F5 Networks: The Internet of Things - Ready Infrastructure

F5 Networks
F5 Networkstechnical marketing em F5 Networks

The world of smart devices talking to each other—and to us—is well underway and here to stay. To connect to the Internet of Things opportunity, it’s key to design and build networking infrastructures that can handle massive amounts of new data.

The Internet of Things–Ready
Infrastructure
The world of smart devices talking to each other—and to us—is well
underway and here to stay. To connect to the Internet of Things
opportunity, it’s key to design and build networking infrastructures
that can handle massive amounts of new data.
Technical White Paper
Introduction
The lines between our physical and digital worlds are blurring. Our daily experiences
are—and will continue to be—impacted by the prevalence of Internet-connected
devices and anytime, anywhere access to information. And there is no sign of things
slowing down. Each year will see exponential growth in devices connected to the
Internet. In fact, Gartner predicts there will be 25 billion connected “things” by
2020.
These “things” will come in all shapes and sizes, from three-ton automobiles to
clothing to under-the-skin blood sugar monitors and even our entire home. The
world of smart devices talking to each other—and to us—is well underway. But
reaping the business rewards will depend on the ability to design and build a
networking infrastructure that successfully manages the flood of data that comes
from this new Internet, the Internet of Things (IoT).
Just as LTE and technologies like Network Functions Virtualization (NFV), software-
defined network (SDN), and VoLTE are transformative forces, there will be no
escaping the effects of the IoT. How service providers choose to respond to this
growing phenomenon and the explosion in connected devices, applications, and
data that it brings will determine who benefits most in a market that IDC forecasts
will grow to $7.1 trillion in the next five years.
Much like “bring your own device” transformed the workplace and enterprise
mobility—not to mention subscriber expectations for faster, more reliable access to
apps—the IoT will impact almost every aspect of our daily lives. Enhanced customer
service and improved use of field assets have already been realized by early adaptors
across multiple industries. Moving forward, new business models will blossom and
services will become more important than simple devices. With smartphones being
the epicenter of people’s daily lives—and a crucial hub for IoT data traffic—finding a
way to bring all this together is key for keeping pace in a constantly evolving
landscape. And it must be done while ensuring network efficiency, interoperability,
and security within your enterprise and optimal performance and security for the
services you deliver to subscribers.
More devices. More threats.
The IoT does not come without its challenges. Threats to data security, physical
security, security of devices, regulations, privacy, encryption, authentication and a
host of other issues all need to be addressed before the IoT can really become
commonplace. These themes sound eerily similar to the ones surrounding the cloud
only a couple of years ago. Now, consumer devices are the focus, and service
providers will work to find new ways of driving greater operational efficiency and
better management of infrastructure—for themselves and their customers. The
challenge in harnessing this powerful force isn’t limited to managing the sheer
1
2
1
WHITE PAPER
The Internet of Things–Ready Infrastructure
®
•
•
•
•
•
•
service and improved use of field assets have already been realized by early adaptors
across multiple industries. Moving forward, new business models will blossom and
services will become more important than simple devices. With smartphones being
the epicenter of people’s daily lives—and a crucial hub for IoT data traffic—finding a
way to bring all this together is key for keeping pace in a constantly evolving
landscape. And it must be done while ensuring network efficiency, interoperability,
and security within your enterprise and optimal performance and security for the
services you deliver to subscribers.
More devices. More threats.
The IoT does not come without its challenges. Threats to data security, physical
security, security of devices, regulations, privacy, encryption, authentication and a
host of other issues all need to be addressed before the IoT can really become
commonplace. These themes sound eerily similar to the ones surrounding the cloud
only a couple of years ago. Now, consumer devices are the focus, and service
providers will work to find new ways of driving greater operational efficiency and
better management of infrastructure—for themselves and their customers. The
challenge in harnessing this powerful force isn’t limited to managing the sheer
volume of data created. It’s also making sense of that data to prioritize traffic and
optimizing the application architecture itself.
Expert predictions tell us the IoT market size and the growing number of new
devices will surpass anything we’ve seen. The wider implications for the underlying
network infrastructure used to manage, monitor, and monetize these devices,
though less obvious, will require considerable attention. The consequence of these
devices and their supporting ecosystem failing could vary from a simple annoyance
—device apps stuck on software updates—to something significantly worse, like a
security breach targeting personally identifiable information. Vulnerabilities in devices
will exist, devices will connect looking for updates, and patches will need to be
pushed out. How will the infrastructure survive the onslaught?
The Internet of Things is not just about the things. It is really about the applications
and services that enable them. F5 Synthesis™—the next generation model for
supporting applications—can help apps (and the “things” they power) perform
better with greater security and ensure that they are always available. A key
component of the Synthesis model, F5® Software-Defined Application Services™
(SDAS™) allows application delivery to evolve in alignment with new IoT innovations
and device demands.
What are these “things”?
The Internet of Things refers to the set of devices and systems that interconnect
real-world sensors and actuators to the Internet. This includes many different types
of systems, such as:
Mobile devices
Smart meters and objects
Wearable devices including clothing, health care implants, smart watches, and
fitness devices
Internet-connected automobiles
Home automation systems, including thermostats, lighting, and home security
Other measuring sensors for weather, traffic, ocean tides, road signals, and more
These systems connect to the Internet or gateway in a variety of ways, such as
long-range WiFi/Ethernet using IP protocols (TCP/UDP, including cellular); short-
range Bluetooth low energy; short-range Near Field Communication; and other
3
WHITE PAPER
The Internet of Things–Ready Infrastructure
®
2
WHITE PAPER
The Internet of Things–Ready Infrastructure
®
•
•
•
•
•
•
of systems, such as:
Mobile devices
Smart meters and objects
Wearable devices including clothing, health care implants, smart watches, and
fitness devices
Internet-connected automobiles
Home automation systems, including thermostats, lighting, and home security
Other measuring sensors for weather, traffic, ocean tides, road signals, and more
These systems connect to the Internet or gateway in a variety of ways, such as
long-range WiFi/Ethernet using IP protocols (TCP/UDP, including cellular); short-
range Bluetooth low energy; short-range Near Field Communication; and other
types of medium-range radio networks. Point-to-point radio links and serial lines are
also used. Some devices/sensors connect directly to the Internet via an IP protocol
and others with specific IoT protocols, such as Message Queue Telemetry
Transport (MQTT), Constrained Application Protocol, and others. These may need
may need specialized IoT networking hardware to “talk” to the data center.
MQTT is a “subscribe and publish” messaging protocol designed for lightweight
machine-to-machine communications. Originally developed by IBM, it is now an
open standard. It needs a gateway or receiver (broker) to communicate. However, its
primary purpose is to allow a device to send a very short message one hop to an
MQ broker and to receive commands from that broker. Every message is published
to a location, called a topic. Clients (the sensors) subscribe to various topics and
when a message is published to the topic, the client/sensor gets it.
For example, imagine a simple network with three clients and a central broker.
All three clients open TCP connections with the broker. Clients B and C subscribe
to the topic speed.
At a later time, Client A publishes a value of 15mph for topic speed. The broker
forwards the message to all subscribed clients.
4
WHITE PAPER
The Internet of Things–Ready Infrastructure
®
3
WHITE PAPER
The Internet of Things–Ready Infrastructure
®
At a later time, Client A publishes a value of 15mph for topic speed. The broker
forwards the message to all subscribed clients.
The publisher subscriber model allows MQTT clients to communicate one-to-one,
one-to-many, and many-to-one.
The systems themselves typically fall into a few categories. The smallest devices
have 8-bit embedded “system on a chip” controllers but no operating system.
Others have a limited 32-bit architecture, like a home router, with or without a base
OS. The most capable systems have either full 32-bit or 64-bit operating platforms,
such as mobile phones. Customers could use their mobile phone to send the data,
via the Internet, from the IoT device to the destined application.
Not only are we interacting with these devices, they are interacting with other
machines to send specific information, which is called machine-to-machine (M2M)
technology. The M2M fabric works in conjunction with the various systems that
support wearables, home networks, and the widely deployed sensors that are part
of them.
According to Gartner, the Internet of Things is not a single technology but a
concept with embedded sensors driving the trend, real-time support and learning
having a social impact and it allows businesses to make situational decisions based
on the sensor’s information. No single architecture can address all the
potential IoT device areas and the requirements of each. But a scalable
architecture that can add or subtract resources to support a wide variety of
scenarios can prepare service providers for the impact the IoT will have.
The IoT effect on applications
Many of today’s traditional architectures will buckle under the increasing demand of
all the connected devices. According to IDC, the rate at which applications double in
the enterprise is once every four years. This time frame is likely to be cut in half as
more IoT devices need applications supporting them and service providers need to
5
6
WHITE PAPER
The Internet of Things–Ready Infrastructure
®
4
WHITE PAPER
The Internet of Things–Ready Infrastructure
®
According to Gartner, the Internet of Things is not a single technology but a
concept with embedded sensors driving the trend, real-time support and learning
having a social impact and it allows businesses to make situational decisions based
on the sensor’s information. No single architecture can address all the
potential IoT device areas and the requirements of each. But a scalable
architecture that can add or subtract resources to support a wide variety of
scenarios can prepare service providers for the impact the IoT will have.
The IoT effect on applications
Many of today’s traditional architectures will buckle under the increasing demand of
all the connected devices. According to IDC, the rate at which applications double in
the enterprise is once every four years. This time frame is likely to be cut in half as
more IoT devices need applications supporting them and service providers need to
be ready for the increased demand.
As more applications are needed to run ”things,” traditional infrastructure concerns
such as scale and reliability are becoming paramount. Additional challenges with
identity and access, improving the end-user or subscriber experience, and the need
for faster provisioning of services could overwhelm IT departments. A robust,
scalable, and intelligent infrastructure will be necessary to handle the massive traffic
growth.
The Domain Name System is the most likely method for connected devices to use to
locate needed services, and it’s potentially the means by which people will locate the
devices themselves. There might be other schemas being planned, but those would
require the adoption of a new technology naming standard, which would be costly,
slow, and highly unlikely.
Security at every layer
Clearly, security must also be present since the IoT has the potential to weave
vulnerabilities throughout the system—the ubiquity of connected devices presents a
gold mine for attackers. Outpacing attackers in our current threat landscape will
require more resources in order to minimize risk. Service providers will need to
continue to harden their own infrastructures and look to cloud services like DDoS
mitigation to lessen the effects of attacks.
At the same time, the explosion of embedded devices will further drive mainstream
IPv6 adoption. There are several advantages to IPv6 such as a large namespace,
address self-configuration, and the potential to remove Network Address
Translation problems. The networking infrastructure will require some planning to
embrace this shift. Components such as routers, firewalls, and application delivery
controllers will need to be IPv6–ready and capable of understanding the protocols
and data that devices will use to communicate.
To ensure security, intelligent routing, and analytics, networking layers will need to
be fluent in the language that devices use. Understanding these protocols within
the network will allow traffic to be secured, prioritized, and routed accordingly.
Recognizing and prioritizing these messages will enable better scalability and
manageability for the onslaught of device traffic and data. Intelligence will also be
needed to categorize what data needs attention (like a health monitor alert) and
what doesn’t (like temperature is good).
According to TechTarget, ensuring high availability of the IoT services will rely on
boosting traffic management and monitoring. This will both mitigate business
5
6
7
WHITE PAPER
The Internet of Things–Ready Infrastructure
®
5
WHITE PAPER
The Internet of Things–Ready Infrastructure
®
and data that devices will use to communicate.
To ensure security, intelligent routing, and analytics, networking layers will need to
be fluent in the language that devices use. Understanding these protocols within
the network will allow traffic to be secured, prioritized, and routed accordingly.
Recognizing and prioritizing these messages will enable better scalability and
manageability for the onslaught of device traffic and data. Intelligence will also be
needed to categorize what data needs attention (like a health monitor alert) and
what doesn’t (like temperature is good).
According to TechTarget, ensuring high availability of the IoT services will rely on
boosting traffic management and monitoring. This will both mitigate business
continuity risks, and prevent potential losses. From a project planning standpoint,
organizations need to do capacity planning and watch the growth rate of the
network so that the increased demand for the required bandwidth can be met.
Figure 1: Intelligent application delivery for the IoT
The IoT–ready infrastructure
The F5 SDAS fabric provides a foundation for building elastic IoT application
services. F5 ScaleN™ technology enables on-demand application and operational
scalability at the platform layer. This means the fabric can be deployed on a
combination of hardware, software, and virtual form factors—as well as beyond the
data center boundary into cloud computing environments.
Avoiding a single point of failure
The IoT applications will come in all shapes and sizes. But no matter the size,
availability is paramount to support both subscribers and the business. The most
basic high-availability architecture is the typical three-tier design. A pair of
Application Delivery Controllers (ADCs) in the DMZ terminates the connection. They,
in turn, intelligently distribute the client request to a pool (multiple) of IoT application
servers, which then query the database servers for the appropriate content. Each
tier has redundant servers so in the event of a server outage, the others take the
load and the system stays available.
This is a tried-and-true design for most operations and provides resilient application
availability, IoT or not, within a typical data center. But fault tolerance between two
data centers is even more reliable than multiple servers in a single location, simply
7
8
WHITE PAPER
The Internet of Things–Ready Infrastructure
®
6
WHITE PAPER
The Internet of Things–Ready Infrastructure
®
The IoT applications will come in all shapes and sizes. But no matter the size,
availability is paramount to support both subscribers and the business. The most
basic high-availability architecture is the typical three-tier design. A pair of
Application Delivery Controllers (ADCs) in the DMZ terminates the connection. They,
in turn, intelligently distribute the client request to a pool (multiple) of IoT application
servers, which then query the database servers for the appropriate content. Each
tier has redundant servers so in the event of a server outage, the others take the
load and the system stays available.
This is a tried-and-true design for most operations and provides resilient application
availability, IoT or not, within a typical data center. But fault tolerance between two
data centers is even more reliable than multiple servers in a single location, simply
because that one data center is a single point of failure.
Cloud: The IoT enabler
The cloud has become one of the primary enablers for IoT. Within the next five
years, more than 90 percent of all IoT data will be hosted on service provider
platforms. That’s because cloud computing reduces the complexity of supporting
IoT “Data Blending.”
In order to achieve or even maintain continuous IoT application availability and keep
up with the pace of new IoT application rollouts, service providers must explore
expanding their data center options. Having access to cloud resources provides
service providers with the agility and flexibility to quickly provision IoT services. The
cloud offers organizations a way to manage IoT services, rather than boxes along
with just-in-time provisioning. Cloud enables IT as a Service, just as IoT is a service,
along with the flexibility to scale when needed.
Integrating cloud-based IoT resources into the architecture requires only a couple of
pieces: connectivity, along with awareness of how those resources are being used.
The connectivity between a data center and the cloud is generally referred to as a
cloud bridge. The cloud bridge connects the two data center worlds securely and
provides a network compatibility layer that bridges the two networks. This provides
a transparency that allows resources in either environment to communicate without
concern for the underlying network topology.
Once a connection is established and network bridging capabilities are in place,
resources provisioned in the cloud can be non-disruptively added to the data
center–hosted pools. From there, load is distributed per the F5 BIG-IP® platform’s
configuration for the resource, such as an IoT application.
By integrating the enterprise data center with external clouds, the cloud becomes a
secure extension of the enterprise’s IoT network. This enterprise-to-cloud network
connection is encrypted and optimized for performance and bandwidth, thereby
reducing the risks and lowering the effort involved in migrating IoT workloads to the
cloud.
Maintain seamless delivery
This hybrid infrastructure approach, including cloud resources, for IoT deployments
not only allows service providers to distribute their IoT applications and services
when it makes sense, but also provides global fault tolerance to the overall system.
Depending on how the disaster recovery infrastructure is designed, this can be an
active site, a hot standby, a leased hosting space, a cloud provider, or some other
contained compute location. As soon as that IoT server, application, or even
8
9
WHITE PAPER
The Internet of Things–Ready Infrastructure
®
7
WHITE PAPER
The Internet of Things–Ready Infrastructure
®
center–hosted pools. From there, load is distributed per the F5 BIG-IP® platform’s
configuration for the resource, such as an IoT application.
By integrating the enterprise data center with external clouds, the cloud becomes a
secure extension of the enterprise’s IoT network. This enterprise-to-cloud network
connection is encrypted and optimized for performance and bandwidth, thereby
reducing the risks and lowering the effort involved in migrating IoT workloads to the
cloud.
Maintain seamless delivery
This hybrid infrastructure approach, including cloud resources, for IoT deployments
not only allows service providers to distribute their IoT applications and services
when it makes sense, but also provides global fault tolerance to the overall system.
Depending on how the disaster recovery infrastructure is designed, this can be an
active site, a hot standby, a leased hosting space, a cloud provider, or some other
contained compute location. As soon as that IoT server, application, or even
location starts to have trouble, a service provider can seamlessly maneuver around
the issue and continue to deliver its services to the devices.
Advantages for a range of industries
The various combinations of hybrid infrastructure types can be as diverse as the IoT
situations that use them.
Service providers probably already have some level of hybrid, even if it is a mix of
owned space plus SaaS. In most cases, the preference is to keep sensitive assets
in-house, but this approach has started to shift, with increased migration of
workloads to hybrid data centers. It all depends on the industry. For example,
financial industries have different requirements than retail. Retail will certainly need a
boost to its infrastructure as more customers will want to test IoT devices in-store.
Whatever the case may be, service providers are in a unique situation as they will
ultimately be touched by all this increased data traffic.
The service provider industry is well on its way to building out the IoT–ready
infrastructures and services. One major service provider is deploying BIG-IP virtual
editions to provide the ADC functionality needed for the scale and flexibility of its
connected-car project. Virtualized solutions are required for NFV to enable the agility
and elasticity necessary to support the IoT infrastructure demands.
The IoT–ready platform
Because F5 application services share a common control plane—the F5 platform—
the process of deploying and optimizing IoT application delivery services is
simplified. With the elastic power of SDAS, organizations can rapidly provision IoT
application services across the data center and into cloud computing environments,
reducing the time and costs associated with deploying new applications and
architectures.
The beauty of SDAS is that it can provide the global services to direct the IoT
devices to the most appropriate data center or hybrid cloud depending on the
request, context, and application health. Subscribers, employees, and the IoT
devices themselves receive the most secure and fastest experience possible.
The F5 high-performance services fabric supports traditional and emerging underlay
networks. It can be deployed on top of a traditional IP and VLAN-based networks,
works with SDN overlay networks using NVGRE or VXLAN (as well as a variety of
WHITE PAPER
The Internet of Things–Ready Infrastructure
®
8
WHITE PAPER
The Internet of Things–Ready Infrastructure
®
•
•
•
•
•
•
•
application services across the data center and into cloud computing environments,
reducing the time and costs associated with deploying new applications and
architectures.
The beauty of SDAS is that it can provide the global services to direct the IoT
devices to the most appropriate data center or hybrid cloud depending on the
request, context, and application health. Subscribers, employees, and the IoT
devices themselves receive the most secure and fastest experience possible.
The F5 high-performance services fabric supports traditional and emerging underlay
networks. It can be deployed on top of a traditional IP and VLAN-based networks,
works with SDN overlay networks using NVGRE or VXLAN (as well as a variety of
less well-known overlay protocols), and integrates with SDN fabrics, such as those
from Cisco/Insieme, Arista, and BigSwitch, among others.
Hardware, software—or cloud
The services fabric model enables consolidation of services onto a common platform
that can be deployed on hardware, on software, or in the cloud. This reduces
operational overhead by standardizing management as well as enabling deployment
processes that support continuous delivery efforts. By sharing service resources
and leveraging fine-grained multi-tenancy, the cost of individual services is
dramatically reduced, enabling all IoT applications—regardless of size—to take
advantage of services that are beneficial to their security, reliability, and performance.
The F5 platform:
Provides the network security to protect against inbound attacks
Offloads SSL to improve the performance of the application servers
Not only understands the application but also knows when it is having problems
Ensures not only the best end-user experience but also quick and efficient data
replication
F5 cloud solutions can automate and orchestrate the deployment of IoT application
delivery services across both traditional and cloud infrastructures while also
managing the dynamic redirection of workloads to the most suitable location. These
application delivery services ensure predictable IoT experiences, a replicated security
policy, and workload agility.
F5 BIG-IQ™ Cloud can federate management of BIG-IP solutions across both
traditional and cloud infrastructures, helping organizations deploy and manage IoT
delivery services in a fast, consistent, and repeatable manner, regardless of the
underlying infrastructure. In addition, BIG-IQ Cloud integrates or interfaces with
existing cloud orchestration engines such as VMware vCloud Orchestrator to
streamline the overall process of deploying applications.
Extend, scale—and secure
F5 cloud solutions offer a rapid Application Delivery Network provisioning solution,
drastically reducing the lead times for expanding IoT delivery capabilities across data
centers, whether they are private or public. As a result, service providers can
efficiently:
Extend data centers to the cloud to support IoT deployments
Scale IoT applications beyond the data center when required
Secure and accelerate IoT connections to the cloud
For maintenance situations, service providers no longer need to manually redirect
traffic by configuring applications. Instead, IoT applications are proactively redirected
WHITE PAPER
The Internet of Things–Ready Infrastructure
®
9
WHITE PAPER
The Internet of Things–Ready Infrastructure
®
•
•
•
F5 Silverline™ DDoS Protection
is a service delivered via the
Silverline DDoS Protection
cloud-based platform that
provides continuous DDoS
protection, detection, and
mitigation to stop even the
largest volumetric DDoS attacks
from reaching IoT networks.
Extend, scale—and secure
F5 cloud solutions offer a rapid Application Delivery Network provisioning solution,
drastically reducing the lead times for expanding IoT delivery capabilities across data
centers, whether they are private or public. As a result, service providers can
efficiently:
Extend data centers to the cloud to support IoT deployments
Scale IoT applications beyond the data center when required
Secure and accelerate IoT connections to the cloud
For maintenance situations, service providers no longer need to manually redirect
traffic by configuring applications. Instead, IoT applications are proactively redirected
to an alternate data center prior to maintenance.
The BIG-IP platform is application and location agnostic, meaning the type of
application or where the application lives really does not matter. As long as you tell
the BIG-IP platform where to find the IoT application, the BIG-IP platform will deliver
it.
Bringing it all together, F5 Synthesis gives cloud and application providers, as well
as mobile network operators, the architectural framework necessary to ensure the
performance, reliability, and security of IoT applications.
Conclusion
Connected devices are here to stay—forcing us to move forward into this brave new
world where almost everything generates data traffic. While there’s much to
consider, proactively addressing these challenges and adopting new approaches for
enabling an IoT–ready network will help service providers chart a clearer course
toward success.
An IoT–ready environment can enable service providers to begin taking advantage of
this societal shift without a wholesale rip-and-replace of existing technology. It also
provides the breathing room needed to ensure that the coming rush of connected
devices does not cripple the network infrastructure. This process ensures benefits
will be realized without compromising on the operational governance required to
ensure availability and security of the IoT network, data, and application resources. It
also means service providers can manage IoT services instead of boxes.
However an IoT–ready infrastructure is constructed, it is a transformational journey.
It is not something that should be taken lightly or without a long-term strategy in
place. When done properly, an F5-powered IoT–ready infrastructure can bring
significant benefits to service providers, their employees, and their subscribers.
http://www.gartner.com/newsroom/id/2905717
http://www.forbes.com/sites/gilpress/2014/08/22/internet-of-things-by-the-numbers-
market-estimates-and-forecasts/
http://wso2.com/whitepapers/a-reference-architecture-for-the-internet-of-things/
http://eclipse.org/community/eclipse_newsletter/2014/february/article2.php
http://www.gartner.com/webinar/2862818
IDC Directions, “Battle for the Future of the Datacenter: The Role of Disaggregated Systems,”
Mar 2014
http://searchsecurity.techtarget.com/tip/Internet-of-Things-IOT-Seven-enterprise-risks-to-
consider
1
2
3
4
5
6
7
8
WHITE PAPER
The Internet of Things–Ready Infrastructure
®
10
WHITE PAPER
The Internet of Things–Ready Infrastructure
®
http://www.gartner.com/newsroom/id/2905717
http://www.forbes.com/sites/gilpress/2014/08/22/internet-of-things-by-the-numbers-
market-estimates-and-forecasts/
http://wso2.com/whitepapers/a-reference-architecture-for-the-internet-of-things/
http://eclipse.org/community/eclipse_newsletter/2014/february/article2.php
http://www.gartner.com/webinar/2862818
IDC Directions, “Battle for the Future of the Datacenter: The Role of Disaggregated Systems,”
Mar 2014
http://searchsecurity.techtarget.com/tip/Internet-of-Things-IOT-Seven-enterprise-risks-to-
consider
http://support.rightscale.com/12-
Guides/Designers_Guide/Cloud_Solution_Architectures/Designing_and_Deploying_High-
Availability_Websites
IDC FutureScape Internet of Things:
http://www.machinetomachinemagazine.com/2014/12/04/idc-report-worldwide-iot-
predictions-for-2015/
1
2
3
4
5
6
7
8
9
WHITE PAPER
The Internet of Things–Ready Infrastructure
®
11
F5 Networks, Inc.
401 Elliot Avenue West, Seattle, WA 98119
888-882-4447 www.f5.com
Americas
info@f5.com
Asia-Pacific
apacinfo@f5.com
Europe/Middle-East/Africa
emeainfo@f5.com
Japan
f5j-info@f5.com
©2015 F5 Networks, Inc. All rights reserved. F5, F5 Networks, and the F5 logo are trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. Other F5
trademarks are identified at f5.com. Any other products, services, or company names referenced herein may be trademarks of their respective owners with no endorsement or
affiliation, express or implied, claimed by F5. CS04-00015 0113
WHITE PAPER
The Internet of Things–Ready Infrastructure
®

Recomendados

How to deal with the impact of digital transformation on networks por
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks Abaram Network Solutions
33 visualizações4 slides
Clues for Solving Cloud-Based App Performance por
Clues for Solving Cloud-Based App Performance Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance NETSCOUT
472 visualizações12 slides
Alpha & Omega's Managed Security por
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed SecurityDarryl Santa
653 visualizações20 slides
Zscaler mondi webinar por
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinarZscaler
5.6K visualizações24 slides
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance por
[Cisco Connect 2018 - Vietnam] Yedu s.   introducing cisco dna assurance[Cisco Connect 2018 - Vietnam] Yedu s.   introducing cisco dna assurance
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assuranceNur Shiqim Chok
145 visualizações42 slides
Cisco Connect 2018 Philippines - introducing cisco dna assurance por
Cisco Connect 2018 Philippines - introducing cisco dna assuranceCisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assuranceNetworkCollaborators
81 visualizações28 slides

Mais conteúdo relacionado

Mais procurados

MDR-SOC is a cybersecurity framework services | Ampcus Inc por
MDR-SOC is a cybersecurity framework services | Ampcus IncMDR-SOC is a cybersecurity framework services | Ampcus Inc
MDR-SOC is a cybersecurity framework services | Ampcus IncUnified11
22 visualizações5 slides
The evolution of IT in a cloud world por
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud worldZscaler
474 visualizações28 slides
Rethinking Cybersecurity for the Digital Transformation Era por
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraZscaler
281 visualizações14 slides
Faster, simpler, more secure remote access to apps in aws por
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsZscaler
850 visualizações27 slides
The secure, direct to-internet branch por
The secure, direct to-internet branchThe secure, direct to-internet branch
The secure, direct to-internet branchZscaler
626 visualizações34 slides
3 reasons-sdp-is-replacing-vpn-in-2019 por
3 reasons-sdp-is-replacing-vpn-in-20193 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-2019Zscaler
2.4K visualizações14 slides

Mais procurados(20)

MDR-SOC is a cybersecurity framework services | Ampcus Inc por Unified11
MDR-SOC is a cybersecurity framework services | Ampcus IncMDR-SOC is a cybersecurity framework services | Ampcus Inc
MDR-SOC is a cybersecurity framework services | Ampcus Inc
Unified1122 visualizações
The evolution of IT in a cloud world por Zscaler
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
Zscaler474 visualizações
Rethinking Cybersecurity for the Digital Transformation Era por Zscaler
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
Zscaler281 visualizações
Faster, simpler, more secure remote access to apps in aws por Zscaler
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in aws
Zscaler850 visualizações
The secure, direct to-internet branch por Zscaler
The secure, direct to-internet branchThe secure, direct to-internet branch
The secure, direct to-internet branch
Zscaler626 visualizações
3 reasons-sdp-is-replacing-vpn-in-2019 por Zscaler
3 reasons-sdp-is-replacing-vpn-in-20193 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-2019
Zscaler2.4K visualizações
Going Beyond the Cloud to Modernize Your Banking Infrastructure por Cloudflare
Going Beyond the Cloud to Modernize Your Banking InfrastructureGoing Beyond the Cloud to Modernize Your Banking Infrastructure
Going Beyond the Cloud to Modernize Your Banking Infrastructure
Cloudflare552 visualizações
Three ways-zero-trust-security-redefines-partner-access-ch por Zscaler
Three ways-zero-trust-security-redefines-partner-access-chThree ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-ch
Zscaler1.3K visualizações
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network... por Enterprise Management Associates
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Management Associates143 visualizações
Cloud vs. On-Premises Security: Can you afford not to switch? por Zscaler
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
Zscaler1.6K visualizações
Introduction to Cloud Security por Susanne Tedrick
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
Susanne Tedrick195 visualizações
Three Key Steps for Moving Your Branches to the Cloud por Zscaler
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the Cloud
Zscaler648 visualizações
What is SASE por Adi Ruppin
What is SASEWhat is SASE
What is SASE
Adi Ruppin725 visualizações
What Comes After VPN? por Zscaler
What Comes After VPN?What Comes After VPN?
What Comes After VPN?
Zscaler783 visualizações
SASE Future Proof sdwan 20 Sep2020 v2.1 BA por bourhan88100
SASE Future Proof sdwan 20 Sep2020 v2.1 BASASE Future Proof sdwan 20 Sep2020 v2.1 BA
SASE Future Proof sdwan 20 Sep2020 v2.1 BA
bourhan88100322 visualizações
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief... por Arrow ECS UK
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Arrow ECS UK458 visualizações
Top 5 predictions webinar por Zscaler
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinar
Zscaler824 visualizações
How SASE can help you move securely from the PSN with VMware and Breeze Networks por Articulate Marketing
How SASE can help you move securely from the PSN with VMware and Breeze NetworksHow SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze Networks
Articulate Marketing662 visualizações
Ma story then_now_webcast_10_17_18 por Zscaler
Ma story then_now_webcast_10_17_18Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18
Zscaler710 visualizações
John Merline - How make your cloud SASE por AWS Chicago
John Merline - How make your cloud SASE John Merline - How make your cloud SASE
John Merline - How make your cloud SASE
AWS Chicago197 visualizações

Destaque

Born to be digital - how leading CIOs are preparing for digital transformation por
Born to be digital - how leading CIOs are preparing for digital transformationBorn to be digital - how leading CIOs are preparing for digital transformation
Born to be digital - how leading CIOs are preparing for digital transformationEY
1.6K visualizações8 slides
Filling the Digital Preservation Gap - Acting on Change por
Filling the Digital Preservation Gap - Acting on ChangeFilling the Digital Preservation Gap - Acting on Change
Filling the Digital Preservation Gap - Acting on ChangePERICLES_FP7
173 visualizações15 slides
VMware Overview por
VMware OverviewVMware Overview
VMware OverviewMadhu Bala
2.9K visualizações22 slides
GSS IT Infrastructure Transformation Services por
GSS IT Infrastructure Transformation ServicesGSS IT Infrastructure Transformation Services
GSS IT Infrastructure Transformation ServicesMartin Gold
941 visualizações17 slides
Getting ready for Infrastructure Transformation with hyper-converged por
Getting ready for Infrastructure Transformation with hyper-convergedGetting ready for Infrastructure Transformation with hyper-converged
Getting ready for Infrastructure Transformation with hyper-convergedSynapse360
334 visualizações13 slides
IT Transformation Plan por
IT Transformation PlanIT Transformation Plan
IT Transformation PlanU.S. Department of the Interior
13.4K visualizações37 slides

Destaque(7)

Born to be digital - how leading CIOs are preparing for digital transformation por EY
Born to be digital - how leading CIOs are preparing for digital transformationBorn to be digital - how leading CIOs are preparing for digital transformation
Born to be digital - how leading CIOs are preparing for digital transformation
EY1.6K visualizações
Filling the Digital Preservation Gap - Acting on Change por PERICLES_FP7
Filling the Digital Preservation Gap - Acting on ChangeFilling the Digital Preservation Gap - Acting on Change
Filling the Digital Preservation Gap - Acting on Change
PERICLES_FP7173 visualizações
VMware Overview por Madhu Bala
VMware OverviewVMware Overview
VMware Overview
Madhu Bala2.9K visualizações
GSS IT Infrastructure Transformation Services por Martin Gold
GSS IT Infrastructure Transformation ServicesGSS IT Infrastructure Transformation Services
GSS IT Infrastructure Transformation Services
Martin Gold941 visualizações
Getting ready for Infrastructure Transformation with hyper-converged por Synapse360
Getting ready for Infrastructure Transformation with hyper-convergedGetting ready for Infrastructure Transformation with hyper-converged
Getting ready for Infrastructure Transformation with hyper-converged
Synapse360334 visualizações
Converged Infrastructure and Integrated Systems Futures por Martin Hingley
Converged Infrastructure and Integrated Systems FuturesConverged Infrastructure and Integrated Systems Futures
Converged Infrastructure and Integrated Systems Futures
Martin Hingley1.7K visualizações

Similar a F5 Networks: The Internet of Things - Ready Infrastructure

Unit_1_IOT_INTRO.pptx por
Unit_1_IOT_INTRO.pptxUnit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxBharat Tank
24 visualizações102 slides
iot.docx por
iot.docxiot.docx
iot.docxDaljeetSingh275467
12 visualizações16 slides
Top five emerging technology in industry por
Top five emerging technology in industryTop five emerging technology in industry
Top five emerging technology in industryAgitAjey
154 visualizações32 slides
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES por
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
152 visualizações9 slides
Io t & amp; industry 4.0,internet of things por
Io t & amp; industry 4.0,internet of thingsIo t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of thingsSumanPramanik7
73 visualizações58 slides
IOTCYBER por
IOTCYBERIOTCYBER
IOTCYBERChuck Brooks
562 visualizações31 slides

Similar a F5 Networks: The Internet of Things - Ready Infrastructure(20)

Unit_1_IOT_INTRO.pptx por Bharat Tank
Unit_1_IOT_INTRO.pptxUnit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptx
Bharat Tank24 visualizações
Top five emerging technology in industry por AgitAjey
Top five emerging technology in industryTop five emerging technology in industry
Top five emerging technology in industry
AgitAjey154 visualizações
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES por csandit
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
csandit152 visualizações
Io t & amp; industry 4.0,internet of things por SumanPramanik7
Io t & amp; industry 4.0,internet of thingsIo t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of things
SumanPramanik773 visualizações
IOTCYBER por Chuck Brooks
IOTCYBERIOTCYBER
IOTCYBER
Chuck Brooks562 visualizações
Internet of Things por Mphasis
Internet of ThingsInternet of Things
Internet of Things
Mphasis2.9K visualizações
Lecture 14 por vishal choudhary
Lecture 14Lecture 14
Lecture 14
vishal choudhary111 visualizações
IBM Xforce Q4 2014 por Patrick Bouillaud
IBM Xforce Q4 2014IBM Xforce Q4 2014
IBM Xforce Q4 2014
Patrick Bouillaud2K visualizações
VET4SBO Level 2 module 6 - unit 4 - v0.9 en por Karel Van Isacker
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
Karel Van Isacker73 visualizações
Questions in iot por vishal choudhary
Questions in iotQuestions in iot
Questions in iot
vishal choudhary414 visualizações
IOT_PPT1.pdf por laxmikanth45
IOT_PPT1.pdfIOT_PPT1.pdf
IOT_PPT1.pdf
laxmikanth4532 visualizações
Understanding the Information Architecture, Data Management, and Analysis Cha... por Cognizant
Understanding the Information Architecture, Data Management, and Analysis Cha...Understanding the Information Architecture, Data Management, and Analysis Cha...
Understanding the Information Architecture, Data Management, and Analysis Cha...
Cognizant289 visualizações
TheInternetofThings por Kimmiegrif
TheInternetofThingsTheInternetofThings
TheInternetofThings
Kimmiegrif350 visualizações
IoT for Everyday Life por ijsrd.com
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
ijsrd.com870 visualizações
Cellular Narrow Band IoT- using LTE por Sukhvinder Singh Malik
Cellular Narrow Band IoT- using LTE Cellular Narrow Band IoT- using LTE
Cellular Narrow Band IoT- using LTE
Sukhvinder Singh Malik24.9K visualizações
IOT Demystified por Kjell Moens
IOT DemystifiedIOT Demystified
IOT Demystified
Kjell Moens162 visualizações
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES por IJCNCJournal
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
IJCNCJournal175 visualizações
Fog computing and data concurrency por Priyanka Goswami
Fog computing and data concurrencyFog computing and data concurrency
Fog computing and data concurrency
Priyanka Goswami503 visualizações
Compiler design presentaion por MdShahinAlam25
Compiler design presentaionCompiler design presentaion
Compiler design presentaion
MdShahinAlam2550 visualizações

Mais de F5 Networks

Using Docker container technology with F5 Networks products and services por
Using Docker container technology with F5 Networks products and servicesUsing Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesF5 Networks
6.7K visualizações15 slides
F5 Networks Quick Poll Research: HTTP/2 Survey Results por
F5 Networks Quick Poll Research: HTTP/2Survey ResultsF5 Networks Quick Poll Research: HTTP/2Survey Results
F5 Networks Quick Poll Research: HTTP/2 Survey ResultsF5 Networks
1.8K visualizações10 slides
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model por
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelF5 Networks
2.5K visualizações9 slides
F5 Networks: Introduction to Silverline WAF (web application firewall) por
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks
7.3K visualizações10 slides
F5 networks the_expectation_of_ssl_everywhere por
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 Networks
1.9K visualizações6 slides
Intrinsic Security—The Key to Effective Hybrid DDoS Protection por
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionIntrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionF5 Networks
1.2K visualizações7 slides

Mais de F5 Networks(20)

Using Docker container technology with F5 Networks products and services por F5 Networks
Using Docker container technology with F5 Networks products and servicesUsing Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and services
F5 Networks6.7K visualizações
F5 Networks Quick Poll Research: HTTP/2 Survey Results por F5 Networks
F5 Networks Quick Poll Research: HTTP/2Survey ResultsF5 Networks Quick Poll Research: HTTP/2Survey Results
F5 Networks Quick Poll Research: HTTP/2 Survey Results
F5 Networks1.8K visualizações
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model por F5 Networks
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
F5 Networks2.5K visualizações
F5 Networks: Introduction to Silverline WAF (web application firewall) por F5 Networks
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks7.3K visualizações
F5 networks the_expectation_of_ssl_everywhere por F5 Networks
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhere
F5 Networks1.9K visualizações
Intrinsic Security—The Key to Effective Hybrid DDoS Protection por F5 Networks
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionIntrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
F5 Networks1.2K visualizações
Ensure Application Availability Between Hybrid Data Centers por F5 Networks
Ensure Application Availability Between Hybrid Data CentersEnsure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data Centers
F5 Networks1.2K visualizações
F5 Networks Threat Analysis: Madness por F5 Networks
F5 Networks Threat Analysis: MadnessF5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: Madness
F5 Networks1.1K visualizações
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I... por F5 Networks
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
F5 Networks3.7K visualizações
Scaling Mobile Network Security for LTE: A Multi-Layer Approach por F5 Networks
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachScaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
F5 Networks1.2K visualizações
F5 Certified! Program Overview and Update por F5 Networks
F5 Certified! Program Overview and UpdateF5 Certified! Program Overview and Update
F5 Certified! Program Overview and Update
F5 Networks1.7K visualizações
Key Findings from the State of Application Delivery 2015 por F5 Networks
Key Findings from the State of Application Delivery 2015Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015
F5 Networks1.9K visualizações
F5 Application Services Reference Architecture (Audio) por F5 Networks
F5 Application Services Reference Architecture (Audio)F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)
F5 Networks1.5K visualizações
F5 Application Services Reference Architecture por F5 Networks
F5 Application Services Reference ArchitectureF5 Application Services Reference Architecture
F5 Application Services Reference Architecture
F5 Networks1.3K visualizações
The F5 Networks Application Services Reference Architecture (White Paper) por F5 Networks
The F5 Networks Application Services Reference Architecture (White Paper)The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)
F5 Networks1.2K visualizações
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic) por F5 Networks
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
F5 Networks889 visualizações
The F5 DDoS Protection Reference Architecture (Technical White Paper) por F5 Networks
The F5 DDoS Protection Reference Architecture (Technical White Paper)The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)
F5 Networks2.6K visualizações
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa... por F5 Networks
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks1.1K visualizações
F5 Networks Intelligent DNS Scale por F5 Networks
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS Scale
F5 Networks1.2K visualizações
DNS: Challenges in a Changing Landscape (Infographic) por F5 Networks
DNS: Challenges in a Changing Landscape (Infographic)DNS: Challenges in a Changing Landscape (Infographic)
DNS: Challenges in a Changing Landscape (Infographic)
F5 Networks733 visualizações

Último

Data Integrity for Banking and Financial Services por
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial ServicesPrecisely
76 visualizações26 slides
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... por
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...ShapeBlue
114 visualizações12 slides
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool por
Extending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPoolExtending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPool
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPoolShapeBlue
56 visualizações10 slides
Why and How CloudStack at weSystems - Stephan Bienek - weSystems por
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsShapeBlue
172 visualizações13 slides
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... por
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...ShapeBlue
97 visualizações28 slides
Network Source of Truth and Infrastructure as Code revisited por
Network Source of Truth and Infrastructure as Code revisitedNetwork Source of Truth and Infrastructure as Code revisited
Network Source of Truth and Infrastructure as Code revisitedNetwork Automation Forum
49 visualizações45 slides

Último(20)

Data Integrity for Banking and Financial Services por Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely76 visualizações
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... por ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue114 visualizações
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool por ShapeBlue
Extending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPoolExtending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPool
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool
ShapeBlue56 visualizações
Why and How CloudStack at weSystems - Stephan Bienek - weSystems por ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue172 visualizações
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... por ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue97 visualizações
Network Source of Truth and Infrastructure as Code revisited por Network Automation Forum
Network Source of Truth and Infrastructure as Code revisitedNetwork Source of Truth and Infrastructure as Code revisited
Network Source of Truth and Infrastructure as Code revisited
Network Automation Forum49 visualizações
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... por ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue93 visualizações
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates por ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue178 visualizações
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ por ShapeBlue
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
ShapeBlue58 visualizações
Future of AR - Facebook Presentation por Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty54 visualizações
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T por ShapeBlue
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&TCloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
ShapeBlue81 visualizações
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... por ShapeBlue
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
ShapeBlue74 visualizações
State of the Union - Rohit Yadav - Apache CloudStack por ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue218 visualizações
DRBD Deep Dive - Philipp Reisner - LINBIT por ShapeBlue
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue110 visualizações
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue por ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue68 visualizações
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... por ShapeBlue
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
ShapeBlue48 visualizações
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... por TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc130 visualizações
Igniting Next Level Productivity with AI-Infused Data Integration Workflows por Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software373 visualizações
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... por ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue128 visualizações
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P... por ShapeBlue
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
ShapeBlue120 visualizações

F5 Networks: The Internet of Things - Ready Infrastructure

  • 1. The Internet of Things–Ready Infrastructure The world of smart devices talking to each other—and to us—is well underway and here to stay. To connect to the Internet of Things opportunity, it’s key to design and build networking infrastructures that can handle massive amounts of new data. Technical White Paper
  • 2. Introduction The lines between our physical and digital worlds are blurring. Our daily experiences are—and will continue to be—impacted by the prevalence of Internet-connected devices and anytime, anywhere access to information. And there is no sign of things slowing down. Each year will see exponential growth in devices connected to the Internet. In fact, Gartner predicts there will be 25 billion connected “things” by 2020. These “things” will come in all shapes and sizes, from three-ton automobiles to clothing to under-the-skin blood sugar monitors and even our entire home. The world of smart devices talking to each other—and to us—is well underway. But reaping the business rewards will depend on the ability to design and build a networking infrastructure that successfully manages the flood of data that comes from this new Internet, the Internet of Things (IoT). Just as LTE and technologies like Network Functions Virtualization (NFV), software- defined network (SDN), and VoLTE are transformative forces, there will be no escaping the effects of the IoT. How service providers choose to respond to this growing phenomenon and the explosion in connected devices, applications, and data that it brings will determine who benefits most in a market that IDC forecasts will grow to $7.1 trillion in the next five years. Much like “bring your own device” transformed the workplace and enterprise mobility—not to mention subscriber expectations for faster, more reliable access to apps—the IoT will impact almost every aspect of our daily lives. Enhanced customer service and improved use of field assets have already been realized by early adaptors across multiple industries. Moving forward, new business models will blossom and services will become more important than simple devices. With smartphones being the epicenter of people’s daily lives—and a crucial hub for IoT data traffic—finding a way to bring all this together is key for keeping pace in a constantly evolving landscape. And it must be done while ensuring network efficiency, interoperability, and security within your enterprise and optimal performance and security for the services you deliver to subscribers. More devices. More threats. The IoT does not come without its challenges. Threats to data security, physical security, security of devices, regulations, privacy, encryption, authentication and a host of other issues all need to be addressed before the IoT can really become commonplace. These themes sound eerily similar to the ones surrounding the cloud only a couple of years ago. Now, consumer devices are the focus, and service providers will work to find new ways of driving greater operational efficiency and better management of infrastructure—for themselves and their customers. The challenge in harnessing this powerful force isn’t limited to managing the sheer 1 2 1 WHITE PAPER The Internet of Things–Ready Infrastructure ®
  • 3. • • • • • • service and improved use of field assets have already been realized by early adaptors across multiple industries. Moving forward, new business models will blossom and services will become more important than simple devices. With smartphones being the epicenter of people’s daily lives—and a crucial hub for IoT data traffic—finding a way to bring all this together is key for keeping pace in a constantly evolving landscape. And it must be done while ensuring network efficiency, interoperability, and security within your enterprise and optimal performance and security for the services you deliver to subscribers. More devices. More threats. The IoT does not come without its challenges. Threats to data security, physical security, security of devices, regulations, privacy, encryption, authentication and a host of other issues all need to be addressed before the IoT can really become commonplace. These themes sound eerily similar to the ones surrounding the cloud only a couple of years ago. Now, consumer devices are the focus, and service providers will work to find new ways of driving greater operational efficiency and better management of infrastructure—for themselves and their customers. The challenge in harnessing this powerful force isn’t limited to managing the sheer volume of data created. It’s also making sense of that data to prioritize traffic and optimizing the application architecture itself. Expert predictions tell us the IoT market size and the growing number of new devices will surpass anything we’ve seen. The wider implications for the underlying network infrastructure used to manage, monitor, and monetize these devices, though less obvious, will require considerable attention. The consequence of these devices and their supporting ecosystem failing could vary from a simple annoyance —device apps stuck on software updates—to something significantly worse, like a security breach targeting personally identifiable information. Vulnerabilities in devices will exist, devices will connect looking for updates, and patches will need to be pushed out. How will the infrastructure survive the onslaught? The Internet of Things is not just about the things. It is really about the applications and services that enable them. F5 Synthesis™—the next generation model for supporting applications—can help apps (and the “things” they power) perform better with greater security and ensure that they are always available. A key component of the Synthesis model, F5® Software-Defined Application Services™ (SDAS™) allows application delivery to evolve in alignment with new IoT innovations and device demands. What are these “things”? The Internet of Things refers to the set of devices and systems that interconnect real-world sensors and actuators to the Internet. This includes many different types of systems, such as: Mobile devices Smart meters and objects Wearable devices including clothing, health care implants, smart watches, and fitness devices Internet-connected automobiles Home automation systems, including thermostats, lighting, and home security Other measuring sensors for weather, traffic, ocean tides, road signals, and more These systems connect to the Internet or gateway in a variety of ways, such as long-range WiFi/Ethernet using IP protocols (TCP/UDP, including cellular); short- range Bluetooth low energy; short-range Near Field Communication; and other 3 WHITE PAPER The Internet of Things–Ready Infrastructure ® 2 WHITE PAPER The Internet of Things–Ready Infrastructure ®
  • 4. • • • • • • of systems, such as: Mobile devices Smart meters and objects Wearable devices including clothing, health care implants, smart watches, and fitness devices Internet-connected automobiles Home automation systems, including thermostats, lighting, and home security Other measuring sensors for weather, traffic, ocean tides, road signals, and more These systems connect to the Internet or gateway in a variety of ways, such as long-range WiFi/Ethernet using IP protocols (TCP/UDP, including cellular); short- range Bluetooth low energy; short-range Near Field Communication; and other types of medium-range radio networks. Point-to-point radio links and serial lines are also used. Some devices/sensors connect directly to the Internet via an IP protocol and others with specific IoT protocols, such as Message Queue Telemetry Transport (MQTT), Constrained Application Protocol, and others. These may need may need specialized IoT networking hardware to “talk” to the data center. MQTT is a “subscribe and publish” messaging protocol designed for lightweight machine-to-machine communications. Originally developed by IBM, it is now an open standard. It needs a gateway or receiver (broker) to communicate. However, its primary purpose is to allow a device to send a very short message one hop to an MQ broker and to receive commands from that broker. Every message is published to a location, called a topic. Clients (the sensors) subscribe to various topics and when a message is published to the topic, the client/sensor gets it. For example, imagine a simple network with three clients and a central broker. All three clients open TCP connections with the broker. Clients B and C subscribe to the topic speed. At a later time, Client A publishes a value of 15mph for topic speed. The broker forwards the message to all subscribed clients. 4 WHITE PAPER The Internet of Things–Ready Infrastructure ® 3 WHITE PAPER The Internet of Things–Ready Infrastructure ®
  • 5. At a later time, Client A publishes a value of 15mph for topic speed. The broker forwards the message to all subscribed clients. The publisher subscriber model allows MQTT clients to communicate one-to-one, one-to-many, and many-to-one. The systems themselves typically fall into a few categories. The smallest devices have 8-bit embedded “system on a chip” controllers but no operating system. Others have a limited 32-bit architecture, like a home router, with or without a base OS. The most capable systems have either full 32-bit or 64-bit operating platforms, such as mobile phones. Customers could use their mobile phone to send the data, via the Internet, from the IoT device to the destined application. Not only are we interacting with these devices, they are interacting with other machines to send specific information, which is called machine-to-machine (M2M) technology. The M2M fabric works in conjunction with the various systems that support wearables, home networks, and the widely deployed sensors that are part of them. According to Gartner, the Internet of Things is not a single technology but a concept with embedded sensors driving the trend, real-time support and learning having a social impact and it allows businesses to make situational decisions based on the sensor’s information. No single architecture can address all the potential IoT device areas and the requirements of each. But a scalable architecture that can add or subtract resources to support a wide variety of scenarios can prepare service providers for the impact the IoT will have. The IoT effect on applications Many of today’s traditional architectures will buckle under the increasing demand of all the connected devices. According to IDC, the rate at which applications double in the enterprise is once every four years. This time frame is likely to be cut in half as more IoT devices need applications supporting them and service providers need to 5 6 WHITE PAPER The Internet of Things–Ready Infrastructure ® 4 WHITE PAPER The Internet of Things–Ready Infrastructure ®
  • 6. According to Gartner, the Internet of Things is not a single technology but a concept with embedded sensors driving the trend, real-time support and learning having a social impact and it allows businesses to make situational decisions based on the sensor’s information. No single architecture can address all the potential IoT device areas and the requirements of each. But a scalable architecture that can add or subtract resources to support a wide variety of scenarios can prepare service providers for the impact the IoT will have. The IoT effect on applications Many of today’s traditional architectures will buckle under the increasing demand of all the connected devices. According to IDC, the rate at which applications double in the enterprise is once every four years. This time frame is likely to be cut in half as more IoT devices need applications supporting them and service providers need to be ready for the increased demand. As more applications are needed to run ”things,” traditional infrastructure concerns such as scale and reliability are becoming paramount. Additional challenges with identity and access, improving the end-user or subscriber experience, and the need for faster provisioning of services could overwhelm IT departments. A robust, scalable, and intelligent infrastructure will be necessary to handle the massive traffic growth. The Domain Name System is the most likely method for connected devices to use to locate needed services, and it’s potentially the means by which people will locate the devices themselves. There might be other schemas being planned, but those would require the adoption of a new technology naming standard, which would be costly, slow, and highly unlikely. Security at every layer Clearly, security must also be present since the IoT has the potential to weave vulnerabilities throughout the system—the ubiquity of connected devices presents a gold mine for attackers. Outpacing attackers in our current threat landscape will require more resources in order to minimize risk. Service providers will need to continue to harden their own infrastructures and look to cloud services like DDoS mitigation to lessen the effects of attacks. At the same time, the explosion of embedded devices will further drive mainstream IPv6 adoption. There are several advantages to IPv6 such as a large namespace, address self-configuration, and the potential to remove Network Address Translation problems. The networking infrastructure will require some planning to embrace this shift. Components such as routers, firewalls, and application delivery controllers will need to be IPv6–ready and capable of understanding the protocols and data that devices will use to communicate. To ensure security, intelligent routing, and analytics, networking layers will need to be fluent in the language that devices use. Understanding these protocols within the network will allow traffic to be secured, prioritized, and routed accordingly. Recognizing and prioritizing these messages will enable better scalability and manageability for the onslaught of device traffic and data. Intelligence will also be needed to categorize what data needs attention (like a health monitor alert) and what doesn’t (like temperature is good). According to TechTarget, ensuring high availability of the IoT services will rely on boosting traffic management and monitoring. This will both mitigate business 5 6 7 WHITE PAPER The Internet of Things–Ready Infrastructure ® 5 WHITE PAPER The Internet of Things–Ready Infrastructure ®
  • 7. and data that devices will use to communicate. To ensure security, intelligent routing, and analytics, networking layers will need to be fluent in the language that devices use. Understanding these protocols within the network will allow traffic to be secured, prioritized, and routed accordingly. Recognizing and prioritizing these messages will enable better scalability and manageability for the onslaught of device traffic and data. Intelligence will also be needed to categorize what data needs attention (like a health monitor alert) and what doesn’t (like temperature is good). According to TechTarget, ensuring high availability of the IoT services will rely on boosting traffic management and monitoring. This will both mitigate business continuity risks, and prevent potential losses. From a project planning standpoint, organizations need to do capacity planning and watch the growth rate of the network so that the increased demand for the required bandwidth can be met. Figure 1: Intelligent application delivery for the IoT The IoT–ready infrastructure The F5 SDAS fabric provides a foundation for building elastic IoT application services. F5 ScaleN™ technology enables on-demand application and operational scalability at the platform layer. This means the fabric can be deployed on a combination of hardware, software, and virtual form factors—as well as beyond the data center boundary into cloud computing environments. Avoiding a single point of failure The IoT applications will come in all shapes and sizes. But no matter the size, availability is paramount to support both subscribers and the business. The most basic high-availability architecture is the typical three-tier design. A pair of Application Delivery Controllers (ADCs) in the DMZ terminates the connection. They, in turn, intelligently distribute the client request to a pool (multiple) of IoT application servers, which then query the database servers for the appropriate content. Each tier has redundant servers so in the event of a server outage, the others take the load and the system stays available. This is a tried-and-true design for most operations and provides resilient application availability, IoT or not, within a typical data center. But fault tolerance between two data centers is even more reliable than multiple servers in a single location, simply 7 8 WHITE PAPER The Internet of Things–Ready Infrastructure ® 6 WHITE PAPER The Internet of Things–Ready Infrastructure ®
  • 8. The IoT applications will come in all shapes and sizes. But no matter the size, availability is paramount to support both subscribers and the business. The most basic high-availability architecture is the typical three-tier design. A pair of Application Delivery Controllers (ADCs) in the DMZ terminates the connection. They, in turn, intelligently distribute the client request to a pool (multiple) of IoT application servers, which then query the database servers for the appropriate content. Each tier has redundant servers so in the event of a server outage, the others take the load and the system stays available. This is a tried-and-true design for most operations and provides resilient application availability, IoT or not, within a typical data center. But fault tolerance between two data centers is even more reliable than multiple servers in a single location, simply because that one data center is a single point of failure. Cloud: The IoT enabler The cloud has become one of the primary enablers for IoT. Within the next five years, more than 90 percent of all IoT data will be hosted on service provider platforms. That’s because cloud computing reduces the complexity of supporting IoT “Data Blending.” In order to achieve or even maintain continuous IoT application availability and keep up with the pace of new IoT application rollouts, service providers must explore expanding their data center options. Having access to cloud resources provides service providers with the agility and flexibility to quickly provision IoT services. The cloud offers organizations a way to manage IoT services, rather than boxes along with just-in-time provisioning. Cloud enables IT as a Service, just as IoT is a service, along with the flexibility to scale when needed. Integrating cloud-based IoT resources into the architecture requires only a couple of pieces: connectivity, along with awareness of how those resources are being used. The connectivity between a data center and the cloud is generally referred to as a cloud bridge. The cloud bridge connects the two data center worlds securely and provides a network compatibility layer that bridges the two networks. This provides a transparency that allows resources in either environment to communicate without concern for the underlying network topology. Once a connection is established and network bridging capabilities are in place, resources provisioned in the cloud can be non-disruptively added to the data center–hosted pools. From there, load is distributed per the F5 BIG-IP® platform’s configuration for the resource, such as an IoT application. By integrating the enterprise data center with external clouds, the cloud becomes a secure extension of the enterprise’s IoT network. This enterprise-to-cloud network connection is encrypted and optimized for performance and bandwidth, thereby reducing the risks and lowering the effort involved in migrating IoT workloads to the cloud. Maintain seamless delivery This hybrid infrastructure approach, including cloud resources, for IoT deployments not only allows service providers to distribute their IoT applications and services when it makes sense, but also provides global fault tolerance to the overall system. Depending on how the disaster recovery infrastructure is designed, this can be an active site, a hot standby, a leased hosting space, a cloud provider, or some other contained compute location. As soon as that IoT server, application, or even 8 9 WHITE PAPER The Internet of Things–Ready Infrastructure ® 7 WHITE PAPER The Internet of Things–Ready Infrastructure ®
  • 9. center–hosted pools. From there, load is distributed per the F5 BIG-IP® platform’s configuration for the resource, such as an IoT application. By integrating the enterprise data center with external clouds, the cloud becomes a secure extension of the enterprise’s IoT network. This enterprise-to-cloud network connection is encrypted and optimized for performance and bandwidth, thereby reducing the risks and lowering the effort involved in migrating IoT workloads to the cloud. Maintain seamless delivery This hybrid infrastructure approach, including cloud resources, for IoT deployments not only allows service providers to distribute their IoT applications and services when it makes sense, but also provides global fault tolerance to the overall system. Depending on how the disaster recovery infrastructure is designed, this can be an active site, a hot standby, a leased hosting space, a cloud provider, or some other contained compute location. As soon as that IoT server, application, or even location starts to have trouble, a service provider can seamlessly maneuver around the issue and continue to deliver its services to the devices. Advantages for a range of industries The various combinations of hybrid infrastructure types can be as diverse as the IoT situations that use them. Service providers probably already have some level of hybrid, even if it is a mix of owned space plus SaaS. In most cases, the preference is to keep sensitive assets in-house, but this approach has started to shift, with increased migration of workloads to hybrid data centers. It all depends on the industry. For example, financial industries have different requirements than retail. Retail will certainly need a boost to its infrastructure as more customers will want to test IoT devices in-store. Whatever the case may be, service providers are in a unique situation as they will ultimately be touched by all this increased data traffic. The service provider industry is well on its way to building out the IoT–ready infrastructures and services. One major service provider is deploying BIG-IP virtual editions to provide the ADC functionality needed for the scale and flexibility of its connected-car project. Virtualized solutions are required for NFV to enable the agility and elasticity necessary to support the IoT infrastructure demands. The IoT–ready platform Because F5 application services share a common control plane—the F5 platform— the process of deploying and optimizing IoT application delivery services is simplified. With the elastic power of SDAS, organizations can rapidly provision IoT application services across the data center and into cloud computing environments, reducing the time and costs associated with deploying new applications and architectures. The beauty of SDAS is that it can provide the global services to direct the IoT devices to the most appropriate data center or hybrid cloud depending on the request, context, and application health. Subscribers, employees, and the IoT devices themselves receive the most secure and fastest experience possible. The F5 high-performance services fabric supports traditional and emerging underlay networks. It can be deployed on top of a traditional IP and VLAN-based networks, works with SDN overlay networks using NVGRE or VXLAN (as well as a variety of WHITE PAPER The Internet of Things–Ready Infrastructure ® 8 WHITE PAPER The Internet of Things–Ready Infrastructure ®
  • 10. • • • • • • • application services across the data center and into cloud computing environments, reducing the time and costs associated with deploying new applications and architectures. The beauty of SDAS is that it can provide the global services to direct the IoT devices to the most appropriate data center or hybrid cloud depending on the request, context, and application health. Subscribers, employees, and the IoT devices themselves receive the most secure and fastest experience possible. The F5 high-performance services fabric supports traditional and emerging underlay networks. It can be deployed on top of a traditional IP and VLAN-based networks, works with SDN overlay networks using NVGRE or VXLAN (as well as a variety of less well-known overlay protocols), and integrates with SDN fabrics, such as those from Cisco/Insieme, Arista, and BigSwitch, among others. Hardware, software—or cloud The services fabric model enables consolidation of services onto a common platform that can be deployed on hardware, on software, or in the cloud. This reduces operational overhead by standardizing management as well as enabling deployment processes that support continuous delivery efforts. By sharing service resources and leveraging fine-grained multi-tenancy, the cost of individual services is dramatically reduced, enabling all IoT applications—regardless of size—to take advantage of services that are beneficial to their security, reliability, and performance. The F5 platform: Provides the network security to protect against inbound attacks Offloads SSL to improve the performance of the application servers Not only understands the application but also knows when it is having problems Ensures not only the best end-user experience but also quick and efficient data replication F5 cloud solutions can automate and orchestrate the deployment of IoT application delivery services across both traditional and cloud infrastructures while also managing the dynamic redirection of workloads to the most suitable location. These application delivery services ensure predictable IoT experiences, a replicated security policy, and workload agility. F5 BIG-IQ™ Cloud can federate management of BIG-IP solutions across both traditional and cloud infrastructures, helping organizations deploy and manage IoT delivery services in a fast, consistent, and repeatable manner, regardless of the underlying infrastructure. In addition, BIG-IQ Cloud integrates or interfaces with existing cloud orchestration engines such as VMware vCloud Orchestrator to streamline the overall process of deploying applications. Extend, scale—and secure F5 cloud solutions offer a rapid Application Delivery Network provisioning solution, drastically reducing the lead times for expanding IoT delivery capabilities across data centers, whether they are private or public. As a result, service providers can efficiently: Extend data centers to the cloud to support IoT deployments Scale IoT applications beyond the data center when required Secure and accelerate IoT connections to the cloud For maintenance situations, service providers no longer need to manually redirect traffic by configuring applications. Instead, IoT applications are proactively redirected WHITE PAPER The Internet of Things–Ready Infrastructure ® 9 WHITE PAPER The Internet of Things–Ready Infrastructure ®
  • 11. • • • F5 Silverline™ DDoS Protection is a service delivered via the Silverline DDoS Protection cloud-based platform that provides continuous DDoS protection, detection, and mitigation to stop even the largest volumetric DDoS attacks from reaching IoT networks. Extend, scale—and secure F5 cloud solutions offer a rapid Application Delivery Network provisioning solution, drastically reducing the lead times for expanding IoT delivery capabilities across data centers, whether they are private or public. As a result, service providers can efficiently: Extend data centers to the cloud to support IoT deployments Scale IoT applications beyond the data center when required Secure and accelerate IoT connections to the cloud For maintenance situations, service providers no longer need to manually redirect traffic by configuring applications. Instead, IoT applications are proactively redirected to an alternate data center prior to maintenance. The BIG-IP platform is application and location agnostic, meaning the type of application or where the application lives really does not matter. As long as you tell the BIG-IP platform where to find the IoT application, the BIG-IP platform will deliver it. Bringing it all together, F5 Synthesis gives cloud and application providers, as well as mobile network operators, the architectural framework necessary to ensure the performance, reliability, and security of IoT applications. Conclusion Connected devices are here to stay—forcing us to move forward into this brave new world where almost everything generates data traffic. While there’s much to consider, proactively addressing these challenges and adopting new approaches for enabling an IoT–ready network will help service providers chart a clearer course toward success. An IoT–ready environment can enable service providers to begin taking advantage of this societal shift without a wholesale rip-and-replace of existing technology. It also provides the breathing room needed to ensure that the coming rush of connected devices does not cripple the network infrastructure. This process ensures benefits will be realized without compromising on the operational governance required to ensure availability and security of the IoT network, data, and application resources. It also means service providers can manage IoT services instead of boxes. However an IoT–ready infrastructure is constructed, it is a transformational journey. It is not something that should be taken lightly or without a long-term strategy in place. When done properly, an F5-powered IoT–ready infrastructure can bring significant benefits to service providers, their employees, and their subscribers. http://www.gartner.com/newsroom/id/2905717 http://www.forbes.com/sites/gilpress/2014/08/22/internet-of-things-by-the-numbers- market-estimates-and-forecasts/ http://wso2.com/whitepapers/a-reference-architecture-for-the-internet-of-things/ http://eclipse.org/community/eclipse_newsletter/2014/february/article2.php http://www.gartner.com/webinar/2862818 IDC Directions, “Battle for the Future of the Datacenter: The Role of Disaggregated Systems,” Mar 2014 http://searchsecurity.techtarget.com/tip/Internet-of-Things-IOT-Seven-enterprise-risks-to- consider 1 2 3 4 5 6 7 8 WHITE PAPER The Internet of Things–Ready Infrastructure ® 10 WHITE PAPER The Internet of Things–Ready Infrastructure ®
  • 12. http://www.gartner.com/newsroom/id/2905717 http://www.forbes.com/sites/gilpress/2014/08/22/internet-of-things-by-the-numbers- market-estimates-and-forecasts/ http://wso2.com/whitepapers/a-reference-architecture-for-the-internet-of-things/ http://eclipse.org/community/eclipse_newsletter/2014/february/article2.php http://www.gartner.com/webinar/2862818 IDC Directions, “Battle for the Future of the Datacenter: The Role of Disaggregated Systems,” Mar 2014 http://searchsecurity.techtarget.com/tip/Internet-of-Things-IOT-Seven-enterprise-risks-to- consider http://support.rightscale.com/12- Guides/Designers_Guide/Cloud_Solution_Architectures/Designing_and_Deploying_High- Availability_Websites IDC FutureScape Internet of Things: http://www.machinetomachinemagazine.com/2014/12/04/idc-report-worldwide-iot- predictions-for-2015/ 1 2 3 4 5 6 7 8 9 WHITE PAPER The Internet of Things–Ready Infrastructure ® 11 F5 Networks, Inc. 401 Elliot Avenue West, Seattle, WA 98119 888-882-4447 www.f5.com Americas info@f5.com Asia-Pacific apacinfo@f5.com Europe/Middle-East/Africa emeainfo@f5.com Japan f5j-info@f5.com ©2015 F5 Networks, Inc. All rights reserved. F5, F5 Networks, and the F5 logo are trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. Other F5 trademarks are identified at f5.com. Any other products, services, or company names referenced herein may be trademarks of their respective owners with no endorsement or affiliation, express or implied, claimed by F5. CS04-00015 0113 WHITE PAPER The Internet of Things–Ready Infrastructure ®