Welcome!

SDN Journal Authors: Liz McMillan, Yeshim Deniz, Elizabeth White, Pat Romanski, TJ Randall

Related Topics: @DevOpsSummit, Java IoT, Linux Containers, Containers Expo Blog, @CloudExpo, SDN Journal

@DevOpsSummit: Blog Feed Post

APIs and Programmability: Jailbreaking Your Network

The importance of APIs and programmable data paths to the future of networking

OpenStack. OpenDaylight. SDN. Cloud. It's all about abstraction, about APIs and "software-defined" (which really means software-controlled, but this is neither the time or place to get into that debate).

It's about jailbreaking the network. Enabling access to features and functionality in a way that results in new services, increased responsiveness and overall, the operationalization of the network.

The term jailbreaking is generally used with respect to mobile phones, in particular Apple's iOS line of phones.

"Jailbreaking permits root access to the iOS file system and manager, allowing the download of additional applications, extensions, and themes that are unavailable through the official Apple App Store. Jailbreaking is a form of privilege escalation,[1][2] and the term has been used to describe privilege escalation on devices by other manufacturers as well.[3][4] The name refers to breaking the device out of its "jail",[5] which is a technical term used in Unix-style systems, for example in the term "FreeBSD jail"." (Wikipedia, iOS jailbreaking)

network-jailbreak2

This technical jargon is equally applicable to the network, where value has been locked up inside the network for years with very few opportunities to extend and enhance the functionality provided. Programmability of the data path is critical to jailbreaking the network and enabling the creation of "additional applications" and "extensions" to the system that might otherwise take multiple vendor release cycles to appear or, in many cases, might never rise to the top of the vendor's priority stack.

So, too, do APIs enable the network to break out of its traditional "jail" comprised of static and highly differentiated command line interfaces, where operators are relegated to 3-5 years of hard manual configuration labor and can only glance longingly at high glossy graphics depicting new and more efficient network architectures.

Alright, maybe it's not that bad, but then again... maybe it is. When you consider the cost to scale those manual operations, the technical debt incurred, and the inability to investigate the possibility that new network architectures might just offer the competitive advantage you need, it becomes an imperative that the network be operationalized and the advantages of a programmable network be taken to move the organization (read: the business) forward.

why-network-jailbreak

The reality is that most modern architectures - SDN, cloud and even NFV in the service provider realm - are all predicated on the ability to jailbreak the network. Operationalizing the network through the use of APIs to integrate, automate, and orchestrate network elements and services is critical to maintaining the robust, reliable and scalable networks required to continue supporting business (and consumer) growth.

There is a lot of value hidden in existing network elements. Many times the reason it's never been unlocked before is the network teams responsible for managing the network have just never had the time to explore, test and implement using the features and functionality available. Operationalized networks promise to offer them the time they need to get to know their network again and start figuring out how to leverage what  they have to provide even greater value to the applications that must traverse it and the business that can no longer live without it.

Read the original blog entry...

More Stories By Lori MacVittie

Lori MacVittie is responsible for education and evangelism of application services available across F5’s entire product suite. Her role includes authorship of technical materials and participation in a number of community-based forums and industry standards organizations, among other efforts. MacVittie has extensive programming experience as an application architect, as well as network and systems development and administration expertise. Prior to joining F5, MacVittie was an award-winning Senior Technology Editor at Network Computing Magazine, where she conducted product research and evaluation focused on integration with application and network architectures, and authored articles on a variety of topics aimed at IT professionals. Her most recent area of focus included SOA-related products and architectures. She holds a B.S. in Information and Computing Science from the University of Wisconsin at Green Bay, and an M.S. in Computer Science from Nova Southeastern University.

CloudEXPO Stories
When building large, cloud-based applications that operate at a high scale, it’s important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. “Fly two mistakes high” is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, will discuss how this same philosophy can be applied to highly scaled applications, and can dramatically increase your resilience to failure.
SAP is the world leader in enterprise applications in terms of software and software-related service revenue. Based on market capitalization, we are the world's third largest independent software manufacturer. Harness the power of your data and accelerate trusted outcome-driven innovation by developing intelligent and live solutions for real-time decisions and actions on a single data copy. Support next-generation transactional and analytical processing with a broad set of advanced analytics - run securely across hybrid and multicloud environments.
Founded in 2002 and headquartered in Chicago, Nexum® takes a comprehensive approach to security. Nexum approaches business with one simple statement: “Do what’s right for the customer and success will follow.” Nexum helps you mitigate risks, protect your data, increase business continuity and meet your unique business objectives by: Detecting and preventing network threats, intrusions and disruptions Equipping you with the information, tools, training and resources you need to effectively manage IT risk Nexum, Latin for an arrangement by which one pledged one’s very liberty as security, Nexum is committed to ensuring your security. At Nexum, We Mean Security®.
The vast majority of businesses now use cloud services, yet many still struggle with realizing the full potential of their IT investments. In particular, small and medium-sized businesses (SMBs) lack the internal IT staff and expertise to fully move to and manage workloads in public cloud environments. Speaker Todd Schwartz will help session attendees better navigate the complex cloud market and maximize their technical investments. The SkyKick co-founder and co-CEO will share the biggest challenges uncovered by the company's [2017 survey](https://offers.skykick.com/top-cloud-challenges) of North American business, sales and IT leaders.
All in Mobile is a mobile app agency that helps enterprise companies and next generation startups build the future of digital. We offer mobile development and design for smartphones, tablets and wearables. Our projects cover the latest and most innovative technologies - voice assistants, AI, AR/VR and more. We excel at solutions for sports, fintech and retail industries.