I figured I would end my hiatus of blog posting and get back in the saddle for Cisco Live 2018. I am here for the week exploring what the Cisco ecosystem has for me in the areas of SDN, NFV, and network programmability. I will be posting a series of articles as I go through the sessions, and speak with vendors about upcoming solutions. Check back to see what I find!
The business case for cloud adoption has already been made and quantified by enterprise leaders. Early adopters of private and public clouds are already beginning to see measurable results in reduced time to market, operational efficiency, and cost reduction. Other advantages, such as greater scalability and increased performance, are also becoming more clear as companies move workloads to the cloud. Continue reading
On the topic of measuring WAN metrics, most engineers think to look at the standard statistics of loss, latency, jitter, and reachability for determining path quality. This is good information for a routing protocol that is making decisions for packet flow at layer 3 of the OSI model. However, it is incomplete information when looking at it from the perspective of the overall user experience. In order for an SD-WAN solution to provide materially better value than a typical packet router, it must look beyond the metrics considered by the router. Continue reading
According to Andrew Lerner of Gartner, “Intent-based networking is not a product, or a market. Instead, it is a piece of networking software that helps to plan, design and implement/operate networks that can improve network availability and agility.” Continue reading
As we look at the field of SD-WAN we begin to see the importance of going beyond simple protocol and port recognition in achieving the nirvana of true policy controls for performance and security. First generation SD-WAN allowed for rudimentary traffic control via protocol and port identification in much the same way that it is handled via access lists on routers. This was sufficient for in house applications that didn’t change address ranges, or ports and could be statically defined. However, it poses a problem when being used with current and future SaaS applications that are constantly evolving in complexity and capability. Continue reading
The fundamental shift of the enterprise toward the cloud has posed a conundrum for many. The largest issue is the state of most enterprise networks. These networks were designed for an era gone by. Their original designs could not foresee the coming of technologies such as SDN, SDWAN, Segment Routing, the Cloud and an exponential increase in bandwidth that have all happened over the past 10 years. Continue reading
During the past 3 decades, we have seen a monumental growth in networking technology. From RFC-1163, which describes the beginnings of BGP in 1989 to the cloud and software defined networks of today, our voracious appetite for bandwidth and services have begun to outpace the networking industry’s ability to deliver. Continue reading
SDWAN is the hottest topic in networking today. On the one hand, analyst reports state that this industry is in its infancy with less than 5% adoption through 2017. On the other hand, the same analysts project over 50% customer adoption in the next 36 months. Why has adoption been modest to-date, and why is 10X acceleration expected now? The answer lies in understanding the differences between the first generation of SD-WAN (Gen1) and the second generation of SD-WAN (Gen2). Continue reading
When you look at the recent acquisitions of Viptela and Velocloud by industry staples Cisco and VMWare, it could lead you to question whether the SDWAN market is now only a two-horse show. This thinking couldn’t be farther from the truth.
Let’s look at each of these vendor’s strengths and weaknesses to gain a little perspective. Continue reading
SDWAN does a wonderful job of optimizing performance of branch sites, but how can you trim your entire technology stack at a branch office while achieving robust security? The answer is a combination of SDWAN and Cloud Based Security Services. Continue reading