#SDN #cloud #SDAS Things you need to know before diving into SDN...
Way back in the early days of the Internet scalability was an issue (the more
things change...). One of the answers to this problem was to scale out web
servers using a fairly well-proven concept called load balancing. Simply put,
distribute the load across web servers to make sure everyone gets served in a
timely fashion. We see this in action at stores every day when more checkout
lines are added as demand increases. Well, we hope we see this in action. Too
often we don't, much to our chagrin.
Anyway, the way in which early load balancing worked was simply to take a
couple variables (IP address and TCP port) and then hash them together and
stick them in the equivalent of a queue for a web server. Because hash values
tend to distribute fairly evenly, this worked well (until we ran into the
OpenStack. OpenDaylight. SDN. Cloud. It's all about abstraction, about APIs
and "software-defined" (which really means software-controlled, but this is
neither the time or place to get into that debate).
It's about jailbreaking the network. Enabling access to features and
functionality in a way that results in new services, increased responsiveness
and overall, the operationalization of the network.
The term jailbreaking is generally used with respect to mobile phones, in
particular Apple's iOS line of phones.
"Jailbreaking permits root access to the iOS file system and manager, ... (more)
We've talked before about the bifurcation of the network, which is driven as
much by the evolution of network services from "nice to have" to "critical"
as it is by emerging architectures. The demarcation line in the network stack
has traditionally been - and remains - between layers 3 and 4 in the OSI
model. The reason for this is that there is a transition as you move from
layer 3 to layer 4 from stateless networking to stateful networking.
This is important to emerging architectures like SDN because this
characteristic determines what level of participation in the data path is ... (more)
Despite claims that there exists (or will, look out!) a mythical "god box"
for the enterprise data center, capable of performing every data center
function imaginable, it remains, well, mythical. Efforts to effectively
secure the data center and the applications it delivers therefore requires a
collaborative approach between best-of-breed technologies.
But if collaboration across functional IT groups - development, operations,
network and security - remains as elusive as nirvana, then collaboration
across products has traditionally been seen as likely as sighting the Loch
Ness M... (more)
Last week was a crazy week for information security. That's probably also the
understatement of the year. With the public exposure of Heartbleed, everyone
was talking about what to do and how to do it to help customers and the
Internet, in general, deal with the ramifications of such a pervasive
If you still aren't sure, we have some options available, check them out
The most significant impact on organizations was related to what amounts to
the invalidation of the private keys used to ensure secure communications.
Researchers found that not only did exploi... (more)