WAN Agility: Speed Revenues by Extending Automation Geographically
May 08, 2017

Erik Thoen
128 Technology

For companies with wide area networks (WANs), a reduced time to revenue is the biggest advantage that network agility can provide. This advantage takes different forms, depending on the enterprise. For a managed service provider (MSP), turning up a service quickly is critical to success. For a retail chain launching a new store, a shorter wait for reliable connectivity to key services is a major step towards sales velocity. For an enterprise opening a new development office, the faster IT can provide access to internal applications, the faster the office can develop revenue-generating products and services. In all these cases, network agility directly translates into financial benefit.

With increased competition, enterprises now require greater agility than ever before, and traditional approaches simply can’t provide the speed enterprises demand. For decades, companies have leveraged purpose-built hardware, which needs to be ordered, shipped, and installed at several locations to deliver services. More recently, large, web-service providers have demonstrated rapid scaling and creation of new services in the cloud using standardized hardware and considerable automation. To remain competitive with these new players, companies need to improve their operational agility both in the data center and the WAN.

In data center networking, vendors are offering tools to enterprises to speed service delivery by introducing white box switches, configuration management tools, and deployment applications. White box switches separate the underlying hardware from the networking software, which encourages standardization and lowers costs. Open source configuration automation tools have become the key method to delivering repeatable deployment at enormous scale. Numerous deployment applications are emerging, including open-source multi-vendor zero-touch provisioning servers, which focus on automating heterogeneous deployments – a challenging and potentially labor intensive task.

While these data center examples indicate a "roadmap to responsiveness," making the WAN equally agile introduces several additional complexities. For example, by the very definition of WAN, devices to be deployed are geographically dispersed. This adds operational and logistical complexity with devices at multiple locations (with middleboxes potentially in the path).

Further, connectivity requirements often vary by site, requiring a mix of Ethernet, WLAN, and LTE. In contrast to a data center with a highly-uniform cloud of servers with identical interfaces, the underlying hardware at the edge of a network may differ from site to site. Finally, today’s enterprise might include thousands of fixed sites, but in the future, mobile devices and the Internet of Things (IoT) could drive site numbers into the tens of thousands.

Companies need to embrace WAN agility by building upon data center networking approaches, leveraging agent-based automation tools and Network Function Virtualization (NFV). For WAN applications, agent-based tools are now available, which have the distinct advantage of pushing from the branch, through middleboxes, to the centralized automation point. This ensures remote sites are reachable. NFV is networking implemented in software. With this abstraction, the same networking functionality can be achieved and managed across mixed hardware at diverse sites.

While agility in all operations is desirable for companies, speed in the initial deployment phase is the most valuable. Zero-touch deployment describes the highly-automated sequence of operations from generic physical or virtual platforms to geographically dispersed operating routers. To enable zero-touch deployment, companies need to leverage NFV and a DevOps approach. Deployment accelerates when vendors design networking functions to be entirely virtualized, run on the Linux operating system, and abstract underlying HW. By creating standards-based APIs, like REST, and leveraging open-source configuration management tools, companies could automate the entire installation and provisioning sequence from a staging location to any number of remotely deployed networking devices. With this approach, true WAN agility is possible.

Erik Thoen is Director, Product Management, at 128 Technology.

The Latest

July 16, 2018

The key to mainframe DevOps success is in quickly identifying and removing major bottlenecks in the application delivery lifecycle. Major challenges include collaboration between mainframe and distributed teams, lack of visibility into the impact of software changes, and limited resource flexibility with scaling out necessary testing initiatives. Now let's take a closer look at some of these key challenges and how IT departments can address them ...

July 11, 2018

How much are organizations investing in the shift to cloud native, how much is it getting them? ...

July 10, 2018

In the shift to cloud native, many organizations have adopted a configuration-as-code approach. This helps drive up application deployment velocity by letting developers and DevOps teams reconfigure their deployments as their needs arise. Other organizations, particularly the more regulated ones, still have security people owning these tools, but that creates increased pressure on the security organization to keep up. How much are organizations investing in this process, and how much is it getting them? ...

June 28, 2018

More than a third of companies that use serverless functions are not employing any application security best practices and are not using any tools or standard security methodologies to secure them, according to the State of Serverless Security survey, conducted by PureSec ...

June 27, 2018

The popularity of social media platforms and applications is spurring enterprises to adopt "social business" models to better engage with employees and customers and improve collaboration, according to a new study published by ISG ...

June 25, 2018

The previous chapter in this WhiteHat Security series discussed Codebase as the first step of the Twelve-Factor App and defined a security best practice approach for ensuring a secure source control system. Considering the importance of applying security in a modern DevOps world, this next chapter examines the security component of step two of the Twelve-Factor methodology. Here follows some actionable advice from the WhiteHat Security Addendum Checklist, which developers and ops engineers can follow during the SaaS build and operations stages ...

June 21, 2018

DevSecOps is quickly gaining support and traction, within and beyond information security teams. In fact, 70% of respondents believe their culture can embrace the change needed to fuse Security and DevOps, according to a new survey of 80 security professionals by Aqua Security ...

June 20, 2018

The larger the company size, the higher the proportion of low IT performers, according to the State of DevOps: Market Segmentation Report from Puppet, based on the 2017 State of DevOps Survey data ...

June 18, 2018

An overwhelming 83 percent of respondents have concerns about deploying traditional firewalls in the cloud, according to Firewalls and the Cloud, a survey conducted by Barracuda Networks...

June 14, 2018

Despite the vast majority of cloud management decision-makers believing that DevOps and microservice enablement are important, very few believe that their organizations are capable of delivering them today — a gap that is costing the average enterprise $34 million per year, according to new report from the Ponemon Institute ...

Share this