
business continuity. Ideally, if all data centers have fabric
networking implemented, and you have dark fiber intercon-
necting them, it’s simple to extend the fabric between sites.
However, in most cases, there is a wide area network (WAN)
network to interconnect the data centers. In this scenario, you
may have to insert a DCI solution. This allows sites to become
one logical data center that has applications and services
dispersed between or across locations. This can be done as
an overlay to the WAN infrastructure you have in place.
When you use a DCI, the technologies in play will most likely
encapsulate traffic across the WAN in Virtual Extensible Local
Area Network (VXLAN), for example. This requires support of
a larger maximum transmission unit (MTU) of 1600 bytes, so
ensure that your WAN and WAN provider will support this before
implementing your DCI.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
FIGURE 2-1: A data center interconnect.
Here are a few of the technologies that benefit greatly from the
implementation of fabric networking in the campus:
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
In addition to being able to easily extend connectivity for these
devices with little to no manual configuration, fabric network-
ing enables you to separate groups of IoT devices into their
own secure zones or network segments, isolating them from
the rest of the network far more easily than traditional VLAN,
firewall, or virtual routing and forwarding (VRF) segmentation.
»» Network segmentation: The increase in frequency and
sophistication of cyber-attacks, combined with new attack
vectors, such as IoT and cloud, requires reexamination of
network security. In fact, companies now assume there will
be a breach, and focus on minimizing the damage that can
occur as a result. Network segmentation ensures that if a
breach takes place, it is contained to where it occurred.
Fabric networking allows you to segment the network at
scale. Segments can be used to isolate IoT devices or groups
of users, and segregate critical or sensitive information to
assist with compliance and regulatory requirements.
Security professionals agree that network segmentation is a
must for modern networks. By segmenting your network,
you provide a greater degree of protection to your business’s
most valuable assets.
»» Integrated wired and wireless: In the era of BYOD, you
need to enable your workers to do their jobs while you also
keep the network secure. Fabric networks allow you to easily
segment your network and create a special segment for
untrusted devices, like personal cell phones and laptops, that
is completely isolated from the rest of the enterprise network.
Furthermore, some fabric technologies are designed to
extend to the wireless network to provide a more unified
wired and wireless network. This enables the unified and
dynamic attachment of users and devices to fabric services to
dramatically simplify management and operations.
»» IP multicast: Enterprise applications that rely on IP multicast
can be a challenge to network managers. Applications, such
as video streaming, IP television (IPTV), digital signage,
software distribution, and others, rely on IP multicast to
distribute traffic from a single source to multiple destinations.
The technologies required to make multicast work over a
traditional network are complicated, involving protocol
overlays that must be kept meticulously in sync. These
protocols are difficult to configure and troubleshoot,
reconvergence times can be slow, and scalability can often
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
be limited. Some fabric technologies excel in areas such as
multicast and dramatically simplify deployment by making it
easier to configure, faster to reconverge, and easier to scale.
»» IP video surveillance: IP video surveillance is an application
that is transitioning to IP multicast. The challenge is that IP
multicast was designed for applications like IPTV, where a
single source sends traffic to multiple destinations. IP video
surveillance, on the other hand, typically involves many
sources (IP cameras) sending traffic to just a few destina-
tions. Since IP multicast wasn’t specifically designed to
address this scenario, implementation can be even more
challenging.
The right fabric networking solution can support even
this very complex form of multicast, making the network
scalable, resilient, and far simpler to deploy and operate so
that a surveillance deployment works seamlessly.
»» Edge computing: Edge computing is a development on the
rise due to the growth of IoT and sensors. It is the migration
of compute to the edge of the network, away from central-
ized data centers, in order to reduce the distance that the
data must travel.
Fabric networking can deliver on the network being more
agile, reliable, and flexible for edge computing.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Understanding Shortest Path Bridging
(SPB)
»» Understanding IP fabrics
Chapter 3
Exploring Fabric
Networks
C
hapter 1 introduces the two main types of fabrics in the
industry today: Ethernet-based fabrics, normally built with
either Shortest Path Bridging (SPB) or Transparent
Interconnection of Lots of Links (TRILL), and IP-based fabrics,
normally built with Border Gateway Protocol (BGP) and Ethernet
Virtual Private Network (EVPN).
In this chapter, you learn about the key aspects of each of these
types of fabrics. After completing this chapter, you will under-
stand how these fabrics work, what the main values of them are,
and where they fit in the network.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IPv6, or multicast, are virtualized and decoupled from the physi-
cal infrastructure.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Understanding How SPB Works
This section introduces some of the key concepts that explain how
SPB works.
Packets are forwarded through the fabric using the backbone MAC
addresses. The user packet header is encapsulated. It is used only
for forwarding, and only at the fabric boundary.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
network are called L3 VSNs. The ease of extending VSNs across an
SPB network, the use of a single protocol, and the clear separation
of the services or VSNs from the underlying fabric infrastructure
ensure the simplicity and agility of the SPB solution.
At the source edge nodes of the network, Layer 3 VRFs are mapped
to I-SIDs, as shown in Figure 3-3. IS-IS then advertises the ser-
vice and IP routes only where the VRF IP routes are needed.
These routes are installed only on nodes that contain the same
I-SID. This is all done natively within the SPB fabric without
requiring any additional routing protocols.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
FIGURE 3-3: SPB Layer 3 service.
FIGURE 3-4: IP shortcuts.
Layer 3 VSNs and IP shortcuts support both IPv4 and IPv6 routing.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
shown in Figure 3-5. IS-IS then advertises the I-SID to the rest
of the fabric and forwards it only to nodes that register to receive
it through IGMP. If a node does not request the stream, it is not
forwarded, enabling far more efficient distribution of multicast
traffic than in a traditional network.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
egress of the network. Everything in between is “dark.” This inabil-
ity to discover the topology of the network makes it nearly impos-
sible for hackers to laterally move to sensitive areas of the network.
Dynamic Auto-Attach
Auto-Attach (IEEE draft P802.1Qcj) provides for automatic attach-
ment of users, devices, and virtual machines (VMs) to connect to SPB
services or I-SIDs. It uses extensions to the IEEE802.1AB Link Layer
Discovery Protocol (LLDP) to automatically attach network devices
to I-SIDs or VSNs in an SPB network. This auto-attach capabil-
ity can be deployed on endpoints, such as IP surveillance cameras;
wireless APs; and/or non-SPB-compliant access layer switches so
that seamless communication with the SPB fabric is possible.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Seamless extension of SPB
Fabric Extend is a feature that enables SPB to be extended over
third-party IP networks whether they are IP cores or service pro-
vider wide area networks (WANs). Any SPB service, whether it is
L2, L3, or multicast, can be seamlessly extended across the WAN or
across the IP core easily — without the WAN or IP core having vis-
ibility to those services.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Though multi-vendor interoperability tests have been done and
are publicly documented, not all implementations of SPB are
the same. This chapter provides a guide as to what the technol-
ogy is capable of; however, due diligence must be done to ensure
that the vendor you are working with supports a comprehensive
implementation of SPB.
Like SPB, TRILL allows you to take advantage of the simple con-
figuration that you get with an Ethernet network, but it uses a
link-state routing protocol (control plane) to avoid traditional
Ethernet-based flooding and learning. The link-state proto-
col determines the shortest available path to the destination and
routes packets accordingly. The most common link-state proto-
cols used with TRILL fabrics include IS-IS, Open Shortest Path
First (OSPF), and Fabric Shortest Path First (FSPF).
Understanding IP Fabrics
This section goes into the details of how the IP fabric is imple-
mented and how services are provisioned in and across the fabric.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
shown in Figure 3-6. Scaling this design out, the topology can
move into a five-stage Clos with the addition of a super-spine
that connects three-stage Clos points of delivery (PoDs). Moving
to a consistent architecture makes traffic flow across the network
predictable and much easier to troubleshoot.
One key aspect of the IP fabric is its use of BGP, which is a well-
known and well-understood technology. BGP forms the underlay
network for the fabric. This is how all switches and routers con-
nect with each other and share routing and topology informa-
tion. In the fabric, every leaf connects to every spine and forms a
BGP neighborship. The fabric uses equal-cost multi-path routing
(ECMP) to distribute traffic across all links, which provides the
bandwidth and resiliency required in the modern data center.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Deploying Services
Once the fabric infrastructure is in place, the next step is to ena-
ble services on the fabric to support connections from end devices
such as servers, storage, and appliances. The overlay is used to
extend services across the fabric. BGP/EVPN using VXLAN makes
this extension simple and easy, as shown in Figure 3-7. The default
gateway for every end device is at the leaf (top of rack) using a
static anycast gateway. When VLANs or VRFs need to extend beyond
the leaf, a VXLAN tunnel is used. Each leaf or leaf pair becomes a
VXLAN tunnel endpoint (VTEP). This arrangement allows the leaf
to encapsulate VLANs to VXLAN tunnels and do the reverse, taking
VXLAN tunnels and breaking out the VLANs. As per the standard,
the VTEPs use an auto-discovery mechanism to create tunnels
across the fabric, thus eliminating manual configuration.
Layer 2 VNI
VLANs entering the leaf from the edge device are mapped into
a VXLAN tunnel using a VNI. In most cases, it’s easy to map the
VLAN ID to the VNI ID without creating a complicated mapping
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
structure. The VLANs are placed into an EVPN instance on the
leaf and VXLAN tunnels are automatically created to all other leaf
switches in the fabric where that VLAN exists. You don’t need
an external controller or manual mapping of tunnels; it’s all
automatic.
Layer 3 VNI
When there is a need to extend VRFs between leaf switches,
a Layer 3 VNI is created. This is a dedicated VLAN with routing
enabled on it that is used as the “connector” between leaf switches
for that VRF. This allows VLANs within VRFs to communicate
across the fabric and eliminates the need for any additional rout-
ing protocol for this purpose.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Address Resolution Protocol (ARP) suppression is
accomplished by keeping ARP information in a suppres-
sion cache on each leaf, thus reducing the amount of
traffic across the fabric for end station discovery.
»» MAC/IP Learning is done via BGP/EVPN, which eliminates
nearly all flooding of traffic to find end stations. As soon as a
MAC is learned on the leaf, a routing update is sent to all leaf
switches telling each of them the MAC just learned and the
VTEP IP where that MAC is attached.
Every use case and need is different; therefore, picking the right
fabric for the right use case will vary. As IP fabrics continue to
gain momentum, their use will continue to diversify.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Enabling automation
»» Enhancing visibility
»» Improving security
Chapter 4
Examining Key
Considerations in Fabric
Technology Evaluations
I
f you think that fabric networking sounds like the coolest thing
in the world . . . you’re right. Your next step is to choose a solu-
tion that will meet your needs. As with any solution, you should
take certain key considerations into account. New infrastructure
is an investment after all, so you want to choose a solution that
meets your needs now but can grow with you as your business
needs evolve.
In this chapter, you learn about the key considerations that you
need to review with any fabric networking solution. These traits
far outweigh price and product feeds and speeds in the evaluation
process.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Enabling Automation
Automation is the new buzzword in information technology circles.
With all the manual processes that are done daily, it’s easy to see
why automation is so critical. It allows manual operational tasks
to be offloaded from the network administration team, leaving
network administrators to focus on strategic projects.
Network automation
Automating network tasks falls into two areas:
Once the fabric network has been built, it is time to build the net-
work services. Being able to leverage the power of automation is
where you can recognize significant time savings. Some fabric
technologies have embedded automation features and can estab-
lish network connectivity services on demand without relying on
any external controllers or management systems. An example
is the dynamic establishment of a guest Wi-Fi service as a per-
sonal iPad is detected through Institute of Electrical and Electron-
ics Engineers (IEEE) auto-attach features and on-boarded onto
the network.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
event or trigger. An example is the dynamic provisioning of top-
of-rack switch ports as a new virtual machine (VM) is turned up,
through integrations between the hypervisor and the network
environment.
Cross-domain automation
Cross-domain automation is a step forward from network auto-
mation because you are automating components from other IT
domains to complete the entire service chain. This process auto-
mation can include the provisioning of servers, storage, and net-
working, as well as network functions such as firewalls and load
balancers, as shown in Figure 4-1.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
This type of automation is important because most organizations
have silos of teams that need to work together in order to bring a
new application or service online. There is inherent delay because
of manual hand-offs between teams and the back-and-forth to
clarify what’s needed and when. Cross-domain automation sim-
plifies this process and ensures that teams are working in the
most efficient way possible.
Enhancing Visibility
The fabric solution you choose should allow for an in-depth view
of the network, its services, its applications, and its connected
users and devices.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
On-box visibility
On-box visibility is the ability to view traffic that traverses a partic-
ular fabric-enabled switch or router. Previously through features
such as Switched Port Analyzer (SPAN) or Remote SPAN (RSPAN),
a traffic sniffer or protocol analyzer would be plugged into the
switch or router, either locally in the case of SPAN, or remotely in
the case of RSPAN, for traffic on multiple virtual LANs (VLANs) or
ports to be analyzed.
Now, with many switches using x86 hardware, it is possible for the
traffic analyzer function to be run directly on the switch within a
guest VM. This approach reduces the mean time to repair. Another
big advantage is that multiple types of analysis tools can be run
on the VM. Examples include Wireshark, TCPDump, Splunk, and
PerfSONAR.
Network analytics
In addition to on-box visibility, having an end-to-end view of
the network, its services, its applications, and its connected users
and devices is essential. Seeing application and network response
time, top talkers, and top applications provide actionable insights
into the overall IT infrastructure. Having the right analytics data
can give you a better understanding of user behavior on the net-
work. It can also help with enhancing security by being able to
pinpoint unusual traffic and unauthorized applications.
In the campus, many IoT and security solutions are available that
should provide some level of integration with the fabric or its
associated management platform. These include IoT devices like
IP cameras, third-party switches, and security products like fire-
walls and access control systems. This capability enables the infra-
structure to be managed holistically, allowing the network to react
in real time to alerts received by third-party solutions. It is also
important for fabric-based switches to support traditional proto-
cols so that interoperability with existing networks is not an issue.
Improving Security
A fabric networking solution should make securing your network
simpler. Many methods of security are available including macro-
segmentation, micro-segmentation, hyper-segmentation, and
virtual routing and forwarding (VRF). All of these accomplish
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
the segmentation of traffic across the network to add levels of
security.
Integrating Wired/Wireless
You need a fabric solution that can work across wired or wireless
networks. For maximum simplicity, the solution should offer the
ability to converge the wired and wireless networks. Having these
tightly integrated provides a seamless user experience no matter
what device or devices your users attach to. It also significantly
eases the administration of the network by eliminating the need
to manage two disparate network environments.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Focusing on your pain points
Chapter 5
Choosing the Right
Fabric Solution for
Your Business
C
hapter 3 introduces the different fabric technologies and
the relative fit of each technology in the network. As that
chapter explains, Shortest Path Bridging (SPB) is well posi-
tioned for the campus or metropolitan area network (MAN) as
well as collapsed data center/campus cores, while Transparent
Interconnection of Lots of Links (TRILL) and now more signifi-
cantly IP fabrics are well positioned for the data center with
increased traction in the campus.
With the lines blurred between the different fabrics, where do you
start with the evaluation process?
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Here’s an overview of the top values for each technology:
»» SPB
• Faster time-to-service by eliminating core and aggrega-
tion node reconfiguration (provisioning at the edges only)
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
• Topologies supporting any VLAN, any port, any place
• Simplified convergence of IP storage
• Ecosystem integrations, VMs, storage, security
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
• Must provide on-box, application telemetry, and analytics
capabilities to provide visibility into the network, users,
traffic, and devices.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Exploring the breadth of solutions
Chapter 6
Ten Things to Know
About Fabric Solutions
from Extreme Networks
E
xtreme Networks delivers world-class fabric networking
solutions to organizations needing scalability, flexibility,
and ease of administration. Industry leading and differenti-
ating technology will help you transform the data center and
campus network into an infrastructure that operates at cloud
speed with efficiency and operational simplicity.
CHAPTER 6 Ten Things to Know About Fabric Solutions from Extreme Networks 41
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Single Pane of Glass
Extreme’s single operational model extends from the wired/
wireless edge to the data center and multi-cloud, providing
comprehensive management, policy, and analytics for fabric
networking solutions. All Extreme fabric solutions for the campus
and the data center use the same operational model with visibility
and policies consistent end to end.
Deployment History
With thousands of fabric deployments worldwide, Extreme Net-
works has the knowledge and experience to provide a solution
that will meet your needs today and in the future. Extreme has
deployed solutions that span sizes and segments of both service
provider and enterprise markets and have deployed fabric solu-
tions in the most demanding, highly sensitive, and highly secure
environments.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Innovation!
Extreme Networks holds more than 500 patents related to fab-
ric networking. In addition to developing many of the drafts
related to Shortest Path Bridging (SPB), the company continues
to invest in research and development to continually improve its
products and increase the functionality of its solutions. You can
view Extreme Networks’ patents at www.extremenetworks.com/
company/legal/patents/.
Ecosystem Integrations
Extreme Networks provides the networking foundation for your
business. This is more than just plumbing; it’s the enabler for
services and applications that the business runs on. Having the
CHAPTER 6 Ten Things to Know About Fabric Solutions from Extreme Networks 43
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
fabrics ready and able to integrate ecosystem partners is criti-
cal to success. By providing seamless integration with virtual
machine (VM) providers, storage solutions, security partners, and
IoT vendors, Extreme provides you with an integrated network
that can be managed holistically.
Unbreakable in Hack-a-thons
The secure fabric solutions from Extreme Networks have been
part of multiple private and public hack-a-thons. To date, not one
has been breached. This is because of the inherent security of the
solution with features such as hyper-segmentation, which iso-
lates your virtualized networks; stealth networking, which hides
your network’s topology from prying eyes; and service elasticity,
which allows your segmented network to extend and retract when
devices connect or disconnect.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
WILEY END USER LICENSE AGREEMENT
Go to www.wiley.com/go/eula to access Wiley’s ebook EULA.