Data Center Networking
Article | July 5, 2023
Transparency, explainability and trust are big and pressing topics in AI/ML today. Nobody wants to find themselves at the receiving end of a black AI box system that makes consequential decisions (e.g., about jobs, healthcare, citizenship, etc.), especially if those decision are unfair, biased, or just plainly not in our favor. And most organizations agree that consumer trust and confidence that AI is being used ethically and transparently are key to unlocking its true potential.
And while there are literally hundreds of documents describing and prescribing AI principles, frameworks and other good things, last year there was no practical tool that could help with implementing transparency. And this tool is AI registers…
The Cities of Helsinki and Amsterdam jointly announce the launch of their public AI registers. The two registers were developed in collaboration with Saidot.ai, a Finnish company which specializes in “bringing transparency to consumer services” and which, to the best of my knowledge, is the only vendor in this space.
The idea for the company grew from the personal frustration of its founder and CEO, Meeri Haataja, who was “seeing how important transparency of AI is for the future of each one of us, and not being able to find too many meaningful ways to act on it.”
Read More
Network Infrastructure, Network Management
Article | July 27, 2023
GlobalConnect and Versa Networks entered into a SD-WAN partnership last year. Under the terms of the collaboration, Versa’s Secure Cloud IP architecture, which is a next-generation software platform that delivers integrated cloud, networking and security services, accelerated the productivity of GlobalConnect’s 18,000sqm of data centre space and more than 42,000km of optical fibre network. “With the Versa Networks partnership, GlobalConnect aims to efficiently and securely manage more features with a higher level of flexibility,” said Sebastian Vad Lorentzen, head of SD-WAN engineering at GlobalConnect.
Read More
Network Infrastructure, Network Management
Article | July 10, 2023
5G small cells form the backbone of the modern wireless networks. Learn more about this technology is revolutionizing 5G deployment and enabling various use cases across industries in this article.
Contents
1 Introduction to 5G Small Cells for Modern Businesses
2 5G Small Cells: Overview
2.1 Characteristics of 5G Small Cells
2.2 How Small Cells Fit into 5G Architecture
3 Benefits of 5G Small Cells for Businesses
3.1 Improved Coverage and Capacity
3.2 Enhanced Network Performance
3.3 Lower Latency
3.4 Cost-effectiveness
4 Use Cases for 5G Small Cells
4.1 Urban Areas
4.2 Rural Areas
4.3 Indoor Environments
5 Conclusion
1 Introduction to 5G Small Cells for Modern Businesses
Small cells are low-power radio access nodes that operate in licensed and unlicensed spectrum bands and are typically deployed in areas with high demand for wireless connectivity. They are a vital component of the 5G wireless network architecture and are designed to complement traditional cell towers, providing improved coverage, network capacity, and faster data speeds. Small cells come in several types, including femtocells, picocells, and microcells, and can be deployed according to the use case.
2 5G Small Cells: Overview
2.1 Characteristics of 5G Small Cells
5G small cells are characterized by small form factors and are designed to be compact and discreet for deployment in various settings, such as urban areas, rural areas, indoor environments, and public spaces. In addition, they consume less power than traditional cell towers, making them more energy-efficient. They also operate on high-frequency bands, which enables them to provide faster data speeds and lower latency than traditional cell towers, which makes small cells essential for 5G.
The 5G small cell architecture can be deployed in dense networks, providing better coverage and capacity in areas where traditional cell towers may not be able to reach. Also, a 5G small cell antenna can be configured to provide seamless handoffs between cells, ensuring users have a consistent and uninterrupted wireless experience. These characteristics make them ideal for specific 5G use cases, which will be explored further in the article.
2.2 How Small Cells Fit into 5G Architecture
Small cells and 5G evolution are closely linked, and this technology is an ideal solution for future wireless networks. They offer greater capacity, coverage, and flexibility than traditional cell towers, allowing them to meet the demands of an increasingly connected world.
By operating on high-frequency bands and being deployed in dense networks, small cells in 5G can provide faster data speeds, lower latency, and better coverage than previous generations of wireless networks. Additionally, their small form factor and flexible deployment options allow for use cases like private 5G networks that revolutionize industries.
3 Benefits of 5G Small Cells for Businesses
5G networks will support a massive increase in connected devices, including smartphones, IoT sensors, and other devices. Small cells are critical for achieving the full potential of 5G networks and the exciting new applications and services they will enable.
3.1 Improved Coverage and Capacity
5G small cells offer improved coverage over traditional cell towers in certain situations, particularly in urban areas. Buildings and other obstacles interfere with wireless signals, so the connection quality decreases in areas with such infrastructure. By deploying small cells closer to users, the network can provide better coverage and capacity in these areas.
Small cells can also be deployed indoors, providing better coverage and capacity in buildings and other enclosed spaces. This is important due to poor wireless range, signal interference from walls, and other obstacles. By deploying small cells indoors, the network can provide better coverage and capacity in these areas, improving the overall wireless experience for users.
3.2 Enhanced Network Performance
The deployment of small cells enables network densification, which allows several devices to connect to the network simultaneously. This can help reduce network congestion and improve overall network performance, particularly in urban areas. They can also be configured to provide seamless handoffs between cells, ensuring that users have a consistent and uninterrupted wireless experience. This is important because users often move between different areas with different coverage levels and capacities, providing a streamlined experience.
3.3 Lower Latency
Small cells are designed to operate on high-frequency bands, which enables them to provide faster data speeds and lower latency than prior generations of wireless networks. This is especially important for applications that require real-time communication, such as virtual reality, autonomous vehicles, and remote surgery. By providing faster data speeds and lower latency, small cells can help enhance these applications' performance, providing a better overall user experience.
3.4 Cost-effectiveness
Small cells offer a cost-effective alternative to traditional cell towers, particularly in urban areas with high land and real estate costs. By mounting 5G small cell antennas on existing infrastructure, such as lampposts and buildings, deployment costs can be lowered. Additionally, small cells can be deployed in a modular fashion, allowing for targeted and cost-effective expansion based on the required coverage and capacity. This approach avoids large-scale and expensive deployments of new infrastructure. Moreover, small cells can be powered by low-cost, low-power sources like solar panels or batteries, reducing ongoing operational costs. Furthermore, small cells consume less power than traditional cell towers, resulting in lower energy costs.
4 Use Cases for 5G Small Cells
4.1 Urban Areas
As discussed previously, small cell radio antennas in 5G can improve networks in dense urban environments, alleviating network congestion and improving data speeds. In addition, by deploying small cells in areas with high user demand, network operators can provide targeted coverage and capacity improvements to specific areas, ensuring that users have fast and reliable connectivity.
4.2 Rural Areas
Small cells can be used to extend coverage to underserved or unserved areas by traditional cell towers. They can fill in coverage gaps, providing reliable connectivity to users in rural areas that may not have access to high-quality wireless services. This will enable use cases such as remote workforces in rural areas, smart agriculture, and distance education and training.
4.3 Indoor Environments
Traditional cell towers may not be able to provide reliable connectivity indoors due to physical barriers such as thick walls and ceilings. Small cells can provide targeted coverage and capacity to specific areas, such as conference rooms or shopping malls, where users require high-quality wireless connectivity. In addition to improving range, small cells can help alleviate network congestion and improve data speeds in high-traffic indoor environments.
5 Final Thoughts
Small cells are a crucial element in developing and implementing 5G technology. By leveraging a small form factor and high-frequency band usage, small cells facilitate the deployment of 5G networks in a more cost-effective and targeted manner than traditional cell towers. They support a wide range of use cases by providing reliable and high-quality wireless connectivity to a growing number of devices. They will continue to be a critical technology for businesses and organizations seeking to leverage the benefits of 5G technology.
Read More
Article | August 31, 2021
Network security today is losing the battle and a lot of it is blamed upon the traditional security devices. Imagine running next-gen IT Infrastructure secured by security tools made to secure legacy IT.Data breaches have increased substantially and IT professionals are continuously looking at new ways to improve their network security. In this scenario, SD-WAN emerges as one formidable option to implementthat will bolster your network security.
Table of Contents:
- What is SD-WAN?
- How does SD-WAN work?
- What are the main benefits of SD_WAN to network security?
- What are the other advantages of SD-WAN?
.
Let’s dig into it.
What is SD-WAN?
SD-WAN stands for software-defined wide area network (or networking). A WAN is a connection between local area networks (LANs) separated by a substantial distance—anything from a few miles to thousands of miles. The term software-defined implies the WAN is programmatically configured and managed. So, it can be easily adapted quickly to meet changing needs.
How does SD-WAN work?
An SD-WAN connects end users to virtually any application, hosted at any location (e.g., in the public cloud or a company data center), via the best available or most feasible transport service, whether that’s an MPLS (Multiprotocol Label Switching), broadband, cellular or even satellite internet link. To deliver this level of flexibility and performance to users in digital workspaces, an SD-WAN utilizes a control function that continuously analyzes traffic flows across the WAN and intelligently directs traffic in accordance with current policies.
Centralized control
The primary means of control in an SD-WAN is centralized. It often resides in a SaaS application running on a public cloud. Control is decoupled from the hardware to simplify network management and improve the delivery of services. SD-WAN appliances (and virtual appliances) follow operational rules passed down from the central controller. This greatly reduces or eliminates the need to manage gateways and routers on an individual basis.
Multi-connection, multi-transport
SD-WAN gateways support hybrid WAN, which implies that each gateway can have multiple connections using different transports—MPLS, broadband Internet, LTE, etc. A virtual private network (VPN) is typically set up across each WAN connection for security. Consequently, the SD-WAN can be an overlay spanning a diverse communications infrastructure.
Dynamic path selection
Another feature of SD-WAN is dynamic path selection—the ability to automatically and selectively route traffic onto one WAN link or another depending on network conditions or traffic characteristics. Packets may be steered onto a particular link because another link is down or not working very well, or to balance network traffic across all available links. SD-WAN can also identify packets by application, user, source/destination, etc. and send them down one path or another based on those characteristics.
Policy-based management
Policy is what determines where dynamic path selection will steer traffic and what level of priority (quality of service, or QoS) it is given. Business intentions can be implemented as policies via the central management console. New and updated policies are translated into operational rules and downloaded to all SD-WAN gateways and routers under control.
For example, to ensure the best performance for VoIP and interactive web conferences, a policy may be created by giving their packets transmission priority and routing them onto low-latency paths. Cost savings can be realized by sending file back-ups across a broadband Internet connection. WAN traffic that requires a high level of security can be restricted to private connections (e.g., MPLS) between sites and required to pass through a robust security stack when entering the enterprise.
Service chaining
SD-WAN has the ability chain itself together with other network services. WAN optimization (acceleration) is often combined with SD-WAN to improve network and application performance. Internet traffic leaving and entering a branch office may be routed across a VPN to a cloud-base security service to strike a balance between performance, security, and cost.
Read more: GET THE MOST OUT OF YOUR SD-WAN: FEATURES YOU NEED TO START USING TODAY
What are the main benefits of SD_WAN to network security?
Eliminate VPN concerns
One of the first areas in which SD-WAN impacts security is when a company uses the internet as a method of transport.
Before SD-WAN came along and companies were using internet as a backup or even a primary transport method, they would build a VPN or a DMVPN to ensure secure transport of their traffic. This introduces a couple of issues, the first of which is this proliferation of VPNs that has to be managed. The company must have firewalls sitting at their data center, along with a VPN device or firewall sitting in the remote locations to be able to do these VPNs. Every site is dependent on the effort to be up on the network.
- Hamza Seqqat, Director of Solutions Architecture, Apcela
Failover is an issue with this VPN approach, he said. Companies can’t seamlessly failover from a fiber-based type of transport without having to strike some keys in between. It's hard and expensive to do seamless failover.
“Now you don't have to have firewalls for VPNs. You don't have to worry about building your own VPNs or encrypting your traffic,” Seqqat said. “Every SD-WAN product comes with a controller that takes care of things seamlessly. That means there is this smart software-defined engine that builds all these IPsec tunnels between all the locations as soon as you plug the device in. You're not actually having to build a VPN—the controller does it automatically for you, so all you have to do is give the device an IP address or enable DHCP and let it pick an IP address from the DHCP server. Suddenly it's on the network and its building tunnels to all the sites.”
He added that the SD-WAN controller builds a full mesh, so it can talk to every one of the sites without having to go back to the data center. This feature alone can reduce a company’s security footprint significantly because the site-to-site traffic becomes secure, easy, and seamless.
Reduce traffic going through security
A second significant benefit of SD-WAN that impacts security strategy is that it reduces the amount of traffic that needs to go through security parameters because all site-to-site traffic is encrypted. This makes security a bit easier to manage.“For a lot of companies, when they do VPNs for site-to-site traffic, they have to go through firewalls or some kind of encryption mechanism, and that increases their security footprint. It increases the complexity and the cost of security,” Seqqat said. “SD-WAN changes how traffic is routed through security.”
Seqqat gave an example of a site that has a gig worth of bandwidth, and out of that gig of bandwidth, some traffic goes to the internet and some goes to site-to-site.
“Without SD-WAN, generally you would have to run that whole gig through a firewall, and the firewall will split the traffic into what goes to the data center and what goes to the internet,” he said. “When you do SD-WAN, you don't have to do that. You can separate the traffic at the SD-WAN with a split tunnel, so you take half of the traffic and push it through the firewall to go to the internet and the other half goes straight site-to-site without having to go through a security parameter. Now you have a firewall to handle 500 megs as opposed to a gig, and that makes a huge difference because most security products are based on throughput and utilization. So, that can bring some cost benefits and ease management as well.”
Security inherent to SD-WAN
A third area where SD-WAN changes security strategy is the fact that certain security features can be implemented directly through the SD-WAN platform, which reduces costs and complexity in the actual security platform.
“This depends on what aspects of security you're talking about,” Seqqat said. “For example, security is included in the Silverpeak SD-WAN product, so the Silverpeak devices really do most of the security for you. You don't have to deploy another firewall on top of that. With Versa’s SD-WAN, you can virtualize the firewall, so there’s no need to deploy physical firewalls.”
For sites that simply need very basic security, SD-WAN has some inherent security capabilities. It can do things such as allow and deny certain sites and limit traffic that goes to certain sites.
When you look at most SD-WAN products, you can usually kind of steer toward one or another based on your security requirements. Deploying SD-WAN in itself can really eliminate the need for security at several locations or extend the security you have been using.
- Hamza Seqqat, Director of Solutions Architecture, Apcela
Simplify use of security platforms
In his final point, Seqqat said SD-WAN providers are making a lot of progress in partnering with both cloud security providers and cloud service providers. By making traffic encrypted and secure via SD-WAN, security platforms will only have to deal with public internet traffic.
“SD-WAN providers are really working towards partnering and certifying different security products,” he said. “Consider Zscaler as an example. Some SD-WAN products automatically route all your traffic through Zscalar, which does a cloud-based security parameter before it goes out to the internet or to cloud service providers.”
Seqqat said the most important part comes in the fact that Zscalar is distributed across 35 or 40 data centers that are all security parameters.
“Making that routing decision as to what data center your traffic goes through before it goes out to the Internet is extremely important to performance,” he said. “If your Office 365 instance is hosted in Seattle and your users in Europe are trying to reach that, which Zscalar data center the traffic is going to go through before it goes through the Seattle instance of O365 makes all the difference in what latency is going to be at round trip.
“SD-WAN provides somewhat of an automation and optimization of how traffic goes through Zscalar data centers based on performance metrics. SD-WAN can pull latency and jitter and packet loss and all that kind of stuff, so there is some intelligence that happens when a routing decision is being made as to where user traffic is going to go for security scrubbing or security features before it goes out to the cloud provider or to the Internet. That’s a huge feature that comes into play whenever you deploy SD-WAN.”
Read more: FOR SERVICE PROVIDERS SD-WAN IS A MIXED BLESSING
What are the other advantages of SD-WAN?
SD-WAN has many advantages when implemented well:
More predictable and reliable application performance, which helps support users in any digital workspace, across all connections. Superior connection security for cloud applications, without the performance tradeoffs of MPLS backhauling. Congestion reduction due to lack of bandwidth or brownouts with aggregation of bandwidth via multiple bonded and disparate or redundant links.
More reliable access to apps and fewer slowdowns due to congestion.
Resiliency and redundancy with fast failover when outages impact WAN connections.
Quality of service for prioritizing business-critical application traffic.
Fast deployments that fuel business agility when bringing applications online at a branch office, or simply changing the configurations. Zero-touch provisioning allows fast set up of sites in minutes with local staff instead of hours or days.
Reduced network transport costs and more flexibility through the use of MPLS-alternatives like broadband and cellular. Quick procurement of bandwidth from multiple transport services, contrast to the long lead times needed with legacy WAN carrier-based technologies.
Simplified administration with a centralized console eliminates the complexity of configuring edge devices in the field.
Deep SD-WAN analytics to monitor links for performance characteristics. Analytics benefit administrators who can use them when troubleshooting problems across the WAN.
Simpler branch office infrastructure that doesn’t require management of as many single-function devices
Intelligent traffic steering and dynamic path selection
Integrated security with leading 3rd-party solutions, including those for SaaS security
Conclusion
Interest in SD-WAN among organizations is on the rise, and we hope to see a tremendous rise in its adoption in network security strategies over the next few years. Vendor selection will be one of the factor for successful implementation of SD-WAN, as many are quickly developing new and effective software-defined platforms. An ideal vendor would be the one who effectively addresses your specific pain points and is able to meet your current as well as future requirements.
Read more: SD-WAN SECURITY: THE IMPACT OF ORCHESTRATED SERVICES MULTIPLICITY
Read More