In the second part of my blog series I want to cover one of the main concerns that Services Providers are facing as they explore moving to NFV and that is performance and scalability. Common concerns I hear center around latency, throughput, queuing capabilities and security. These are valid concerns since SP’s have service level agreement (SLA’s) with the their customers which lead to penalties if performance drops below the SLA. So will a virtualized network function perform at the same level as a purpose built networking device? Read More »
The situation that many IT people find themselves in today is dripping with irony. They’ve deployed so many innovations over the years to address so many business challenges, that now most of their time is dedicated to simply keeping their systems running. Without incremental resources during these lean budget times, their new innovation cycles decline in direct proportion to their past innovations.
Given the current budget realities, how can IT break out of this innovation trap?
“The past is never dead. It’s not even past.” -- William Faulkner
Networking which is built on open standards is steadily moving to closed and proprietary protocols and going back to the past of mainframes with closed architectures and technologies. With Massively Scalable Data Centers (MSDC) the compute and storage resource are increasingly being connected in proprietary ways. The networks and protocols in these MSDCs is becoming proprietary and potentially moving away from the open TCP/IP standards. And that is a very worrisome trend, not speaking as a vendor but as a networking technologist, who has been in this industry for over 20 years. Let me explain why.
The rise of MSDCs and the growing IaaS (Infrastructure as a Service) from the likes of Amazon, Microsoft, Google is well understood. This IaaS trend is causing more and more enterprises to move their infrastructure into these clouds, instead of buying and maintaining them. Obviously this is affecting networking infrastructure vendors, like Cisco, Juniper et al, and also managed service providers. The effect on infrastructure vendors is simple: their TAM is shrinking, and rapidly so. For managed service providers, the need for rich networking services, when enterprises maintained their own infrastructure, is dwindling rapidly as well. With IaaS, enterprises just need a simple connection to get to the Amazon, Microsoft and Google clouds and do not heavily depend on managed service providers. Usually the service providers such as AT&T, Verizon, Comcast are also managed service providers and are increasingly becoming cloud service providers as well to mitigate this effect and still be relevant to these enterprise customers. But, how is this making networking closed off?
In the ever-changing world of enterprise branch environments, a high number of businesses are planning to migrate their WAN to the Internet. To be exact, Nemertes Research (Benchmark 2012–13 Emerging WAN Trends) estimates that number to be close to 50%. That’s 50% of businesses migrating to Internet for WAN.
And why is that happening? Enterprises are trying to optimize their WAN to increase ROI. Internet has become a much more stable platform, offering significant price-to-performance gains. Thus, the growth of new cloud traffic, high bandwidth applications, and video can be easily load balanced across multiple WAN lines, one of which or both can be Internet links. Some of the enterprises go even further and enable local Internet breakout from the branch. Not only does it eliminate the need to unnecessarily backhaul the traffic to the corporate HQ or data center, but also helps to free up the precious WAN bandwidth for critical business related applications. This enables enterprises to provide guest Internet access within the branch and then slowly offer the same services to corporate users, both for trusted public clouds applications and general Internet access. Read More »
In my discussions with security executives who gathered at the recent Gartner Security Summit they recognized that unsecured access to the network is a critical threat vector. However, when leveraged properly, the network itself also provides a significant platform that offers comprehensive protection to close those gaps. What does this mean?