[vc_row][vc_column][vc_column_text]Which metaphor best describes your network infrastructure? An original equipment manufactured engine purring along like it’s run less than 10,000 miles? Or a patchwork of after-market parts running a little rough and you’re wondering what each new rattle or ping really means? If you were honest, it would be the latter – and you’re not alone.
Today’s networks are a patchwork of “bolted on” solutions and overlays to address each new need:
- Early on it was specialized hardware dedicated to improving “speeds and feeds;”
- Then it became middle boxes, mere “bumps in the wire,” like NATs, firewalls, and load-balancers;
- And more recently all sorts of “overlay” technologies, encapsulation and tunneling, such as MPLS & VPN.
The result? Increasing complexity, which leads to those worrisome rattles and pings. All these piled-on solutions introduce more ‘stuff’ to manage, connect, and pay for as the patchwork grows ever more complex. Many of the outages and data breaches we are witnessing today are a result of overly complex systems that are inherently less secure, less stable, and, unfortunately for businesses, less flexible.
Software Defined Networking (SDN), Network Function Virtualization (NFV) and Software-Defined Wide Area Networking (SD-WAN) have all emerged as potential solutions to some network complexity issues. The goal was to be more agile and make networks easier to manage.
But here’s the thing. NFV and SDN approaches are fundamentally extensions of the existing way of networking, leveraging middle-boxes and overlays in different forms. They add a layer of translation on top of an old foundation. And even with sophisticated orchestration and coordination, more complex systems are inherently inefficient, unstable, and insecure.
Transformational solutions to the networking challenges of today and tomorrow are going to require a new way of thinking.
Organizations invest more than $75B each year in security solutions and yet nearly half-a trillion dollars is lost from data breaches each year. [Forbes]
What’s wrong with this picture?
According to a recent study by Ponemon Institute, the average consolidated cost of a data breach rose to $4 million in 2016.
Sessions are the key to providing advanced capabilities – security, reliability, and analytics – without piling on more complexity. We believe session orientation in the routing layer itself enables a fundamentally different, far simpler way to network. We believe networking – especially routing – must be examined from a different perspective: one centered around of sessions. Sessions are a two-way, exchange of information end-to-end – comprised of related flows in both directions. Just about every use of a network today involves bi-directional sessions. And nearly all of the advanced service functions that have evolved (firewalls, load balancers, etc…) require an understanding of, and control over, network sessions.
Session-oriented networks open the door for the consolidation of stand-alone network services by making them inherent routing capabilities. Session-orientation also can be used to create in-band signaling, eliminating the complexity of overlays and tunnels. The result is a simpler and more secure network architecture.
We at 128 Technology have developed a new kind of session-oriented networking platform that addresses a broad range of networking challenges, but is easy to implement alongside your existing network. We’re excited about this approach because it will deliver outstanding benefits to enterprises, service providers, and cloud services companies alike.
A little bit of history – Leonard Kleinrock, who published the first paper on packet switching theory in 1961, also warned of the pitfalls introduced by increasingly complex protocols in his book on the ARPANET in 1976.
[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][mk_button dimension=”flat” size=”large” url=”https://www.128technology.com/resources/ebook/rethinking-the-network-ebook/” target=”_blank” align=”center”]Download Ebook: Rethinking the network[/mk_button][/vc_column][/vc_row]