You are on page 1of 35

Building the infrastructure to enable the changing face of IT

february 2016 \ vol. 7 \ n0. 1

k e d i t o r’ s d e s k
k I NFOGRAPH I CS

So, About That Time I Data Mine


rode in a Dump Truck ...

k n et w o r k i n n o vat i o n awa r d
k i n t e g r at i o n g e n e r at i o n

Illumio: Adaptive What’s Next for


Security Platform Next-Gen Firewalls

k I n s i d e t h e b ox
k infographics

Can Containers Pulse


Simplify Networking? Check

k d r o p p e d pa c k et s
k t h e s u b n et

discovery Network Wireless Big Picture: Can Video


Not every switch cabinet supports a cubicle farm. Go behind LAN Outlook Conferencing Keep Kids
the scenes of four networks in surprising places. for 2016 in School?
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

editor’s desk | Jessica Scarpati

So, About That Time I Rode in a Dump Truck ...

As a journalist, I’m no stranger to doing my job NetFlow!”), featuring four profiles of networks in
Oh, the things in places most people have never seen up close. unexpected places.
Admittedly, those places tend to be pretty tame Also in this issue, we take a hard look at container
we do—and
in tech. In a past life, I took my pen and notebook networking (“Inside the Box: Can Containers Sim-
places we go— everywhere—from surgical operating rooms to a plify Networking?”). Are containers the new cloud?
to do what we greyhound-racing track to active crime scenes to the In terms of hype, most definitely—but don’t disre-
front seat of a garbage truck (guess which of those gard their comeback. We also dive into where in-
love. assignments started with an editor saying, “Hey, novation is happening in next-generation firewalls
you’re new here…”). (“Integration Generation: What’s Next for Next-
There’s something to be said for the fact that af- Gen Firewalls”), because after nearly 10 years, how
ter I got what I needed, I could retreat back to my much longer can we accept that standard features
clean, safe and totally unremarkable cubicle. It got are still being called next-generation?
me thinking lately about people in IT who work ev- And be sure to check out our new ongoing series,
ery day in unusual conditions—network engineers Dropped Packets. Like a sommelier for your brain,
in particular, because let’s face it: You’ll never see a we’ll present a rotating selection of opinion pieces,
software developer climbing on, crawling under or case studies, expert advice and more. n
tunneling through something to install cabling.
Which brings us to our cover story for this is- JESSICA SCARPATI
sue of Network Evolution (“Oh, the Places You’ll Features and E-zine Editor, Networking Media Group

2 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

Ω If you think you had a weird


Networks In Cool Places day at the office, check out
some of the crazy conditions
Oh, the Places these IT pros work in as we
You’ll NetFlow! explore four networks off the
beaten path.

Unlike servers or storage, networks often re-


quire engineers to leave the cozy confines of a data
center.
Even in standard brick-and-mortar enterprises,
network engineers are used to getting their hands
BY Jessica Scarpati dirty—whether that involves climbing a ladder to
mount an access point or snaking cable through a
crawl space. But what about the networks that don’t
support cubicle farms? We take you behind the
scenes with four IT organizations to find out what
it’s like to implement, maintain and manage net-
works in extraordinary environments.

3 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6 credit: Claire Heininger, PEO C3T/U.S. Army


networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

WILLIAMS FORMULA 1
circuit—often supplied with only a power feed—to
SPEEDS AND FEEDS house the cars, parts and technology supporting the
vehicles. Two of Williams’ IT pros follow the team
Susie Wolff,
a [former] development on the road, setting up Cisco wired and wireless
driver with Williams networking gear, plus two racks of Dell’s converged
Martini Racing, a
Formula 1 racing team, servers and storage, at a momentum that seems to
discusses data obtained rival the mechanics in the pit stop.
after a session at the
Circuit de Catalunya in The IT support staff typically has one-and-a-half
Barcelona in May 2015. to two days to set up the infrastructure, complete
CREDIT: Glenn Dunbar/
Williams
any software updates, run the cabling and test all
the equipment, according to Graeme Hackland, the
team’s IT director. They have only four to six hours
after the race to tear it down and pack it up carefully
enough to survive the drive or flight to the next race.
Technology plays a huge part in F1 racing. Cars
Very few things move faster on land than a For- are outfitted with 200 to 300 sensors transmit-
mula 1 race car, and perhaps even fewer IT depart- ting data via radio waves while they’re on the track,
ments can match the blink-or-you’ll-miss-it pace at Hackland explains. Once in the garage, the car con-
which an F1 team’s IT pros are required to operate. nects back to the IP network to transmit additional
Williams Martini Racing, a British F1 team and metrics. At the same time, auto engineers stay glued
constructor, will compete in Grand Prix circuits this to real-time data analytics applications to track the
year in 21 countries across the globe, including Abu car’s condition and performance.
Dhabi, Australia, Azerbaijan, Brazil, Canada, China, As a result, simplicity, reliability and resiliency
Italy, Japan, Monaco and Russia. Upon arrival, are the team’s biggest technology priorities, Hack-
each team gets access to an empty garage at the land says.

4 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

“Downtime just hurts the performance of the car. a premium, so heat can be an issue. We sometimes
If the engineers can’t see the data, they can’t make get very close to the upper [limit of ] operating tem-
aggressive calls and strategize. They can’t call the peratures of the equipment.”
car in at the right time. They can’t see what their When it comes to exploring emerging or poten-
competitors are doing or react to changes they are tially complex technologies, Hackland says Williams
making,” he says. “We’d rather have a slightly slower takes a very conservative approach for its network
network that’s reliable.” at the track.
The team’s network is made up of a 10 Gigabit “We’re very suspicious of things like spanning
Ethernet backbone supported by two core switches, tree and all of these protocols that you can use for
with 100 Mbps running in the access layer. Its wire- high availability, because they do tend to add com-
less network, built with Cisco’s Meraki gear, pro- plexity to the network. And when they go wrong,
vides Wi-Fi to the garage as well as any temporary it tends to be very difficult to diagnose,” Hackland
offices used by marketing staff. Cisco firewalls and says. “We can’t afford to have a degradation of per-
strong encryption keep competitors’ eyes away from formance because we’re trying to be too clever.”
the team’s data. And wherever Williams competes,
it always sets up a 100 Mbps MPLS link via British
Telecom to the team’s factory in England.
smm pogo
Another issue with races in desert or tropical cli-
all that glistens is not gold
mates is that the garages have no traditional cooling
systems, making it especially challenging to keep
systems running smoothly. The air plunges to 40 degrees below zero Fahr-
“It’s not a data center anyone would recognize,” enheit. Deadly 15-foot icicles crystalize on rooftops.
Hackland says. “In the hotter countries like Ma- The days are shrouded mostly in darkness. These
laysia, Iran and Abu Dhabi, we will put fans just to are just a few of the charms of interior Alaska’s pun-
move the air around. But in these garages, space is at ishing winters, and yet they are, more often than

5 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

not, the least of Dave Brown’s problems at work. drills burrowing as deep as 2,000 feet into the earth
Brown is an IT manager at the Pogo gold mine, to search for gold deposits.
a joint venture of Japanese companies Sumitomo Located on a side of a mountain—inside of which
Metal Mining Co. Ltd. and Sumitomo Corp., which is the mining and exploration work occurs—two cam-
located 38 miles northeast of Delta Junction—a city puses are separated by 500 feet of altitude. The
of about 1,000 residents and a region that’s home to lower camp functions primarily as a workspace and
almost half as many bison. Situated in a river valley, dormitory for contractors and the company’s geolo-
the underground mine operates year-round, with gists. Upper camp, located at 1,900 feet above sea
level, houses staff dormitories and dining areas, ad-
ministrative offices, a maintenance complex, ware-
houses, a mill and other facilities.
And while the climate certainly leads to chal-
lenges with deploying and maintaining network
Miners dig deeper
into an underground equipment, the mining operations pose the biggest
tunnel, searching
threat to network performance.
for gold deposits, at
the SMM Pogo mine “It’s a mine, so it’s dirty, dusty and filthy,” Brown
in interior Alaska.
explains. “You’ll open something up and it’s not just
CREDIT: Sumitomo metal
Mining pogo LLC
a little sheen of dust. It’s like, ‘I don’t even want to
breathe around this without a dust mask because
there’s so much dirt in this box.’”
Brown recently walked a new contractor through
his IT environment. Upon opening an equipment
cabinet, they found a switch blanketed in dust. Out
of curiosity, Brown took out a tape measure and
stuck it in the debris; the device was coated in eight

6 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

millimeters of dirt. Yet somewhat miraculously, it Tuesdays and Fridays.


was fully functional. Pogo employees live at the camp for several weeks
“My biggest concern with that one was: At what at a time. Most miners work shifts of four weeks on,
point is this going to overheat because it can’t get air two weeks off. As part of the IT department, Brown
through the vents? Fortunately, it was a vertically begins his two-weeks-on, one-week-off shift by
mounted switch, so it’s blowing air from the sides, leaving his home in Anchorage at 9 p.m. to catch an
and there’s not a lot of dust collecting in those,” hour-long flight to Fairbanks at 11 p.m. He waits at
Brown says. “It’s amazing just how reliable and de- the airport until 2:30 a.m. for a company-provided
pendable gear is; but at the same time, you have to motor coach, which shuttles him to his desk by 6
plan for this nasty environment and know stuff’s go- a.m.
ing to fail.” “Most people go, ‘Oh, you’ve got a dorm network?
Because the mine operates 24/7, reliability is Eh, whatever.’ But that’s important here,” Brown
Brown’s biggest priority. With no way to stop the says. “When you’re here a month at a time, the little
continuous onslaught of dust, creature comforts like wireless and TV go from
he attempts to mitigate its dam- ‘that’s nice’ to ‘that’s really important.’”
age by finding airtight cabinets The company’s wired network—which spans the
to store his infrastructure, us- dorms, administrative offices and mining opera-
“It’s amazing just how reliable ing toner vacuums to clean tions—primarily consists of HP Enterprise (HPE)
and de­pendable gear is; but at the dust and keeping an ample switches on a 1 Gbps backbone. Brown is also in the
the same time, you have to plan stockpile of spare parts on process of deploying 10 Gbps in his server room.
for this nasty environment and hand. It can often take a week His wireless network contains a mix of 802.11n and
know stuff’s going to fail.” for replacement parts to arrive 802.11ac access points from Aerohive Networks.
via FedEx, which passes the The sole connection to the outside world is a 40
—Dave Brown, IT manager, SMM Pogo
packages to a freight forwarder Mbps microwave link.
that delivers to the mine on While not as problematic as the dust, the winter’s

7 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

bitter cold and relentless snow affect how Brown ap-


U.S. ARMY
proaches his network.
networking around the
“I was on a phone call with Aerohive and asked
ebola CRISIS
them, ‘Your outdoor access point says it can go to
negative 40. How much colder can it go below that?’
It gets real quiet for a second, and the engineer says, At the time of the Ebola outbreak in 2014, Liberia,
‘Just how cold do you get there, anyway?’” Brown a country of 4.5 million people, reportedly only had
says. “I had to tell him that last winter alone, we saw 50 doctors working within its borders. What was left
at least six days where it was negative 50 degrees of its healthcare system, which had crumbled under
here.” years of civil war, was quickly overwhelmed by the
More often than not, however, Brown has found epidemic.
that network equipment is far sturdier than it is The country was among the hardest hit by the Eb-
validated for. He once had to attach an outdoor AP ola crisis in Western Africa, suffering the highest fa-
to the exterior of a Conex cargo tality rate—43%—and the second-highest number of
container used for cold storage. cases, according to the World Health Organization.
The AP and the cable running Liberia was the last country to be declared Ebola-
from it were insulated, but the free, cleared by the WHO this January.
“The engineer says, ‘Just how cold 10-port switch they were con- Within two weeks of the presidential order, the
do you get there, anyway?’ I had nected to sat uninsulated inside military was on the ground in Liberia.
to tell him that last winter alone, the container, which reached At the height of the crisis in September 2014, U.S.
we saw at least six days where it minus 20 degrees. The switch President Barack Obama ordered the military to
was rated to operate at 32 de- send nearly 3,000 troops to Liberia to help build
was negative 50 degrees here.”
grees Fahrenheit. treatment centers and support local efforts to curb
—Dave Brown, IT manager, SMM Pogo
Three years later, nothing in the epidemic. Immediately after the order was is-
that setup has failed. sued, members of the 101st Airborne Division at

8 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

connectivity during the mission. An Army signal


A soldier from
company also provided assistance.
the 101st Airborne Divi- “The President said ‘do it’ and people started
sion trains on a tactical
communications node
moving, so there wasn’t a long time to order any spe-
at Fort Campbell in cial-needs equipment. It was, ‘Do the mission with
March 2014. The divi-
sion implemented these
what you have at hand,’” says John Shotwell, an en-
nodes and other net- gineer who works for the U.S. Army’s Warfighter In-
work and mission-
command systems later
formation Network-Tactical (WIN-T) Increment 1,
that year to improve which establishes and manages the voice, video and
communications net-
works in West Africa
data networks used by soldiers in the field. WIN-T is
during the Ebola crisis. a program management office within PEO C3T that
credit: Claire Heininger, PEO provides fielding and technical assistance to mis-
C3T/U.S. Army
sions like the Ebola relief effort.
The sudden deployment didn’t leave much time
for designing and procuring new equipment for a
network. The unit wound up repurposing existing
Fort Campbell, a U.S. Army base that straddles the network devices to enable more robust connectivity
Kentucky-Tennessee border, were among the first and augment its standard tactical network for the
to spring into action. Providing material and engi- five-month-long mission, according to Matt Ian-
neering support to the unit was the Army’s Program nelli, a senior systems engineer in the PEO C3T’s
Executive Office (PEO) for Command, Control and Technical Management Division. Doing so also
Communications-Tactical (C3T), which is responsi- saved the Army the time and money, while also eas-
ble for building and fielding the Army’s tactical com- ing some of the burdens associated with distribut-
munications networks. It coordinated with soldiers ing network services, a major hurdle in the Ebola
on the ground in West Africa to provide network operations.

9 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

“There’s usually a progression of these kinds of of the unit itself—and we helped with some of the
activities. You go in and set up your quick-and-dirty engineering for the implementation of it—was to le-
communications to get your people situated and verage the Liberian telco commercial Internet and
establish necessary comms right off the bat. Then, tie that back into the Army global network,” Iannelli
as you’re there, you mature your network,” Iannelli says. “WIN-T provided the capability to distribute
says. “If the mission is a long-term one, usually it an unmanaged Internet connection through the tac-
matures toward a commercial or pseudo-commer- tical environment.”
cial environment, as the Army likes to put it. But “We encrypted and tunneled through that com-
in this case, it was not a terribly long-term engage- mercial network for Army unclassified networks,”
ment, so the initial comms remained in place for the adds Shotwell. “We never let them touch each
entire mission and were augmented.” other.”
Looking to free up bandwidth on the Army’s tac- Other challenges on the ground were more logis-
tical satellite-based network—and without enough tical than technical. When setting up line-of-sight
time to go through the typical communications links, the unit realized that there
Department of Defense pro- wasn’t enough space in many areas to safely con-
cess to procure fiber—the unit struct communications towers.
looked for fast and inexpensive “In some of those locations, they just didn’t have
“We encrypted and tunneled
ways to offload some of the un- the acreage to support an implementation like that,
through that commercial
classified communications. It so the unit actually had to negotiate with the gov-
network for Army unclassified
found the answer in an unlikely ernment and some of the commercial entities in
networks. We never let them place for the military: the com- Liberia to leverage tower space on an existing com-
touch each other.” mercial Internet. mercial tower,” Iannelli says. “[It’s different from]
—Matt Iannelli, senior systems “One of the novel things that an environment that’s not just a wild, open, typical
engineer, PEO C3T, U.S. Army
was done for this exercise that battle environment—where you kind of have carte
was primarily the brainchild blanche to do what you want.”

10 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

“Like a bank or insurance company, it’s very


chitale dairy
critical we have 24-by-7 operations,” says Vishwas
KEEP THAT NETWORK
Chitale, who serves as director of the 75-year-old
Nearly 100 cows MOO-VING ALONG
are housed at Chitale company started by his grandfather in Bhilawadi,
Dairy’s processing plant
in Bhilawadi, India.
Maharashtra.
The cows, including this “It’s not the like the West where you have UHT
Holstein Friesians breed,
[ultra-high-temperature pasteurized] products and
belong to local dairy
farmers who act as buy milk once a week,” Chitale explains. “In coun-
Chitale’s suppliers and
tries like India, being a tropical country, customers
use the company’s
cloud-based systems want fresh milk every day, so it’s of paramount im-
to monitor their health
portance that we supply it to them every day.”
and milk output.
Twice a day, farmers deliver milk to the compa-
CREDIT: Chitale Dairy
ny’s 100 collection centers. There, it’s analyzed for
quality before being transported to a factory, where
liquid milk and other dairy products are packaged,
then shipped out to distribution centers.
Technology has always been a large part of the
company culture, with farmers now able to log into
a system in Chitale’s private cloud to track animal
health, milk yield and breeding activities. All indus-
trial controls in the company’s various facilities are
Cows don’t work standard office hours—which is network-connected, from the doors on the factory
why the milk collection, processing and distribution docks to temperature sensors in the plants.
operations at Chitale Dairy in central India can’t As a result, reliability and speed are the top prior-
ever stop. ities for the network, but until recently, the network

11 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

infrastructure struggled to keep up with the more bare-metal switches with Cumulus Networks’ soft-
advanced applications on the front end, Chitale ware into their network, and they are evaluating
says. The company recently upgraded its data center VMware’s NSX network virtualization platform.
using Dell Networking infrastructure, opting for 10 “We are not afraid of using new technology,” Chi-
Gigabit Ethernet top-of-rack switches, including the tale says. “My feeling is that many times people
S55, S4810 and M8024-K series. The company also don’t invest in backend networking, and you have
uses Dell storage. a lot of issues. What we have learned is if we do not
Almost everything that can be virtualized is virtu- build robust, cost-effective networking solutions,
alized, including routers and firewalls, Chitale says. we can’t really progress. Because if you can’t deliver
He and his IT team are working on incorporating that compute to end users, what is the point?” n

12 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

Data Mine
k Missed
connections
Do you think your IT department
The median headcount of an is aware of all connected
IT department in 2015. devices, including Internet
of Things endoints on your
Source: “2015 Annual Salary and Careers Survey,” TechTarget, October 2015, N=845
network?

35%
YES
k How will your network look by 2017? n  campus networks
n  WAN
n  DATA CENTER NETWORKS

50%
50%

34% 36
40% %

29% 31
%
30%
20% 49%
20% NO
10% 10% 12
% 12
%
10%
10% 6 %
6 %
1% 2%
0

Entirely SDN Mostly SDN Equal parts SDN Mostly Entirely 15%
and traditional traditional traditional UNSURE
networking networking networking

Source: “2015 State of the WAN Report,” Ashton, Metzler & ASSOCIATES and Webtorials, June 2015, N=117 Source: “2015 IT Risk/Reward Barometer:
Global Results,” ISACA, October 2015, N=7,000
background art: vectorstock

13 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

Ω What’s old is new again: Linux


Containers containers are back in a big way,
but it’s not just developers who
Inside the Box: should get excited. Containers
Can Containers could bring big changes to net-
works, too.
Simplify
Networking? It’s nearly impossible to go to any technology
conference and not hear the words Docker contain-
ers at least once. Containers were an old and decid-
edly niche technology until Docker emerged with a
new use case and changed the game, helping usher
BY Sean M. Kerner in a new era of DevOps by enabling developers to
rapidly package and deploy applications.
Docker’s open source project isn’t the only con-
tainer technology, but it is helping to catalyze the
overall container movement as different vendors
and end-user organizations all try to benefit from
the advantages of containers.
And while adoption of container technology to

14 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6 credit: StudioM1/iStock


networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

date has largely been driven by developers, the First, explains Philips, containers come and go more
popularity and production-scale deployments of rapidly than VMs, so the network needs to be de-
containers is driving increasingly sophisticated net- signed around this reality. Second, people are going
working needs. Containers offer myriad opportuni- to run many more containers than they would VMs,
ties for network engineers to actually help simplify so the amount of address space that a container en-
complex networking challenges. vironment may consume is likely to be larger.
Eric Hanselman, a chief analyst at 451 Research, With a VM, an operating system is typically de-
has been looking at containers and how they con- ployed as part of the VM application image, whereas
trast with other forms of virtualization, most nota- the container model relies on the host system for
bly virtual machines (VMs). operating system features. By not needing its own
“Container networking functionality is far sim- operating system as part of an application image, a
pler than what’s available in more mature virtual container application image can be smaller; mean-
environments,” Hanselman says. “While that may while, the corresponding density of a container de-
be helpful in working at con- ployment can be higher than an environment based
tainers’ greater scale, it means on VMs. It is worth noting that containers and VMs
that more work has to be done are not mutually exclusive technologies, either. In
to layer any sophistication into fact, it’s often a recommended best practice that
People are going to run many the environment.” containers run inside of a VM.
more containers than they In bare-metal and physical
would VMs, so the amount of environments, container net-
address space that a container working is similar to VMware GAPS AND POSSIBILITIES
en­vironment may consume networking—with two devia- Within the container, an IP interface is the only
is likely to be larger. tions, according to Brandon item of concern to the developer, Hanselman ex-
Philips, CTO of CoreOS Inc., plains. But to add resilience or multi-tenancy to
a container platform vendor. containers, particularly Docker’s, much more than

15 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

the native networking functionality is needed. has opened up an opportunity for third parties to
“Automating the networking configurations of fill the gap with open source projects for container
large numbers of containers is critical to tackling networking, such as Weaveworks’ Weave Net and
more complicated application architectures,” Han- CoreOS’ Flannel.
selman says. Docker’s core networking technology, libnetwork,
It’s an area where more work is needed, which was first announced alongside the Docker 1.7 release
last June and was integrated into the mainline proj-
ect as a stable technology with the Docker 1.9 re-
lease last November.
Containers vs. virtual machines: The basics Chen Chun, a software engineer at Tencent—an
online gaming, social networking and entertain-
CONTAINERS VIRTUAL MACHINES ment giant based in Shenzhen, China—is both a user
Where and a contributor to Docker. In particular, Chun has
Operating system (OS) Server hardware
contributed multiple code commits to libnetwork.
virtualization
occurs
Chun explains that Tencent, a company best known
Application from OS OS from hardware
for its QQ instant messaging app and WeChat mo-
What it abstracts

Guests share the same OS bile chat service, uses the overlay network provided
Each guest has its own OS
Guest environment kernel and sometimes BIN/
kernel and BIN/libraries by libnetwork to deliver connectivity to multi-host
libraries
apps. Additionally, Tencent is using Docker’s built-
Allows more guests, as Density of guests typically in bridge networking capabilities.
Density containers do not reserve limited to fixed memory
memory assigned to them allotments “A bridge network allows us to allocate an unused
host-port-mapping into a container’s port,” Chun
Typical boot time Seconds Minutes
says. “That helps us to launch multiple online job in-
Source: Various
stances on the same host.”
Bridging, however, is not without limitations.

16 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

Chun says that bridged networks solve port-conflict “The good news is the overlay network brings us
problems and provide network isolation to contain- unlimited IPs,” Chun says.
ers running on one host. That said, with bridging The IT team at Tencent realized a number of ap-
alone, the container’s IP address is not visible from plications can work in an isolated network without
outside of the host. external connectivity, he adds. For example, some
“This brings inconvenience, as many Web server test apps only need a connection to a shared data-
programs register IP addresses and ports into a ser- base. Overlay networking makes it the perfect solu-
vice discovery layer,” Chun says. “So we developed tion to these scenarios; an isolated overlay network
a static IP Docker network plugin to give each con- offers a private IP range to connected endpoints.
tainer an IP address, which is routable.”
Tencent is able to ping and get a Secure Shell
(SSH) into its Docker containers with a static IP THE ROLE OF MICRO-SERVICES
address from any internal machine, thanks to lib- A term that often comes up when discussing con-
network, which is what made the network plugin tainers is micro-services. The basic idea behind
possible. The network plug- micro-services is that instead of having a monolithic
in offers a scalable approach application stack, each specific service in an appli-
to customized container cation delivery chain is broken out into individual
networking. parts.
“When using containers, people There is another key net- “When using containers, people are making a
are making a conscious effort to working challenge that Docker conscious effort to break their infrastructure down
break their infrastructure down libnetwork is able to help Ten- into more understandable units,” says CoreOS’ Phil-
into more understandable units.” cent address to simplify its ips. “I think that opens an opportunity for network-
operations: limited IP address ing technologies to make decisions on behalf of the
—Brandon Philips, CoreOS
resources when using a static user that they couldn’t make before when we were
IP network. in a [virtual] machine-focused world.”

17 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

One potential use case that Philips sees revolves in IT, including AT&T, Cisco, eBay, Fujitsu, Google,
around Kubernetes, an open source container- Huawei, IBM, Intel, Twitter and VMware.
orchestration technology built by Google but now If an administrator dedicates 500 Mbps to a par-
managed by the Cloud Native Computing Founda- ticular application running on Kubernetes, Philips
tion (CNCF). The foundation itself operates as a explains, then the networking control plane can be
Linux Foundation Collaborative project. The CNCF involved in the scheduling of this application to find
enjoys the support of many of the leading names the best place to guarantee that bandwidth. Or, by
working with the Kubernetes API, a network con-
trol plane can start making ingress firewall rules
that are aware of the container applications. These
Boxed in: Top container concerns are all near-term scenarios that can help make con-
What are the biggest challenges in moving to a containerized infrastructure?
tainer networking easier to deploy and use, Philips
contends.
60%
56%
50%
50%
46%
40%
30% DEFINING SHARED INTERFACES
A lot of organizations are using network address
30%
translation (NAT) with overlays on the backend to
give containers public IP addresses, Philips says.
20%

10%
10% “Over time, as people move more of their stacks
0% over to containers, they will want to move to a NAT-
Technology Orchestration Monitoring Automation Environment free solution for simplicity, visibility and speed,” he
maturity size
says.
Source: “State of Containers and the Docker Ecosystem 2015,” O’Reilly Media Inc., September 2015, N=138. Among the NAT-free approaches is a standard
Respondents could select multiple answers.
container networking interface (CNI), which is set

18 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

to become part of the CNCF. existing systems, according to Philips. Starting with
“CNI is about enabling network vendors to in- Docker 1.9 in November, multi-host networking
tegrate their control plane into the container eco- is now supported in the Docker Engine itself. This
system,” Philips says. “It is minimal and was built means that the Docker Engine directly competes
alongside a number of network vendor engineers.” with the functionality implemented in Flannel.
Philips’ hope is that having a shared interface will The container space is evolving rapidly, and as
encourage an ecosystem of networking hardware and development and deployments continue, it’s likely
applications to integrate with Kubernetes, Rocket/ there will be improvements in container network-
rkt and any other container tool that adopts a CNI. ing. For users like Tencent’s Chun, Docker container
“For the container ecosystem to continue to be networking is already helping reduce network
successful, we need to define and foster these shared complexity.
interfaces to plug in storage and networking be- Some, however, still see a set of latent complexi-
cause enterprises will continue to want to leverage ties for networking large container deployments.
their existing systems,” Philips says. “And I think the “Work around intent-based network configura-
CNCF is well positioned and well organized to help tions can help to tame this problem,” say 451 Re-
in those efforts.” search’s Hanselman. “We’ve already seen what’s
Among the networking options that can plug into happening with pass-through labels in Kubernetes
a CNI is CoreOS’ open source project Flannel, which and this is very promising. The challenge is align-
was originally introduced to help onboard users ing the different efforts that are taking place, so that
to containers and Kubernetes. Flannel is a simple, we can get to at least a small number of networking
composable component that can be integrated into models with containers.” n

19 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

Pulse Check
k The best and worst of Web conferencing: Small businesses
How frequently do you use the various features in webinars or webcasts? k IPv6 adoption:
Around the world
in 128 bits
Percentage of Internet traffic
DAILY QUARTERLY over IPv6
USE
26+50G 28+
24+50G 22+50G OR NEVER

37+50G 16+
35+50G 34+50G
18% 35%
Email Real-time
United States Belgium
scheduling polling
24+26+

13+15+
File “Raise hand”
sharing button

Calendar Annotation
scheduling tools

Source: “Top Web Conferencing Functionality for Small-Business Users: IndustryView | 2015,” Software Advice, June 2015,
N=148 end users at businesses with 50 or fewer employees

17%
Germany
17%

48
Peru 20%
Percentage of networking pros who received an Switzerland
average 6.3% raise in their base salary last year.
Source: “2015 Annual Salary and Careers Survey,” TechTarget,
October 2015, N=122
Source: “State of the Internet, Q3 2015,”
Akamai, December 2015
globe art: vectorstock

20 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

Ω No network is an island unto


NGFW itself anymore, prompting ven-
dors to put the next-generation
Integration firewall at the focal point of an
Generation: enterprise security approach
that now also integrates with
What’s Next cloud-based threat analysis and
for Next-Gen endpoint management.

Firewalls Some tech buzzwords just won’t go away. De-


spite their forward-looking moniker, next-genera-
BY Steve Zurier tion firewalls have been around for at least a decade,
debuting with revolutionary capabilities like state-
ful packet filtering, user identity aware controls,
intrusion detection/prevention and application
visibility/control.
Integrating all those features into one product
was important, but the application control was
a major step forward because, for the first time,

21 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6 credit: fresh/iStock


networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

firewalls could detect and block Web application Dugger manages roughly 1,700 users across two
traffic traversing through an enterprise network. West Coast data centers and five corporate sites.
Those early next-generation firewalls (NGFWs) The company deployed Cisco’s ASA 5585-X SSP-60
were built for a different era. Eight to 10 years ago, firewalls and its ASA 5585-X SSP-10 firewalls with
companies still relied largely on building a perim- FirePower module. Last year, Cisco integrated its
eter around the network to block malware. Sourcefire intrusion prevention system into its
Chris Rodriguez, a senior industry analyst at legacy ASA firewalls, a product the vendor now calls
Frost & Sullivan, covers the NGFW market and con- ASA with FirePower Services.
tends that isn’t a comprehensive strategy anymore. At Beachbody, the SSP-60s are clustered in the
“A firewall is just one of many sensors companies data center core and there are two per data center,
can put out there today,” he says. “A firewall is not while the SSP-10s reside at the edge of each data
an end-all and be-all. It has to work in tandem with center.
endpoint management and threat analysis. That’s “At the time we were looking for a firewall plat-
where big data and security an- form, we had just implemented new Cisco-driven
alytics become important.” data centers, and Cisco was one of the only vendors
William Dugger, a senior offering the clustering capability, plus their cluster
manager of network engineer- fit into our design,” Dugger explains. “With cluster-
“A firewall is not an end-all ing at fitness company Beach- ing, I can spread the load across the different fire-
and be-all. It has to work in body LLC, based in Santa walls and each firewall is aware of what the other
tandem with endpoint manage- Monica, Calif., says security is doing. Cisco’s architecture put us in a position to
ment and threat analysis.” takes a high priority at his com- take advantage of the next-generation security ca-
pany because it needs to run pabilities coming down the pike.”
—Chris Rodriguez, senior industry
analyst, Frost & Sullivan secure online transactions, pro- For example, the ASA now comes with an inte-
tect partners and secure Agile grated Cisco Sourcefire option, which does URL fil-
development environments. tering and advanced malware mitigation. The ASAs

22 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

also integrate with Cisco’s Identity Service Engine, detects malicious apps on iOS and Android devices,
the vendor’s secure access control system. builds the same threat detection and prevention
“We’re also prepared for any other new innova- capabilities for mobile devices as it builds into its
tions, such as SSL decryption and enhanced applica- NGFWs.
tion awareness,” Dugger adds. Meyer agrees that while NGFWs are still relevant,
how they integrate with other threat detection and
endpoint management capabilities makes all the
NEXT-GENERATION THREAT PREVENTION difference. The company’s SandBlast Zero-Day
Today, companies run networks in physical and Protection software—which integrates with its fire-
virtual environments, and data runs over the cloud. walls—detects and remediates zero-day attacks and
Employees are also more mobile, so the concept of advanced persistent threats at the CPU level, or the
building a moat around the perimeter doesn’t work exploit phase, before malware authors can employ
anymore. Employees work all over the world, so evasion techniques.
they are well beyond the reach of the conventional Traditional sandboxes are vulnerable because the
firewalls in the data center. writers of malware code have gotten very sophisti-
“Networks are consistently changing at the speed cated, according to Meyer. New malware now looks
of technology innovation,” says Samantha Madrid, for a human element or heartbeat before it wakes up
head of network security product marketing at Palo and starts running its code.
Alto Networks. “It’s critical that your security keeps “Without CPU-level inspection, traditional sand-
up so there are no gaps in protection.” boxing solutions are ineffective at identifying and
Mobile malware has come into its own and be- preventing infections because of the sophistication
come an area of increased attention, according to of emerging malware,” Meyer says. “We want to de-
Don Meyer, head of data center product marketing tect and prevent malware from ever reaching the
at Check Point Software Technologies. The com- network.”
pany’s Mobile Threat Prevention platform, which While companies still need firewalls in the data

23 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

center that can inspect, detect and discard infected types of firewalls they select support all the major
applications, Palo Alto’s Madrid contends that what software-defined networking environments and
organizations really require now is a security plat- also work well in public cloud environments such as
form that integrates NGFW capabilities with cloud- Amazon Web Services (AWS) and Microsoft Azure.
based threat analysis and endpoint management. Check Point’s firewalls support VMware’s NSX
Palo Alto’s approach is a triad that consists of platform and OpenStack, as well as public cloud en-
Palo Alto’s PA and VM vironments; the company is looking into integrat-
Series firewalls; Wild- ing with Cisco’s Application Centric Infrastructure,
Fired up over Fire, a cloud-based threat Meyer says. Palo Alto’s can run in AWS and are man-
next-gen firewalls? analysis engine; and aged through Panorama, the firewall vendor’s man-
What type of firewall do you plan to Traps, an endpoint se- agement platform.
purchase in the next 12 months? curity product. All work “The automation and integration are what’s re-
together to protect the ally key here,” Madrid says. “And from a firewall
81% enterprise network. For perspective, companies need to be sure their fire-
example, when a company walls can run in both private and public cloud
subscribed to WildFire environments.”
gets hit with malware, it
31% alerts the network of Palo
Alto users worldwide. TAKING A BROADER APPROACH
Firewalls and endpoints There’s too much hype in the industry about what
throughout the WildFire can be predicted and the levels of protection offered,
Traditional Application-
network firewall aware firewall network are automati- argues John Maddison, vice president of products
cally updated. and solutions at Fortinet.
Source: Network security buyers survey,
TechTarget, December 2015, N=822. Respondents
could select multiple answers.
IT staff members also “Our approach is to look at the enterprise net-
want to make sure the work as a whole and deploy the firewall based on

24 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

where it best fits in the network,” he says. Cisco Systems. Rather, they need to offer contex-
Fortinet takes a single-policy approach that’s tual awareness about potential infections—not only
transmitted to all the security devices across the alerting the IT staff that they are seeing threats, but
network. The company advises customers to deploy also telling them whether those threats are harmful.
midrange edge firewalls at the campus edge; unified “The industry has been good at protecting known
threat management devices in branch offices; inter- threats. What’s needed today are products that can
nal segmentation firewalls that separate the traffic identify unknown threats,” Stuart says.
by user or application; data center firewalls in a cen- Cisco’s ASA with FirePower Services contains
tral facility; cloud firewalls at Amazon Web Services three distinct automation features, according to
or Microsoft Azure; and carrier-class firewalls at In- Stuart. First, the system monitors threats as they
ternet service providers. come into the network, assigns a response priority,
“Ten years ago, we deployed firewalls at the moves them to quarantine and remediates them.
branch and at the main data center,” Maddison says. Then once the malware gets detected and remedi-
“There are now many more configurations that IT ated, the system automatically creates new signa-
people have to concern them- tures so that in the future the detected malware can
selves with. Today, we’re try- be quarantined or blacklisted. Lastly, the manage-

51%
ing to get people to think in ment software can make correlations on seemingly
terms of an enterprise-wide unconnected examples of malware, across both the
approach to firewalling.” network and endpoints, and then quarantine them
Firewalls can’t be treated in the future.
of IT pros who have deployed next- as just a checkbox item on Cisco’s endpoint security software, known as Ad-
generation firewalls say their goal is to
a long list of infrastructure vanced Malware Protection, or AMP, is designed to
defend against advanced threats.
Source: network security buyers survey,
purchases, says Dave Stuart, sandbox, analyze and remediate suspected malware,
TechTarget, DECember 2015, N=309
director of product market- Stuart says. It alerts IT to how far malware has made
ing for network security at it into the network.

25 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

“People need to understand that classic, state- complicated, so it follows that securing them takes
ful firewalls are still useful,” Stuart says. “But now more work. While industry analysts still review
companies can get all that functionality in one these types of firewalls as a discrete category, any
appliance.” enterprise evaluating a NGFW without cloud-based
NGFWs and antivirus software at the end- threat analytics and an endpoint strategy needs to
point don’t cut it anymore. Today’s networks are dig a bit deeper. n

26 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

Network Innovation Award


Illumio: Adaptive Security Platform 
k W H AT I T I S  HY WE LIKE IT
kW
A security software platform that detects abnormal behavior The perimeter isn’t dead, but it sure could use some backup. Il-
in data center networks and server workloads. It quarantines lumio introduces context-aware security without the complexity,
suspicious traffic before it can contaminate other resources meaning “dynamic” and “secure” no longer have to be mutually
in real time.  exclusive.  

k H OW I T W O R K S
Acceptable behavior is defined or
discovered, and policies are en-
forced using a whitelist model. No
changes to the network are re-
quired, making the platform ideal
for public and hybrid clouds. 

k C O O L F E AT U R E S
Policies can dictate what access is
allowed among virtual machines or
even among processes within one
VM. Vendor partnerships mean the
software also plays nice with prod-
ucts like F5’s BIG-IP appliance and
Docker containers. 

To learn more about why Illumio’s Adaptive Security Platform is our latest Network Innovation Award winner,
read the whole story on SearchNetworking.

27 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

DROPPED PACKETS | OPINION | CRAIG MATHIAS

Wireless LAN Outlook for 2016

Innovation remains especially alive and While not all of these capabilities were available
Welcome to the well in the world of Wi-Fi. Here’s a look at some of at the end of 2015, expected improvements in radio
the most important trends to watch in the world architecture, design, firmware, antennas and man-
future. There’s
of wireless LANs this year. agement software mean Wave 2 will rapidly become
lots of bandwidth the new baseline in 2016 technology trends.
to go around.
802.11ac WAVE 2 HERE AT LAST
The second iteration of products based on 802.11ac, ANALYTICS NO LONGER OPTIONAL
known as Wave 2, is usually defined as having at Analytics is a set of techniques often associated with
least one of the following characteristics: big data that’s applied when you don’t know what
you’re looking for. In the case of wireless LAN, tons
n Support for more than three multiple input/ of data relating to performance optimization, secu-
multiple output (MIMO) streams. To date, two or rity, application usage and more can be captured,
three have been common, and the standard desig- but making use of this mountain of bits requires the
nates up to eight; right tools. These will become a core requirement
n Channel bandwidths of up to 160 MHz; and in 2016.
n Support for multi-user MIMO, which enables an Going forward, exploiting the value within the
access point (AP) to beam distinct transmissions trove of captured information will enable manage-
to multiple clients per transmit cycle. ment systems to automatically optimize wireless

28 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6 credit; roccomontoya/iStock


networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

performance and drive the evolution of software- and fault tolerance. All you’ll need locally are APs,
defined networking. a few Power over Ethernet switches and a router.

GOOD-BYE, 1 GBPS LINK AGGREGATION ... 802.11ad/WiGig ARRIVES


Thanks to Wave 2 of 802.11ac, 1 Gigabit Ethernet is Misconceptions surrounding the 60 GHz world of
on the way out. The core debate is whether today’s 802.11ad, what the Wi-Fi Alliance calls WiGig, will
link aggregation—to 2 Gbps—will be replaced by the finally be put to bed with a good number of produc-
2.5/5 Gbps products now coming on the market, tion deployments in 2016. Prepare to be amazed
or whether the next big upgrade will be to 10 Gbps, with multi-gigabit throughput and surprising
which will eventually be required. Regardless, the rate-versus-range performance in open-office and
days of the 1 Gbps port and switch are coming to a closed-room settings. Just as many naysayers used
close. to think that the 5 GHz spectrum didn’t have the
range required, and a similar air of skepticism per-
vades with 60 GHz today. Myths die hard, but ben-
... HELLO, MANAGEMENT IN THE CLOUD efits can last a very long time, indeed.
Putting network management in the cloud now
makes more sense than ever, given falling costs, im-
proved reliability, universal access and the ability WI-FI DOMINATES IoT
to run an entire global operation from a The Internet of Things (IoT) may just be a conve-
handset while waiting for lunch. Expect nient term for machine-to-machine and telemetry
Check out other even more network functionality to mi- services based on IP, but it’s going to be huge none-
wireless trends to grate into the cloud as well, thanks to theless. Wi-Fi is going to be the wireless link of
watch in 2016 on
SearchNetworking. software-defined networking, network- choice in many—if not most—commercial and con-
ing as a service, and improved reliability sumer applications. Products and components with

29 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

the required form factor, price, performance, bat- SSID and enter a passphrase” method is about to
tery life and cost profiles are already on the market. become obsolete, as the Wi-Fi Alliance’s Passpoint
The ability to leverage existing infrastructures truly makes connecting to a Wi-Fi network the zero-
seals the deal. click affair common on cellular systems.
In addition, the pre-association service discovery
of Wi-Fi Aware will add new convenience and shift
PASSPOINT AND Wi-Fi AWARE the way many look at Wi-Fi—from “connect and
SIMPLIFY OUR LIVES search” to “don’t connect, but receive valuable in-
Connecting to Wi-Fi networks via the “click an formation anyway.” n

30 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

the subnet | Q&A | Jessica Scarpati

Big Picture: Can Video Conferencing


Keep Kids in School? 

In this edition of The Subnet, we chat with What are you working on lately at
n Dhia Belhajali  Dhia Belhajali, a telecommunications engineer at Tunisie Télécom? 
n Telecommunica- Tunisia’s Tunisie Télécom, where she works as a Currently, I’m the manager of optical fiber projects.
tions Engineer 
project manager in the network operator’s depart- My main responsibilities are to study the existing
n Tunisie Télécom  ment of engineering and planning for its transport transport network’s topology, to identify and mea-
n Tunis, Tunisia  network.   sure requirements, and then design solutions to up-
Belhajali was also one of 99 women to be selected grade, expand, secure and optimize our optical fiber
as a 2015 TechWomen fellow, an initiative headed network.  
up by U.S. Department of State’s Bureau of Educa- I have two [active] projects. One is a new project
tional and Cultural Affairs. The program connects to extend our optical fiber network and also to se-
women from Africa, Central Asia and the Middle cure it. Another project is to install and implement
East with professional mentors and “host” compa- a new packet microwave system to secure the net-
nies in their particular field of science, technology, work and improve its performance. 
engineering or mathematics. Belhajali completed
her five-week fellowship at Polycom, where she What is your biggest challenge these days? 
developed a pilot program for using video confer- Besides my work at Tunisie Télécom, I’m also a Ph.D
encing technology to improve educational opportu- student at the National School of Engineering of
nities for at-risk students at underserved schools Tunis, where I’m working on [research about] MP-
in rural Tunisia.  SoC, multiprocessor System-on-a-Chip. I’m trying

31 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

to improve my technology knowledge and to publish educational system and launch a center for real-
articles about my doctoral studies while I work on time e-learning in the Tunisian capital, Tunis. This
my project [with local schools].   center will connect with Tunisian rural schools. 
I will start with two rural schools, and one or two
Tell us more about your project classes per school. By the end of the year, I will write
with TechWomen.  a report comparing the situation before and after
During my mentorship at Polycom, I was working the implementation of the solution. This is in order
on tele-education because in my country we have to convince the government and volunteers to par-
many problems related to the education system. ticipate in this project and expand it. 
Many students, especially in rural regions, are very
unmotivated. They feel very worthless and hope- How can video conferencing help
less. Sometimes they drop out of school, and this improve those schools? 
phenomenon affects mainly rural regions because This project will allow rural students to join online,
they feel like there is no equality between rural kids real-time courses and clubs related to their inter-
and kids in big cities. That’s because students in big ests. At the same time, we can use this project to
cities have access to many activities and clubs like offer teachers in rural regions access to knowledge
art, science and sports. Most rural students tend to and video trainings wherever they are located so
drop out of school and they turn to crime, prostitu- they will be more included in their communities and
tion and even terrorism. Some of them even commit more engaged.  
suicide because they feel so hopeless.   It will provide interactive distance learning, so
The rate of literacy in Tunisia remains very high, students will be more motivated and excited. They
so when I was mentored at Polycom, I was inspired will be more collaborative and creative; they will
to implement new technologies in our educational perform better in school; and they will be able to
systems in order to reduce all these issues. The so- connect with kids across the country and around the
lution I found is to use video conferencing in our world. They also will be able to improve their digital

32 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

and professional networking skills and competen- decided to merge their classes into one classroom.
cies needed for employment, active citizenship and In order to motivate the kids, they launched many
personal fulfillment. They will be more active lo- clubs. For example, my father launched a club for
cally, nationally and internationally. They will not agricultural activities because he was passionate
feel isolated.   about agriculture. Other teachers launched classes
Video conferencing is the best way to prevent for sports and art. Then during their free hours, stu-
child delinquency, and at the same time, to encour- dents did many activities; for example, they planted
age teachers to go work in rural regions.  flowers, trees or even vegetables. By the end of the
academic year, teachers noticed that these kids had
How did you get the idea for this project?  become more collaborative and creative, and they
My father is a teacher, and many years ago he performed better in school.  
worked in rural school in west Tunisia. In the begin- My father retired many years ago, and now my
ning of the academic year, he noticed that many ru- brother is a teacher. He always tells me our rural
ral students were very intelligent, but unfortunately schools, even now, still suffer from a lack of culture
they weren’t passionate about and entertainment, as well as the absence of teach-
school. Their results at the end ers, effective education and family care. All of these
of the first quarter were very gaps have created many issues in the Tunisian edu-
bad, so my father and other cational system. I always believed that the solution
“Video conferencing is the teachers tried to find solutions to these issues should be similar to what my father
best way to prevent child delin- for this situation.   did 30 years ago. But this time, we have to take ad-
quency and encour­age teachers To compensate for the lack vantage of technological revolution in order to guar-
to go work in rural regions.” of teachers in this school—be- antee the sustainability of the solution. So when
cause many teachers refuse I was mentored in Polycom, I was inspired to use
—Dhia Belhajali, Tunisie Télécom
to go teach in rural regions— video conferencing technology in our educational
my father and other teachers system.  

33 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

How did you get interested in IT ever-changing industry. That’s why I’m a telecom
and networking as a career?  engineer. 
I have always been passionate about technology
and innovation, especially about telecommunica- Last question: What’s the best advice
tions. I believe in the few past years, telecommuni- you’ve ever received? 
cations has seen rapid and expansive development. My father always advised me to never give up and
It has become of vital importance in our lives work hard to realize my goals. [He taught me] to
because it facilitates communications between be ambitious and self-confident, to believe in my
people from different countries and contributes capacity to become a successful leader, and to par-
to the cultural exchange. That’s why I wanted ticipate in the development of my country and the
to become part of this innovative, thrilling and conception of new, innovative technologies. n

34 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6
networks dropped
in cool places data mine containers pulse check NGFW illumio packets THE SUBNET

SEAN M. KERNER is an IT consultant, technology enthu-


siast and tinkerer, and has been known to spend his spare
time immersed in the study of the Klingon language and
satellite pictures of Area 51. He has pulled Token Ring, Network Evolution is a SearchNetworking.com e-publication.
configured NetWare and has compiled his own Linux
Kate Gerwig, Editorial Director
kernel. He consults to industry and media organizations
Jessica Scarpati, Features and E-zine Editor
on technology issues.
Kara Gattine, Executive Managing Editor

Chuck Moozakis, Executive Editor


Craig Mathias is a principal with Farpoint Group, a
Antone Gonsalves, Director of News
wireless and mobile advisory firm in Ashland, Mass.
Marty Moore, Senior Production Editor

JESSICA SCARPATI is features and e-zine editor of Net- Linda Koury, Director of Online Design

work Evolution in TechTarget’s Networking Media Anita Koury, Art Director

Group. Scarpati was previously the site editor for Search- FOR SALES INQUIRIES, PLEASE CONTACT:
CloudProvider and the senior news writer for the Net- Doug Olender, Senior Vice President/Group Publisher
working Media Group. Prior to joining TechTarget, she dolender@techtarget.com

worked as a reporter for several newspapers in the Bos-


ton Metro area.
@
STEVE ZURIER is a freelance technology journalist based website email
in Columbia, Md., with more than 30 years of journalism Visit us Contact us

and publishing experience. Steve worked as Features Ed-


TechTarget, 275 Grove Street, Newton, MA 02466
itor at Government Computer News and InternetWeek.
©2016 TechTarget Inc. No part of this publication may be transmitted or reproduced in any
form or by any means without written permission from the publisher. TechTarget reprints
COVER art: glenn DUNBAR/WILLIAMS are available through The YGS Group..
Stay connected
About TechTarget: TechTarget publishes media for information technology profession-
Follow als. More than 100 focused websites enable quick access to a deep store of news, advice and
@NetworkingTT today. analysis about the technologies, products and processes crucial to your job. Our live and
virtual events give you direct access to independent expert commentary and advice. At IT
Knowledge Exchange, our social community, you can get advice and share solutions with
peers and experts.

35 n e t w o r k e v o l u t i o n, f e b r u a r y 2 0 1 6

You might also like