Inventory: Five new rules for the digital age WAN

Every technological revolution will bring about great changes, although humans do not like to change, but you have to adapt to these trends, especially at work, the need to develop new skills and try the best practice. Recalling the transition from a large computer system to a personal PC, traditional TDM voice to VoIP network telephony, physical servers to virtualized servers, which require IT organizations to change their way of doing business.

Today, the enterprise wide area network is also undergoing a major change, requiring network managers and administrators to do things in different ways, and develop new skills. The key to the development of some of the world is to understand the new rules of the digital age network, the following is the digital era of the five major rules of the wide area network.

1, simplification is the best friend of network engineers

Ten years ago the network was fairly simple, well defined with the parameters that the enterprise had terminal, and the user worked directly in the company when hosting applications in the data center. However, today's environment is completely different, the workplace contains BYOD, WiFi and cloud-based applications. The edge of the WAN becomes more and more complex, making it more difficult to manage and meet business needs. Simplifying the WAN edge is the primary choice for network managers and administrators.

2, speed and agility needs

Business leaders expect their technology infrastructure and applications to grow and profit faster and stay competitive in the industry. The traditional WAN implementation takes an average of 4-5 months, which is unacceptable for agile business needs. Network operations must find a way to quickly deploy networks and applications to ensure that it does not become a bottleneck or cause the company to go backwards.

3, the manual process is the enemy of network operations

The concept of network automation has been some time, but there are many network engineers still 'nervous', for several reasons there are two main. First, there are trusted elements because most high-end router riders think they can make changes faster and more accurately. This is nothing more than a fallacy, the network downtime is still due to human error factors.

Second, changes in automation tools are much faster than anyone or team. Now is the time for network engineers to get rid of their traditions, do not think that automation is bad, but should take it as a way forward.

4, commercial broadband

Broadband has been widely used by consumers for decades, and now many companies are avoiding the need for commodity connectivity while considering costly multi-protocol label switching (MPLS) circuits to establish service level agreements (SLAs). On paper it seems logical that the network will perform more for the sake of certainty.

But the truth is that most SLAs are false expectations. Even if the business can prove that an event that violates the SLA protocol occurs, the service provider usually only repays the customer for their violation. For some companies, an hour of disruption may lead to millions of dollars lost, but can only go to the telecommunications to ask them a few dollars to fill it? Somehow it seems to be fair A single broadband connection will not solve these problems, but multiple broadband links to WAN optimization and aggregation tools can be done, and now broadband connectivity is feasible.

5, mandatory visualization

Historically, due to the lack of application visibility to the network managers and administrators to bring a lot of inconvenience. When the user will call a poor performance of an application, then the investigation will be a long and difficult task. The past workers do not depend on the network, but as more services are moved to the cloud today, more things need to be connected and the network will become more critical.

End-to-end visibility and control of application traffic and performance enable network operations to diagnose and resolve problems and then affect network or application performance. No visibility and control, you can expect the best is a learned guess, fingers in the air is no way to manage the network. (Ofweek Internet of Things) (Source: Beijing Internet of Things Intelligent Technology Application Association; Editor: China Electronic Commerce Research Center)

Internet Research Papers