SDN Revamps Network Agility And Automation
FREMONT, CA: Software-Defined Networking (SDN) is a term encompassing several kinds of network technology aimed at making the network as agile and flexible. The goal of SDN is to allow network engineers and administrators to respond quickly to changing business requirements. SDN products enable dramatic improvements in network agility and automation, while substantially reducing the cost of network operations.
Cloud computing applications could be a big beneficiary of SDN and OpenFlow because these technologies make provisioning in a multi-vendor virtual environment much simpler. A controller-based load balancing application could automate the movement of workloads among virtual machines by using the controller's library of data pertaining to the capacity of individual network devices. Virtualized network service appliances are deployed on virtual machines. Controller-based applications are more scalable, flexible, efficient and manageable than conventional models that rely on physical devices to support functions.
The rise in software-centric networking transforms the process of innovation from equipment vendors to developer communities; thus simplifying the process. To accomplish this, developers and users will have to ensure that software-defined networking standards are truly open and interoperable. A number of challenges including cost, performance, service availability, management, and security must be confronted along the way. Addressing security vulnerabilities is among the highest priorities for network operators. The key steps involved in an SDN migration are, identifying and prioritizing core requirements of the target network, preparing the initial network for migration, and implementing a phased network migration. Once migration is completed, the target network must be validated against a documented set of requirements or expectations.
Application security in SDN offers a number of specific benefits that can improve enterprise security. SDN simplifies network usage information, which supports improved algorithm design used to detect attacks. The new generation of applications takes advantage of better-informed SDN agents to improve policy enforcement and traffic anomaly detection and mitigation. These applications block malicious intruders before they enter the critical regions of the network.
Recognizing Bare Metal Switches
Nomadix Launches New Gateway to Support Hotels with High Speed Fiber Internet
By James Seevers, CIO & GM, Toyoda Gosei
By Bill Krivoshik, SVP & CIO, Time Warner Inc.
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Bruce. D. Smith, SVP & CIO, Information Systems, Advocate...
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Graham Welch, Director-Cisco Security, Cisco
By Michael Watkins, Senior Product Director, Global Knowledge
By Bernd Schlotter, President of Services, Unify
By Patrick Hale, CIO, VITAS Healthcare
By Steve Bein, VP-GIS, Michael Baker International
By Jason Alan Snyder, CTO, Momentum Worldwide
By Mike Morris, CIO, Legends
By Louis Carr, Jr., CIO, Clark County
By Bill Dow, SVP and General Manager of Business Solutions,...
By Jim Whitehurst, CEO, Red Hat
By Darren Cockrel, CIO, Coyote Logistics, a UPS Company...
By Nathan Johnson, SVP and CIO, Werner Enterprises [NASDAQ:...
By David Tamayo, CIO, DCS Corporation
By Neil Hampshire, CIO, ModusLink Global Solutions, Inc....