Network Infrastructure, Network Management
Article | July 10, 2023
The third Annual OCP China Day, organized by the Open Compute Project (OCP) Foundation and hosted by Inspur, will be held on July 27, 2021 in Beijing. It marks another step in the right direction to popularizing open computing across the globe. This year is the tenth anniversary of the open compute project and the theme of OCP China Day is “Open compute for a new decade: Decarbonization, Efficiency, Adoption”.
Omdia has tracked the open computing market in detail for 5 years and over that period we have seen the end-user base expand and adoption take off. We expect 40% of the servers shipped in 2025 to be developed based on open standard, up from 7% in 2016. This is a very significant number, partularly given that our forecast takes into account large scale adoption at only two or three of the hyperscale cloud service providers. Most of the net new deployments are expected to be at tier-2 cloud, communication service providers and enterprises, including the public or government sector.
Read More
Wireless, 5G
Article | May 18, 2023
Despite the COVID-induced interruptions in the first half of 2020, 5G preparations and deployment continued in earnest in the second half of 2020 and now the market – vendors, CSPS, OEMs – are ready to bring 5G to the masses of users. The arrival of Apple’s first 5G devices in 4Q20 marked the tipping point of global consumer readiness, now extending from early-adopters. After the initial phase of network launches that saw coverage built-out in major urban centres, 5G service providers should now focus on expanding coverage to as many areas of high-data demand as possible. At the same time, as CSPs gauge their 5G roll-out strategies, they shouldn’t ignore rural areas with limited-to-no high-speed broadband coverage. In many markets, particularly developing ones, CSPs should carefully assess network-sharing as a way to cost-effectively tap pent-up demand, especially given the accelerating remote working trend.
Read More
Enterprise Mobility, Mobile Infrastructure
Article | June 16, 2023
Network security today is losing the battle and a lot of it is blamed upon the traditional security devices. Imagine running next-gen IT Infrastructure secured by security tools made to secure legacy IT.Data breaches have increased substantially and IT professionals are continuously looking at new ways to improve their network security. In this scenario, SD-WAN emerges as one formidable option to implementthat will bolster your network security.
Table of Contents:
- What is SD-WAN?
- How does SD-WAN work?
- What are the main benefits of SD_WAN to network security?
- What are the other advantages of SD-WAN?
.
Let’s dig into it.
What is SD-WAN?
SD-WAN stands for software-defined wide area network (or networking). A WAN is a connection between local area networks (LANs) separated by a substantial distance—anything from a few miles to thousands of miles. The term software-defined implies the WAN is programmatically configured and managed. So, it can be easily adapted quickly to meet changing needs.
How does SD-WAN work?
An SD-WAN connects end users to virtually any application, hosted at any location (e.g., in the public cloud or a company data center), via the best available or most feasible transport service, whether that’s an MPLS (Multiprotocol Label Switching), broadband, cellular or even satellite internet link. To deliver this level of flexibility and performance to users in digital workspaces, an SD-WAN utilizes a control function that continuously analyzes traffic flows across the WAN and intelligently directs traffic in accordance with current policies.
Centralized control
The primary means of control in an SD-WAN is centralized. It often resides in a SaaS application running on a public cloud. Control is decoupled from the hardware to simplify network management and improve the delivery of services. SD-WAN appliances (and virtual appliances) follow operational rules passed down from the central controller. This greatly reduces or eliminates the need to manage gateways and routers on an individual basis.
Multi-connection, multi-transport
SD-WAN gateways support hybrid WAN, which implies that each gateway can have multiple connections using different transports—MPLS, broadband Internet, LTE, etc. A virtual private network (VPN) is typically set up across each WAN connection for security. Consequently, the SD-WAN can be an overlay spanning a diverse communications infrastructure.
Dynamic path selection
Another feature of SD-WAN is dynamic path selection—the ability to automatically and selectively route traffic onto one WAN link or another depending on network conditions or traffic characteristics. Packets may be steered onto a particular link because another link is down or not working very well, or to balance network traffic across all available links. SD-WAN can also identify packets by application, user, source/destination, etc. and send them down one path or another based on those characteristics.
Policy-based management
Policy is what determines where dynamic path selection will steer traffic and what level of priority (quality of service, or QoS) it is given. Business intentions can be implemented as policies via the central management console. New and updated policies are translated into operational rules and downloaded to all SD-WAN gateways and routers under control.
For example, to ensure the best performance for VoIP and interactive web conferences, a policy may be created by giving their packets transmission priority and routing them onto low-latency paths. Cost savings can be realized by sending file back-ups across a broadband Internet connection. WAN traffic that requires a high level of security can be restricted to private connections (e.g., MPLS) between sites and required to pass through a robust security stack when entering the enterprise.
Service chaining
SD-WAN has the ability chain itself together with other network services. WAN optimization (acceleration) is often combined with SD-WAN to improve network and application performance. Internet traffic leaving and entering a branch office may be routed across a VPN to a cloud-base security service to strike a balance between performance, security, and cost.
Read more: GET THE MOST OUT OF YOUR SD-WAN: FEATURES YOU NEED TO START USING TODAY
What are the main benefits of SD_WAN to network security?
Eliminate VPN concerns
One of the first areas in which SD-WAN impacts security is when a company uses the internet as a method of transport.
Before SD-WAN came along and companies were using internet as a backup or even a primary transport method, they would build a VPN or a DMVPN to ensure secure transport of their traffic. This introduces a couple of issues, the first of which is this proliferation of VPNs that has to be managed. The company must have firewalls sitting at their data center, along with a VPN device or firewall sitting in the remote locations to be able to do these VPNs. Every site is dependent on the effort to be up on the network.
- Hamza Seqqat, Director of Solutions Architecture, Apcela
Failover is an issue with this VPN approach, he said. Companies can’t seamlessly failover from a fiber-based type of transport without having to strike some keys in between. It's hard and expensive to do seamless failover.
“Now you don't have to have firewalls for VPNs. You don't have to worry about building your own VPNs or encrypting your traffic,” Seqqat said. “Every SD-WAN product comes with a controller that takes care of things seamlessly. That means there is this smart software-defined engine that builds all these IPsec tunnels between all the locations as soon as you plug the device in. You're not actually having to build a VPN—the controller does it automatically for you, so all you have to do is give the device an IP address or enable DHCP and let it pick an IP address from the DHCP server. Suddenly it's on the network and its building tunnels to all the sites.”
He added that the SD-WAN controller builds a full mesh, so it can talk to every one of the sites without having to go back to the data center. This feature alone can reduce a company’s security footprint significantly because the site-to-site traffic becomes secure, easy, and seamless.
Reduce traffic going through security
A second significant benefit of SD-WAN that impacts security strategy is that it reduces the amount of traffic that needs to go through security parameters because all site-to-site traffic is encrypted. This makes security a bit easier to manage.“For a lot of companies, when they do VPNs for site-to-site traffic, they have to go through firewalls or some kind of encryption mechanism, and that increases their security footprint. It increases the complexity and the cost of security,” Seqqat said. “SD-WAN changes how traffic is routed through security.”
Seqqat gave an example of a site that has a gig worth of bandwidth, and out of that gig of bandwidth, some traffic goes to the internet and some goes to site-to-site.
“Without SD-WAN, generally you would have to run that whole gig through a firewall, and the firewall will split the traffic into what goes to the data center and what goes to the internet,” he said. “When you do SD-WAN, you don't have to do that. You can separate the traffic at the SD-WAN with a split tunnel, so you take half of the traffic and push it through the firewall to go to the internet and the other half goes straight site-to-site without having to go through a security parameter. Now you have a firewall to handle 500 megs as opposed to a gig, and that makes a huge difference because most security products are based on throughput and utilization. So, that can bring some cost benefits and ease management as well.”
Security inherent to SD-WAN
A third area where SD-WAN changes security strategy is the fact that certain security features can be implemented directly through the SD-WAN platform, which reduces costs and complexity in the actual security platform.
“This depends on what aspects of security you're talking about,” Seqqat said. “For example, security is included in the Silverpeak SD-WAN product, so the Silverpeak devices really do most of the security for you. You don't have to deploy another firewall on top of that. With Versa’s SD-WAN, you can virtualize the firewall, so there’s no need to deploy physical firewalls.”
For sites that simply need very basic security, SD-WAN has some inherent security capabilities. It can do things such as allow and deny certain sites and limit traffic that goes to certain sites.
When you look at most SD-WAN products, you can usually kind of steer toward one or another based on your security requirements. Deploying SD-WAN in itself can really eliminate the need for security at several locations or extend the security you have been using.
- Hamza Seqqat, Director of Solutions Architecture, Apcela
Simplify use of security platforms
In his final point, Seqqat said SD-WAN providers are making a lot of progress in partnering with both cloud security providers and cloud service providers. By making traffic encrypted and secure via SD-WAN, security platforms will only have to deal with public internet traffic.
“SD-WAN providers are really working towards partnering and certifying different security products,” he said. “Consider Zscaler as an example. Some SD-WAN products automatically route all your traffic through Zscalar, which does a cloud-based security parameter before it goes out to the internet or to cloud service providers.”
Seqqat said the most important part comes in the fact that Zscalar is distributed across 35 or 40 data centers that are all security parameters.
“Making that routing decision as to what data center your traffic goes through before it goes out to the Internet is extremely important to performance,” he said. “If your Office 365 instance is hosted in Seattle and your users in Europe are trying to reach that, which Zscalar data center the traffic is going to go through before it goes through the Seattle instance of O365 makes all the difference in what latency is going to be at round trip.
“SD-WAN provides somewhat of an automation and optimization of how traffic goes through Zscalar data centers based on performance metrics. SD-WAN can pull latency and jitter and packet loss and all that kind of stuff, so there is some intelligence that happens when a routing decision is being made as to where user traffic is going to go for security scrubbing or security features before it goes out to the cloud provider or to the Internet. That’s a huge feature that comes into play whenever you deploy SD-WAN.”
Read more: FOR SERVICE PROVIDERS SD-WAN IS A MIXED BLESSING
What are the other advantages of SD-WAN?
SD-WAN has many advantages when implemented well:
More predictable and reliable application performance, which helps support users in any digital workspace, across all connections. Superior connection security for cloud applications, without the performance tradeoffs of MPLS backhauling. Congestion reduction due to lack of bandwidth or brownouts with aggregation of bandwidth via multiple bonded and disparate or redundant links.
More reliable access to apps and fewer slowdowns due to congestion.
Resiliency and redundancy with fast failover when outages impact WAN connections.
Quality of service for prioritizing business-critical application traffic.
Fast deployments that fuel business agility when bringing applications online at a branch office, or simply changing the configurations. Zero-touch provisioning allows fast set up of sites in minutes with local staff instead of hours or days.
Reduced network transport costs and more flexibility through the use of MPLS-alternatives like broadband and cellular. Quick procurement of bandwidth from multiple transport services, contrast to the long lead times needed with legacy WAN carrier-based technologies.
Simplified administration with a centralized console eliminates the complexity of configuring edge devices in the field.
Deep SD-WAN analytics to monitor links for performance characteristics. Analytics benefit administrators who can use them when troubleshooting problems across the WAN.
Simpler branch office infrastructure that doesn’t require management of as many single-function devices
Intelligent traffic steering and dynamic path selection
Integrated security with leading 3rd-party solutions, including those for SaaS security
Conclusion
Interest in SD-WAN among organizations is on the rise, and we hope to see a tremendous rise in its adoption in network security strategies over the next few years. Vendor selection will be one of the factor for successful implementation of SD-WAN, as many are quickly developing new and effective software-defined platforms. An ideal vendor would be the one who effectively addresses your specific pain points and is able to meet your current as well as future requirements.
Read more: SD-WAN SECURITY: THE IMPACT OF ORCHESTRATED SERVICES MULTIPLICITY
Read More
5G
Article | May 18, 2023
5G trends are shaping the future of various technologies, from the Internet of Things to Virtual Reality. Learn more about the top trends in 5G to stay ahead of the competition in this sector.
Contents
1 The Value of 5G for Businesses
2 5G Trends to Watch in 2023
2.1 Shift to Standalone 5G
2.2 Edge Computing for IoT
2.3 Adoption of Private 5G Networks
2.4 General Availability of 5G
2.5 Partnerships for Rapid Deployments
3 Conclusion
1 The Value of 5G for Businesses
The fifth-generation network technology, or 5G, promises to revolutionize the way businesses communicate and operate. It offers lower latency, faster data transfer speeds, more robust security, and new and enhanced experiences. These capabilities enable 5G to support high-quality video conferencing, real-time collaboration, immersive virtual experiences, and more. By investing in 5G, businesses can stay competitive and meet the evolving needs of their employees and customers. With the growing adoption and use cases of this technology, keeping up with the technology trends in 5G is essential for staying ahead in today's business landscape.
2 5G Trends to Watch in 2023
2.1 Shift to Standalone 5G
The rapid deployment of 5G across the world has been made possible due to the existence of an already-established 4G infrastructure. This has allowed operators to concentrate on developing the radio access network components while relying on 4G networks as a failsafe. This approach has enabled operators to deploy 5G networks at a faster pace, thereby allowing the benefits of this technology trend to reach a wider audience.
The integration of a 5G core and radio forms the backbone of 5G infrastructure, enabling the 5G stand-alone network to achieve its full potential. Wireless providers have been actively promoting the key features of 5G, such as ultra-low latency and complete network slicing, which are exclusively available through the stand-alone version of this advanced technology.
By utilizing this emerging technology, businesses can unlock an entirely new level of performance, allowing them to deliver innovative and immersive services to their end-users. Stand-alone 5G is also a necessity for certain unique use cases, and many 5G trends in 2023 will rely on its capabilities. It is essential for businesses to understand the benefits of this advanced technology and adopt it to remain competitive in the ever-evolving digital landscape.
2.2 Edge Computing for IoT
The convergence of 5G technology and IoT is transforming how businesses operate across industry verticals. This 5G trend enables edge computing for the IoT by providing low-latency and high-bandwidth connectivity. With 5G, data can be transmitted and processed at the edge of the network, closer to the source of the data, rather than being sent to a central data center for processing.
While extensive IoT fleets can operate on a 4G network, a 5G network will improve upon those capabilities with massive multiple-input, multiple output capabilities, enabling an increased number of devices to connect with the cell tower. This is especially useful in IIoT, where a large number of IoT devices are present within a small area, which requires this level of connectivity.
The low latency and high bandwidth offered by 5G infrastructure also support innovative IoT solutions, such as integrating artificial intelligence, by enabling real-time processing of data and faster response times. Edge computing allows IoT devices to perform complex processing tasks and make decisions locally, rather than relying on a centralized cloud server. Businesses that operate in industries that require real-time processing will especially benefit from the digital transformation through 5G.
2.3 Adoption of Private 5G Networks
Private wireless networks are suitable for many industrial applications, and the market for private 5G networks is set to expand rapidly. Private 5G networks offer greater cybersecurity, control, and reliability, making them ideal for mission-critical applications that require high levels of security and privacy. This is one of the key 5G trends because it is applicable to industries such as manufacturing, healthcare, and finance, where IoT devices collect and share sensitive data that requires greater cybersecurity.
Businesses can also utilize private 5G networks to benefit from higher bandwidth, lower latency, and greater flexibility compared to public networks. Private 5G networks can be customized and tailored to meet the specific requirements of each application, making them ideal for specialized functions.
As more enterprises look to benefit from network-intensive technologies such as artificial intelligence, virtual reality, and big data, the demand for private wireless networks will continue to rise. Network operators are also more willing to offer private 5G networks because they represent a new revenue stream and a growth opportunity while also allowing them to provide a more personalized service to their customers.
2.4 General Availability of 5G
The 5G trends have moved towards access to 5G across the world, with 5G now available in 95 countries and reaching to more than 1.2 billion people. 5G networks are becoming more widespread in 2023, and as a result, many 5G trends and technologies are expected to emerge. Furthermore, 5G has become standard across all premium devices and many mid-range ones, making it an attractive option for consumers.
For businesses, this means a whole new world of possibilities. 5G networks offer faster speeds, higher bandwidth, and lower latency, enabling businesses to offer more innovative products and services. With the increased availability of 5G, businesses can develop and deploy emerging technologies like artificial intelligence and machine learning, augmented reality, and virtual reality. Remote work and related use cases will also rise in popularity as 5G becomes more common.
However, the distribution of 5G networks differs by region. 5G trends indicate that urban populations will likely be the first beneficiaries of public 5G rollouts and will benefit the most from 5G capabilities such as network densification and massive MIMO. With the deployment of 5G small cells for connectivity, 5G networks will support new use cases and faster, more reliable connectivity for the general public, especially in urban areas.
2.5 Partnerships for Rapid Deployments
By connecting disjointed B2B and B2C networks with ecosystems, service providers can become service enablers, working with businesses, consumers, and even competitors to create unique 5G offerings. Digital transformation is possible through new approaches to partnerships, through which service providers manage commoditization pressures and a hyper-competitive market.
Partnerships also provide businesses with access to industry skill sets that are in high demand, such as cloud, cybersecurity, and automation. By partnering with players who are already experts, cellular network providers offer specialized solutions to their customers that they may not have been able to provide otherwise. Hosted labs also help to speed ecosystem validation of use cases and new technology, ensuring that solutions are effective and efficient.
Furthermore, partnerships enable service providers to create products with global scale, as demonstrated by SAP, IBM, ServiceNow, and Deutsche Telekom, which have collaborated to create global connectivity offerings ranging from 5G to software-defined networks.
In the race to increase revenue and control costs in the 5G industry, collaborating with industry experts and integrating solutions will become one of the key 5G technology trends. Through collaboration, service providers can offer unique solutions to their customers, access necessary industry skill sets, and create products with global scale. These partnerships are necessary for businesses to remain competitive in an ever-changing market.
3 Conclusion
The ongoing rollout of 5G networks is set to transform businesses across all industries, bringing faster speeds, lower latency, and the ability to connect more devices than ever before. As technology continues to evolve, businesses need to stay up-to-date with the future trends in 5G in order to take advantage of its full potential. The growing demand for low latency and massive connectivity due to new use cases such as edge computing and the IoT is driving the growth of 5G networks. These trends will enable businesses to create new products and services, increase efficiency and productivity, and ultimately transform the way they operate. As 5G networks continue to mature, businesses that invest in this technology will have a competitive advantage over those that do not. They will be able to deliver faster, more reliable services to customers, streamline operations, and reduce costs. With the right approach, organizations can capitalize on the latest trends in 5G and unlock new opportunities for growth and innovation in the years to come.
Read More