Global events are driving network upgrades. Are you ready?

Page created by Ivan Ellis
 
CONTINUE READING
Global events are driving network upgrades. Are you ready?
Global events are driving network
upgrades. Are you ready?

eBook
Global events are driving network upgrades
Global events are driving network upgrades. Are you ready?
Contents
                Overview.........................................................................................................................................................................3

                Network bandwidth is nearing the saturation point......................................................................................4

                Explosion in IoT deployments.................................................................................................................................6

                Cybercrime is on the rise..........................................................................................................................................7

                Network management: Addressing complexity................................................................................................9

                Conclusion......................................................................................................................................................................10

eBook
Global events are driving network upgrades
Global events are driving network upgrades. Are you ready?
Overview
The world is experiencing an unprecedented increase in the number of users and devices
flooding the market. The enterprise WLAN market is projected to be worth 21.1 billion
USD by 2021 which represents a Compound Annual Growth Rate (CAGR) of 30.7% since
2016 when the market value was 5.53 billion USD1.
With Wi-Fi 6, also known as 802.11ax, set to become the primary wireless standard
within the next few years, high-density environments, such as public transportation,
hotels, malls, stadiums, auditoriums, classrooms, and other public venues will be
clamoring for bandwidth. One estimate projects a fourfold increase in the average
amount of throughput each person will use2.
To better understand how we got here and what network operators need to do to
address the exponential growth, this ebook explores the impacts of the following on
your network:

• How networks have come to the brink of saturation
• The explosion of IoT devices
• The rise of cybercrime
• How network security and management is becoming more complex

Now is the time for network operators to assess the pressure being put on their
infrastructure by the recent global health crisis, the exponential increase in users,
devices and demand for bandwidth, and take action to upgrade their networks to
address these extraordinary demands.

1 https://www.marketsandmarkets.com/Market-Reports/enterprise-wlan-market-45871744.html
2 https://www.techspot.com/article/1769-wi-fi-6-explained/

eBook
Global events are driving network upgrades                                                3
Global events are driving network upgrades. Are you ready?
Network bandwidth is nearing the saturation point
As additional high bandwidth devices are added to the network and          Reduced interference from neighboring networks: Wi-Fi 6 minimizes
enterprises shift to the cloud for remote based applications, there is a   conflicts and interference with neighboring networks and insures
pressing need for higher speeds and efficiencies to provide the            coexistence in highly dense deployments.
bandwidth to support latency-sensitive video and voice traffic, as
                                                                           Prolonged battery life for remote or hard to access devices: Wi-Fi 6
well as an increase in the number and density of clients. Network
                                                                           has an energy savings feature called Target Wake Time (TWT) which
operators need to prepare their networks today to deliver the
                                                                           reduces energy consumption for connective devices which prolongs
bandwidth that users will be clamoring for tomorrow.
                                                                           battery life and durability.

Wi-Fi 6: A catalyst for upgrade                                            High Power over Ethernet (PoE) outdoor access points with extended
                                                                           coverage areas: Small form-factor pluggable (SFP) connectivity for
Wi-Fi 6 is a high-density wireless solution that is driving the ongoing    outdoor access points lets you reach longer distances. A PoE port can
shift to end-user mobility and the increasing volumes of Wi-Fi-enabled     also be used to connect to other PoE devices such as video
Internet of Things (IoT) devices. As IT enterprises around the world       surveillance cameras. As well PoE can reduce additional costly cabling
assess whether they should upgrade to Wi-Fi 6 they need to consider        requirements.
the following benefits.
                                                                           The Alcatel-Lucent OmniAccess® Stellar AP 1300 series of access
Increased transfer and download speeds: Current benchmark tests            points supports all Wi-Fi 6 capabilities and delivers the required
show that Wi-Fi 6 is 40% faster than Wi-Fi 5 with transfer speeds of       Quality of Service (QoS) to more clients with more diverse usage
1,320Mbps and 1000% quicker on download speeds than the average            profiles. They deliver a more secure and faster mobile user
download speeds of 119Mbps.                                                experience, especially in high-density indoor and outdoor locations
Bandwidth to support dense populations and video streaming:                such as stadiums or arenas, metro stations, hospitals and large college
Wi-Fi 6 provides Multi-user MIMO (MU-MIMO) which allows multiple           campuses. OmniAccess Stellar APs also support a high power over
Wi-Fi devices to simultaneously receive multiple data streams. MU-         Ethernet (HPoE) port. The small form-factor pluggable (SFP)
MIMO can significantly increase the network throughput and is              connectivity for outdoor access points lets you reach longer
important for high density networks. With the recent pandemic,             distances. The HPoE port can also be used to connect to other PoE
enterprises are shifting to more virtual meetings, remote learning,        devices such as video surveillance cameras. As well PoE can reduce
and consulting activities which has led to an increase in network          additional costly cabling requirements.
bandwidth required for video applications.                                 OmniAccess Stellar access points are based on a distributed
Improved wireless coverage: Wi-Fi 6 is more spectrum efficient as it       intelligence architecture, eliminating the need for controllers, while
uses sub-carriers so multiple devices can use the same channel but         providing greater resiliency by automatically rerouting traffic to other
with different sub carriers.                                               APs when an AP goes down.

eBook
                                                                                                                                                  4
Global events are driving network upgrades
Global events are driving network upgrades. Are you ready?
Multi-gig switching: Solving the bandwidth dilemma
Infrastructure with a 1G bottleneck at the switch, or that requires fibre to
be run to enable higher bandwidth is inefficient and costly. Multi-gigabit
switching can help future proof your infrastructure.
2.5 Gig and 5 Gig switches that run on existing cables have the potential to
breathe new life into your wired infrastructure as you expand and move to
Wi-Fi 6. They also provide the ability to add in high-bandwidth IoT
capabilities which can help as IoT devices come online. Fortunately, many
of these IoT devices are designed to take advantage of multi-gig
infrastructures.
To ensure optimal efficiency Alcatel-Lucent Enterprise multi-gig switches
use Shortest Path Bridging (SPB) providing a complete picture of the
network to ensure that IP traffic takes the shortest path possible to reach
its destination. SPB capable nodes can calculate and use multiple available
paths and when required, they can dynamically adjust to changes, making
network virtualization easy — even in a multi-vendor enterprise
environment.
Known as “multi-path routing”, this technique offers built-in fault tolerance,
dynamic bandwidth allocation, and enhanced security. It uses all network
resources to reduce or even eliminate network bottlenecks. Redundant links
no longer sit idle and are available for utilization.

eBook
Global events are driving network upgrades                                       5
Global events are driving network upgrades. Are you ready?
Explosion in IoT deployments
Many industries are quickly adopting IoT devices as       occurs in one part of the virtual network it does
part of their everyday business operations. Retail,       not affect other devices or applications in other
healthcare, and manufacturing are all using the data      networks.
collected from devices to streamline their services
                                                         • Network security: In addition to IoT containment,
and business operations. The explosion in IoT
                                                           ALE networking technologies provide layered
deployments is taxing the network from a capacity,
                                                           security across multiple levels of the network.
operational and security perspective.
                                                           • User level profiles ensure users are
To address these demands and ensure expedient
                                                             authenticated and authorized with the
and secure IoT deployment, ALE network solutions
                                                             appropriate access rights
provide simplified provisioning, device classification
and visibility, and network security.                      • At the device level the network ensures that
                                                             devices are authenticated and compliant with
• Simplified provisioning: To ease provisioning and
                                                             established security rules
  reduce errors, all users, devices and applications
  within the ALE network are assigned profiles.            • At the application level the network can
  These profiles, which define roles, access                 establish rules regarding each application or
  authorizations, QoS levels and other policy                group of applications, including blocking,
  information, are relayed to all switches and access        limiting bandwidth and controlling who can
  points in the network.                                     access which applications

• Device classification and visibility: Devices are        • At the network level switches benefit from ALE
  placed in “virtual containers” using network               secure diversified code that protects networks
  virtualization techniques that allow multiple              from intrinsic vulnerabilities, code exploits,
  devices and networks to use the same physical              embedded malware and potential back doors
  infrastructure while remaining isolated from the           that could compromise switches, routers and
  rest of the network. When a new IoT device is              other mission-critical hardware
  connected, the network automatically recognizes        Additionally, ALE smart analytics use deep packet
  its profile and assigns the device to the              inspection and other technologies to detect the type
  appropriate virtual environment. Communication         of data and applications moving through the
  is limited to the devices within that virtual          network, making it possible to identify unusual
  environment and to the application in the data         network traffic patterns and unauthorized activity.
  center that controls these devices. By segregating
  the network with virtual containers, if a breach

eBook
                                                                                                               6
Global events are driving network upgrades
Cybercrime is on the rise
Network cyberattacks can be executed in a number of ways including                                                 or access point to intercept passwords, e-mails and other data
a Distributed Denial of Service (DDoS), worms, ransomware, and                                                     presumed to be encrypted, and in some cases, to inject ransomware
viruses, and the damages are expected to cost businesses $6 trillion                                               or other malicious content into a website that a client is visiting.
USD by the year 20213.                                                                                             Wi-Fi 5 offers WPA3 security, the first major Wi-Fi security
                                                                                                                   improvement in approximately 14 years, protects Wi-Fi networks
The reality of a data breach                                                                                       from KRACK attacks. The most significant additions to the new
                                                                                                                   security protocol are greater protection for simple passwords,
While data breaches are costlier to resolve in the United States, at an                                            individualized encryption for personal and open networks and even
average breach cost of $8.19 million USD, costs also vary                                                          more secure encryption for enterprise networks.
considerably between industry sectors. Notably, the highest data
breach resolution cost is in the healthcare industry, which typically
run an average of $429 USD per record. This is considerably higher                                                 Maximize WLAN security
than the cross-industry average of $150 USD per record. The lowest
                                                                                                                   ALE OmniAccess Stellar WLAN products support WPA3 on all access
costs were in the public sector, at $75 USD per record4.
                                                                                                                   points which provides a major benefit to customers who want to
Within the healthcare industry ransomware is on the rise as hackers                                                maximize security on the Wi-Fi 5 network without being required to
target Chief Medical Officers and Chief Financial Officers, as well as                                             upgrade to Wi-Fi 6. And, as mentioned previously ALE IoT
medical and Internet of Things (IoT) devices. Kentucky Methodist                                                   containment technology provides a cost effective implementation to
Hospital, Chino Valley Medical Center and Desert Valley Hospital,                                                  connect Wi-Fi devices securely and automatically. ALE also provides
California were all targets of ransomware attacks in 2016.                                                         dedicated scanning radios on all Wi-Fi 6 access points for intrusion
(Hollywood Presbyterian paid $17,000 USD in bitcoin to regain                                                      detection.
access to their network)5.

A KRACK in the code
One of the main entry points for cyberattacks is the wireless
network. A flaw in the WPA2 protocol can be used to steal sensitive
information such as credit card numbers, passwords, chat messages,
emails, photos, and much more. A Key Reinstallation Attack, also
known as KRACK allows attackers within range of vulnerable device

3 Cybercrime Magazine, Cybercrime damages $6 trillion by 2021, https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/
4 https://www.fiercehealthcare.com/tech/healthcare-data-breach-costs-average-6-45m-60-higher-than-other-industries-report
5 https://www.advisory.com/daily-briefing/2016/03/24/three-us-hospitals-hit-by-ransomware-attacks-on-same-day

eBook
Global events are driving network upgrades                                                                                                                                                7
Secure network equipment reduces
vulnerabilities
Today’s enterprises are aware of the need to secure IoT
devices on the network. However, they may not consider
devices that form the foundation of the network, such as
switches and access points. ALE employs many elements to
reduce the threat from these devices, including:
• Hardened OS to provide secure, diversified code
• Sending the OS for third-party verification and validation
  to ensure it has no easy entry points or backdoors
• Ensuring every time a switch is booted up the memory is
  compiled and brought up in a different manner. Although
  switches function identically, no two have the same
  memory configuration internally. If someone were to
  breach an ALE switch, they would be unable to access
  another switch the same way.
• Providing built-in Denial of Service (DoS) protection. The
  ALE CPU can detect unusual amounts of network traffic
  and automatically shut down the CPU if necessary.
• Complete multiple security certifications such as JDIC and
  FIPS
• Providing microservices architecture for example, critical
  software updates such as TLS, HTTPS and SSH without
  rebooting the switch ensuring continuous network
  operations

eBook
                                                           8
Global events are driving network upgrades
Network management: Addressing complexity
During the global health crisis remote working became necessary for many     type of connection; wired or wireless. iFab simplifies and secures how
companies. This required a remote access point for employees working         people, devices and objects connect, while delivering a performance
from home as well as a secure VPN to ensure security for company             level that is fine-tuned for individuals, groups, objects or assets.
sensitive data. As well, remote provisioning and monitoring of customer
                                                                             The ALE Autonomous Network technology allows enterprises to
networks became an essential requirement. Network Administrators were
                                                                             automatically provision the network to properly support services to
simply not allowed to enter buildings where their datacenters were
                                                                             provide value for business, regardless of the type of connectivity that
located. The ability to provide remote provisioning and monitoring meant
                                                                             is required. Every type of network service can easily be created and
there was no need to be on-premises and possibly spread a virus, and it
                                                                             deployed on the network.
eliminated costly travel expenses associated with going on-site.
                                                                             • A dedicated route can be setup from a data center application to a
                                                                               user or IoT device
ALE increases autonomy and decreases complexity
                                                                             • A high-speed connection can be provided on the fly for an
Most network operations are manually executed using the command line           unprecedented application resource requirement
interface. This can lead to human errors which can result in misconfigured   • A secure connection from an IoT device to its cloud application with
network devices, security risks, and outages. Because of this, businesses      dedicated encryption can be established from a user to a virtual machine
are transitioning to automation services that will complete these tasks
with fewer errors and time spent. Automation is a necessity for smooth       Zero-touch enrollment and deployment allows an IT administrator to
network operations. To speed business outcomes and mitigate the risk of      pre-configure the enterprise devices and automatically apply
human error, nearly a quarter of all infrastructure services will have       configuration policies. Pre-configured devices provision themselves out-
autonomous, self-managing capabilities by 20216.                             of-the-box, enabling IT administrators to streamline the device
                                                                             deployments with no requirement to individually provision each device
Fortunately, ALE Intelligent Fabric (iFab) technology automates the          as a configuration can automatically be set for devices purchased in bulk.
deployment of the network and makes moves, adds and changes
simple, reducing the time and effort it takes to maintain and operate a
network. It leverages Shortest Path Bridging (IEEE 802.1aq standard)          The Alcatel-Lucent OmniVista® 2500 Network Management System
which enables the infrastructure to use and maximize all the physical         (NMS) provides an on-premises network management application
network links and ensures an efficient and resilient architecture.            to simplify daily management operations and empower IT with
Network services are provisioned at the access layer leveraging               more visibility and better network control.
universal network profiles (UnP) to ensure that the right policies            Devices integrate a “call-home” function for zero-touch BYOD
(departmental and application access, security, performance and QoS           provisioning. Guest access and IoT containment capabilities are
parameters) are established for users and IoT devices. User, object and       natively embedded. Network management operations are
application policies are applied consistently, regardless of location and     simplified and optimized for improved IT productivity, and
6 https://www.networkcomputing.com/data-centers/6-hot-tech-trends-
                                                                              OmniVista integrated analytics enable faster business decisions.
willimpact-enterprise-2018/755072649

eBook
Global events are driving network upgrades                                                                                                         9
Conclusion
    As network bandwidth nears saturation operators need to ready
    their networks to deliver high-speed, efficient bandwidth to
    support latency-sensitive video and voice traffic, as well as the
    looming increase in the number and density of clients.
    The explosion of IoT devices across retail, healthcare and
    manufacturing, among others, are stressing the network in terms of
    capacity, operations and security. Simplified provisioning, device
    classification and visibility and network security can help ensure
    efficient and secure IoT deployment.
    The rise in cybercrime, including data breaches and ransomware,
    are a reality of our time. Today’s enterprises require a secure
    environment across all network levels to ensure users, devices, IoT
    and network components are not compromised.
    As networks increase in complexity, automation is essential for
    smooth operations, efficient business outcomes and the mitigation
    of human error. ALE automation can help simplify configuration,
    speed deployment, and reduce the margin for error.
    Global events have accelerated the need to focus on the evolution
    of networks and technology. As IoT device adoption increases, and
    businesses and employees move online, the need to deliver
    efficient Wi-Fi, ensure bandwidth availability, and provide secure,
    simple network management makes upgrading your network
    imperative.
    Learn more about ALE network solutions.

www.al-enterprise.com The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE. To view
other trademarks used by affiliated companies of ALE Holding, visit: www.al-enterprise.com/en/legal/trademarks-copy-
right. All other trademarks are the property of their respective owners. The information presented is subject to change
without notice. Neither ALE Holding nor any of its affiliates assumes any responsibility for inaccuracies contained herein.
© Copyright 2020 ALE International, ALE USA Inc. All rights reserved in all countries. DID20072302EN (October 2020)
                                                                                                                              10
You can also read