Premium Content

Access "The programmable WAN: Applications are boss and networks bend"

David Geer Published: 07 Oct 2013

Software-defined networking (SDN) is making the WAN the new black. That's because the avant-garde in networking is a virtual infrastructure that can be provisioned on demand and in response to the needs of rapidly moving virtual machines (VMs) and applications. SDN is beginning to make this possible in the new programmable WAN. The goal of the programmable WAN is to use an SDN controller essentially as a network hypervisor to automate the provisioning of virtualized WAN tunnels or network segments in support of VM migration, fluid applications and varying data flows. In most forms of SDN, the control plane is separated from the data plane and the intelligence and decision making is placed into a centralized controller. In the WAN, that controller sees the network end-to-end, and from the packet layer to the optical transport layer, explained Ashish Shah, director of product strategy and product line management at Vello Systems, an SDN upstart that provides the infrastructure for open, programmable networks. Applications play a central role in WAN ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside


More Premium Content Accessible For Free

  • How to manage and monitor the converged network

    The network is converging. Voice, video, and storage and data networks are already converged, and more recently networking pros have had to tackle ...

  • What does WebRTC video mean for the network?

    WebRTC, an emerging standard for embedding voice and video-conferencing applications into Web browsers, is aimed at making real-time communications ...

  • Context makes network security policy smarter, but not easier

    Traditional approaches to network security are no longer sufficient to combat today's advanced threats. Attacks now target users and applications, ...