SDN Journal Authors: Yeshim Deniz, Liz McMillan, Elizabeth White, Pat Romanski, TJ Randall

Related Topics: SDN Journal

SDN Journal: Blog Post

The Road to SDN Is Paved with Visibility By @JKonstantas | @CloudExpo #SDN #Cloud

SDN stands to transform our modern networks and data centers, turning them into highly agile frameworks

Network architectures are in the midst of a massive transformation. Not too long ago, traditional network designs began to strain under increased demand for compute and storage. This saw the advent of server and storage virtualization, giving organizations on-demand access to the resources required for supporting service-oriented architectures and machine-to-machine communications. The increased agility and provisioning of virtualization showed the immense flexibility of decoupling key network components from the underlying hardware and catalyzed what is now a movement toward software defined networking or SDN.

Before SDN, network infrastructure had not seen massive change in decades, partly because today's high performance networks run on purpose-built hardware with custom silicon that represents an enormous investment on the part of the companies that have brought them to market. Enterprises have also devoted significant resources in employees with specialized skills and certifications that are required to maintain today's network infrastructure. This state of affairs has made any kind of customization or network-design flexibility nearly impossible until recently.

With SDN, enterprises have more choice in the infrastructure they use. Off-the-shelf hardware, with or without the OS and basic networking services installed, are available, as are "white box" switches marketed for precisely their flexibility and customization. Network designers still have to make some trade-offs in performance versus flexibility, but with more latitude than ever before. In fact, many vendors of purpose-built "appliances" for network and networking services now offer their functionality as software-only bundles and subscription services.

The Role of Visibility in SDN
SDN stands to transform our modern networks and data centers, turning them into highly agile frameworks that can be quickly reconfigured for changing business needs. Still, a lot of organizations recognize that highly mobile workloads and auto-configured applications and services by their nature result in weakened security, less visibility over traffic on the network when using traditional tools and the loss of performance optimization capabilities.

Network visibility is a foundational element in terrestrial networks and becomes more critical in highly dynamic SDN architectures. Loss of network visibility does not need to hinder firms from moving forward with SDN, however. There are companies that have taken steps to engage both the standards community and the leading vendors of SDN architecture to ensure that application performance and security are maintained during an SDN migration and after its completion.

What is necessary to maintain network visibility in an SDN environment is a centralized, highly scalable Visibility Fabric that delivers intelligent traffic and serves as a pervasive layer throughout the deployment. Pervasive visibility of all traffic flows and packets on the network is vital for monitoring the state of the SDN network, monitoring the applications it enables, and ensuring that security is maintained across the network. Without these three requirements, SDN deployments can't succeed.

Whether the SDN architecture of choice is built on OpenFlow or network virtualization abstractions such VMWare's NSX and Cisco's ACI, or still some other framework, the key requirements above remain. In SDN, control and forwarding layers are managed independently, yet need to function together. Synchronization issues between these layers due to network latency or vendor variance in networking infrastructure can cause bottlenecks and disrupt operations.

When it comes to SDN applications and services, the benefits of on-demand provisioning are undeniable. But, this sort of dynamic configuration can result in unpredictable traffic patterns that become hard to troubleshoot via traditional means, which place performance management tools at predictable places in the network. Visibility into such traffic in the SDN realm needs to be constant and the tools centralized so that they can receive all traffic flows and packets.

Similar logic applies to the need for security. Whereas security devices could be placed on critical network segments in traditional networks, this is untenable in SDNs. Centralized placement and total access to all inter-SDN traffic gives security technologies the best statistical chance of surfacing embedded malware and anomalous patterns.

SDN, NFV and network virtualization are finally a reality, transforming networking permanently and for the better. Most organizations will make the transition embracing one, two or all three concepts. Those that will make the journey with the least amount of disruption will be the ones that understand that traffic visibility is fundamental. On-demand networking brings unprecedented agility, scale and dynamism to network design. Understanding traffic pathways and baselines before, during and after the SDN migration means knowing how well the transition is delivering on CapEX and OpEx promises, as well as the potential for higher security. It is impossible to understand what can't be seen, which is why the road to SDN needs to be paved with visibility.

More Stories By Johnnie Konstantas

Johnnie Konstantas heads Gigamon’s security solutions marketing and business development. With 20+ years in telecommunications, as well as data and cybersecurity, she has done a little bit of everything spanning engineering, product management and marketing for large firms and fledglings.

Most recently, she was the VP of Marketing at Dato, a company pioneering large-scale machine learning. She was also VP Marketing at Altor Networks (acquired by Juniper), an early leader in virtualization security and at Varonis Systems. Past roles have included product management and marketing for Check Point, Neoteris, NetScreen and RedSeal Systems.

Johnnie started her career at Motorola, designing and implementing large-scale cellular infrastructure. She holds a BS in Electrical Engineering from the University of Maryland.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.

CloudEXPO Stories
Steadfast specializes in flexible cloud environments, infrastructure hosting, and a full suite of reliable managed services and security. Complemented by expert consultation at all stages of design and deployment to maintenance and expansion planning, Steadfast delivers high-quality, cost-effective IT infrastructure solutions, personalized to customer needs.
Daniel Jones is CTO of EngineerBetter, helping enterprises deliver value faster. Previously he was an IT consultant, indie video games developer, head of web development in the finance sector, and an award-winning martial artist. Continuous Delivery makes it possible to exploit findings of cognitive psychology and neuroscience to increase the productivity and happiness of our teams.
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science" is responsible for guiding the technology strategy within Hitachi Vantara for IoT and Analytics. Bill brings a balanced business-technology approach that focuses on business outcomes to drive data, analytics and technology decisions that underpin an organization's digital transformation strategy.
Most modern computer languages embed a lot of metadata in their application. We show how this goldmine of data from a runtime environment like production or staging can be used to increase profits. Adi conceptualized the Crosscode platform after spending over 25 years working for large enterprise companies like HP, Cisco, IBM, UHG and personally experiencing the challenges that prevent companies from quickly making changes to their technology, due to the complexity of their enterprise. An accomplished expert in Enterprise Architecture, Adi has also served as CxO advisor to numerous Fortune executives.
Eric Taylor, a former hacker, reveals what he's learned about cybersecurity. Taylor's life as a hacker began when he was just 12 years old and playing video games at home. Russian hackers are notorious for their hacking skills, but one American says he hacked a Russian cyber gang at just 15 years old. The government eventually caught up with Taylor and he pleaded guilty to posting the personal information on the internet, among other charges. Eric Taylor, who went by the nickname Cosmo the God, also posted personal information of celebrities and government officials, including Michelle Obama, former CIA director John Brennan, Kim Kardashian and Tiger Woods. Taylor recently became an advisor to cybersecurity start-up Path which helps companies make sure their websites are properly loading around the globe.