THE COMPLETE FIELD GUIDE TO THE WAN

Similar documents
SD-WAN. The CIO s guide to. Why it s time for a new kind of network

Hybrid Cloud for Business Communications

The SD-WAN security guide

Choosing the Right. Ethernet Solution. How to Make the Best Choice for Your Business

The Value of Peering. ISP Workshops. Last updated 25 September 2013

Transform your network and your customer experience. Introducing SD-WAN Concierge

Y O UR BUS I N E SS IS ONL Y A S S TR ON G A S YO U R CONNEC T I O N T HE I M P ORTANCE OF R ELI ABLE CO NNECTIVITY W HAT S IN SIDE:

THE FASTEST WAY TO CONNECT YOUR NETWORK. Accelerate Multiple Location Connectivity with Ethernet Private Line Solutions FIBER

Making the case for SD-WAN

Digital Entertainment. Networking Made Easy

Media-Ready Network Transcript

The Value of Peering. ISP/IXP Workshops. Last updated 23 rd March 2015

How to Choose a CDN. Improve Website Performance and User Experience. Imperva, Inc All Rights Reserved

MPLS SOLUTION How to Make the Best Choice for Your Business

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS

Go beyond broadband with BTnet.

Vodacom Power to you. Managed Network Services for Ready Business.

Why Continuity Matters

YOUR CONDUIT TO THE CLOUD

Evaluating networking technologies

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

Broadband Internet Access Disclosure

Virtual private networks

Introducing CloudGenix Clarity

Intranets and Virtual Private Networks (VPNs)

MPLS vs SDWAN.

10 Reasons your WAN is Broken

Preparing your network for the next wave of innovation

90 % of WAN decision makers cite their

Congestion? What Congestion? Mark Handley

Roadmap to the Efficient Cloud: 3 Checkpoints for the Modern Enterprise

Transform your network and your customer experience. Introducing SD-WAN Concierge

2018 Mobile Security Report

Cisco How Virtual Private Networks Work

How to Stay Safe on Public Wi-Fi Networks

4 Easy Steps to Get off the MPLS Treadmill

Automating VPN Management

BGP Case Studies. ISP Workshops

A GUIDE TO CYBERSECURITY METRICS YOUR VENDORS (AND YOU) SHOULD BE WATCHING

THE IMPLICATIONS OF PERFORMANCE, SECURITY, AND RESOURCE CONSTRAINTS IN DIGITAL TRANSFORMATION

Securing trust in electronic supply chains

NETWORK FORENSIC ANALYSIS IN THE AGE OF CLOUD COMPUTING.

MPLS VERSUS CARRIER ETHERNET 7 REASONS WHY ETHERNET IS AN ECONOMICAL ALTERNATIVE

ALTITUDE DOESN T MAKE YOU SAFE. Satcom Direct s Comprehensive Cyber Security Portfolio for Business Aviation

Top-Down Network Design

HOW MIDSIZE ORGANIZATIONS CAN MEET COMPLIANCE REQUIREMENTS AND ENHANCE CYBERSECURITY WITH MICRO-SEGMENTATION WHITE PAPER FEBRUARY 2018

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

Moving to a New Business Phone System

SDN meets the real world part two: SDN rewrites the WAN manual

Create the ideal conditions for your network to grow.

Securing intelligent networks: a guide for CISO and CIOs

A company built on security

Accessing CharityMaster data from another location

Although many business owners think that Virtualization and Disaster Recovery (DR) are two separate services, the

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

Boosting Business Development with Citywide Wireless Access

We have looked at how and why one router dials another using ISDN. Just as important is knowing what keeps the link up once it is dialed.

School of Computer Sciences Universiti Sains Malaysia Pulau Pinang

78% of CIOs can t guarantee application performance 1. What s holding your apps back?

CtrlS Datacenters Placement Questions And Answers

Never be offline again. Created with novapdf Printer ( Please register to remove this message.

Livingston Communications. Network TRANSPARENCY statement

WHITEPAPER MOVING TO A NEW BUSINESS PHONE SYSTEM

The Ultimate Beginner s Guide to VoIP

White paper: Agentless Backup is Not a Myth. Agentless Backup is Not a Myth

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

10 Hidden IT Risks That Might Threaten Your Business

SD-WAN Transform Your Agency

Cisco 4000 Series Integrated Services Routers: Architecture for Branch-Office Agility

APPLIED SATELLITE ENGINEERING-MACHINE-TO-MACHINE. This resource is brought to you by ASE M2M. Contact information.

Make Nonstop IT a Reality for Your Business

Converged World. Martin Capurro

Ensuring a Consistent Security Perimeter with CloudGenix AppFabric

Smart speakers (like the Amazon Echo shown here), appliances, and equipment connect to the Internet, allowing you to access information using voice

How fibre internet can boost your business productivity

Never Drop a Call With TecInfo SIP Proxy White Paper

Network+ Guide to Networks 5 th Edition. Chapter 1 An Introduction to Networking

Whitepaper. Inter-Party Latency Management

WHY NETWORK FAILOVER PROTECTION IS A BUSINESS NECESSITY

The Essential Guide to Preparing Your Network for the Cloud. How to meet your network requirements at every step of your cloud transformation.

Cloud for Government: A Transformative Digital Tool to Better Serve Communities

SOFTWARE-DEFINED NETWORKING WHAT IT IS, AND WHY IT MATTERS

CSC Introduction to Computers and Their Applications. Background

Logical Network Design (Part II)

RiverStreet Networks Network TRANSPARENCY Statement

A Software-Defined WAN is a Business Imperative

Virtualization. Q&A with an industry leader. Virtualization is rapidly becoming a fact of life for agency executives,

Wilkes Communications, Inc. Network TRANSPARENCY Statement

Calculating the real cost of a business phone system. How a cloud phone system ultimately gives you more for your money

MAKING A COMEBACK: Everything You Need to Know About Backup and Disaster Recovery

Reaping the Benefits of Managed Services

What is SD WAN and should I know or care about it? Ken LaMere Ecessa

You ve identified Ethernet, now what?

ipsec securing vpns BFF71AA880C7E031D92BDAE69281BC0A Ipsec Securing Vpns 1 / 6

Dispelling the myth: future networks

WHITE PAPER BCDR: 4 CRITICAL QUESTIONS FOR YOUR COMMUNICATIONS PROVIDER

Why Real Testing Requires Emulation, Not Just Simulation for Layer 4-7

From the past to the future: how to make the move from ISDN to SIP

A Talari Networks White Paper. Turbo Charging WAN Optimization with WAN Virtualization. A Talari White Paper

Transcription:

THE COMPLETE FIELD GUIDE TO THE WAN

People interested in setting up a wide-area network (WAN) often have very specific reasons for wanting to do so. WANs are specialized technological tools that deliver distinct advantages to their users. Being specialized, however, also means that WANs are often poorly explained or incompletely understood. And considering that WANs set the stage for major technological developments, it s imperative that they re understood as comprehensively as possible. To assist on that front, here s a wide-ranging solution to help round out your awareness and knowledge of WAN technology. WHAT IS A WAN? A WAN, in simplest terms, is a wide-area network. Built upon internet protocol (IP) technology, WANs connect two or more physical locations and are geared toward providing a complete set of solutions for users. There are two distinct types of WANs. P2P A peer-to-peer (P2P) network is commonly geared toward short-range operations, generally when the businesses using the technology are within 28 miles of each other. This makes P2P WANs great for businesses in the same town or with locations in nearby rural areas. A P2P network doesn t utilize bandwidth sharing, which improves the connection strength and allows the network to run on machines with slower speeds. 2 VPN A virtual private network (VPN), meanwhile, is geared toward wider geographic dispersal. A VPN is a lot like a regular internet connection, but with the advantage of heavy encryption. This can slow down

speeds substantially, but it also protects the data in the transmission stage. That s good news for widely dispersed businesses that need to protect their information. WHO USES A WAN? Because there are multiple types of WANs, it s easy to say there are a wide variety of potential use cases for them. Businesses with multiple locations Countywide real estate offices, a retail shop with multiple locations in the same city, and even just a business with several buildings on a sprawling campus can all use WANs to stay connected and safely share data. Businesses that need privacy Whether it s a need, a want, or a mandated regulation, WANs provide extra privacy for users by transmitting data along secure and encrypted connections. This makes the data much harder to intercept and access. Businesses that need connectivity, all the time When it comes to uptime, many businesses require five-nines reliability which translates to 99.999% of the time. This figure is commonly regarded as maximum uptime and it can be achieved. Many WAN providers include guaranteed uptime as part of a service-level agreement (SLA). 3 Businesses that want greater speed A WAN commonly runs on leased lines rather than via a broadband connection. This improves the speed of data transfer, as well as overall connectivity, which can dramatically increase efficiency.

WHAT CAN A WAN BE USED FOR? Companies interested in putting a WAN to work often discover such networks have many benefits, several of which might be unexpected. Centralizing IT infrastructure Some say you shouldn t put all of your eggs in one basket. Some say you should, because it s easier to watch that one basket. Those who have a WAN are putting their eggs in one basket, centralizing their infrastructure and precluding the need to buy servers for each location. This not only centralizes your IT infrastructure, but also simplifies it overall. Making and receiving phone calls For those who want to use voice over internet protocol (VoIP) services for calls, a WAN is a great way to bring such systems into play. With WANs, there s no longer a need for integrated services digital network (ISDN) circuits, which can be quite costly. Instead, much of this traffic can be routed over a WAN, which provides much the same effect. 4 Finding cost savings Everyone wants to save money, especially if it can be done without diminishing quality of life. We ve already seen a couple of ways businesses can save money by setting up WANs, but the benefits don t stop there. Simplifying and centralizing a network certainly translates to fewer hardware purchases, but it also means less time spent managing your network. Time saved is money earned, especially when network operators can focus their attention elsewhere.

WHAT DO I NEED TO USE A WAN? Despite the amount of value they offer to end users, WANs aren t all perks and benefits. A WAN needs several specific elements in order to run to its fullest. Security measures A WAN does improve security on some fronts, however, it also can also pose some security risks itself. Centralizing does facilitate monitoring, but it also makes WANs an easier target. Skilled hackers know where to attack a centralized network. Additionally, branch security is just as important, but protocols aren t always followed as closely as they should be. Most companies focus security on the data center, without knowing that an easily breached branch is a clear path to the data center. WAN use also requires improved security to achieve the maximum benefits. Bandwidth At the end of the day, a WAN is only as good as the strength of its connection. Without sufficient bandwidth, and bandwidth of sufficiently low latency, the network will become congested just as any other network would be. While a WAN can do the things we ve discussed previously, if it tries to tackle them all at once without the proper bandwidth, it s not going to do any better than a conventional network that s overloaded. 5 Visibility The primary reason to put all your eggs in one basket, as noted previously, is to be able to better watch that basket. Centralizing a network calls for clear visibility into overall network performance, and not just for security reasons. Being able to spot when a problem is about to happen

means you ll have a better chance of fixing it before the end user even notices the issue. And, perhaps more important, before it results in conditions that impact an SLA and trigger remedies accordingly. WHAT SHOULD BUSINESSES THAT USE A WAN CONSIDER? Those who use a WAN also need to keep a few other points in mind. Maintenance Yes, a WAN needs care and feeding like any other vital system. This is especially true for a WAN that s connected to an overall system that runs constantly. The use of a backup system is strongly advised in order to prevent downtime, a very real threat to a centralized system. Scalability It s great to have a WAN that meets today s needs, but what about tomorrow s? Setting up a WAN that only meets today s needs is a sure path to failure as soon as technology changes. Accommodating scalability allows for the ability to change the system as your needs change. Not just up, either, but also down. Why run more a more powerful system than your current needs call for? And why pay for the excess? Being able to scale down can save money as much as scaling up allows the pursuit of new opportunities. 6 WHAT DO I NEED IF MY WAN IS WIDELY SPREAD OUT? A WAN that s widely spread out has more specific needs than a WAN that connects machines that are relatively close together.

VPN architecture As mentioned previously, the VPN is the weapon of choice when it comes to a wide-ranging network. Yet it s often not the only choice. SD-WAN Those who want to get more out of a current WAN, particularly a VPN-based WAN, sometimes augment the system with specific software, which creates softwaredefined wide-area networking, or SD-WAN. With SD-WAN, many of the points we ve already addressed become much easier to put in practice. SD-WAN systems allow for remote diagnostics perfect for added visibility and centralization and are suitable as a replacement for a VPN system. Branch office equipment It s easy to forget the hardware amidst all the software, but having the right equipment at the branch level is important. A geographically dispersed network may be more vulnerable to outside threats, so be sure to have the proper workstations and network equipment (e.g. routers, switches, etc.) to ensure your network is not only safe, but also running smoothly. 7 Access requirements This is important for both local and remote users. Remember, the path from the branch office to the main data center is likely to be the clearest around, so protect your local- and remote-access to ensure the best in security. This is particularly true if you re accommodating remote access beyond the branch. Anyone working from a coffee shop or their home office will need remote-access credentials that are secure enough to protect the wider system. Traffic utilization analysis systems The most important part of a WAN is that it be ready to

meet users needs and provide vital visibility into overall performance with traffic-utilization analysis systems. With these in place, you ll be better able to determine if you need more bandwidth, or if you just need to make better use of what s currently available. You ll also be able to spot one potential source of problems and either eliminate it or modify it accordingly to meet the need. 8