Home Page Link
$0.00

SD-WAN

also referred to as Software Defined Wide Area Network, is an application-aware, over-the-top WAN connectivity service

Banner Image

Overview

SD-WAN – also referred to as Software Defined Wide Area Network, is an application-aware, over-the-top WAN connectivity service that uses policies to determine how application flows are directed over multiple underlay networks, irrespective of the underlay technologies or service providers who deliver them.

Let's Unpack That

  • SD-WAN Controller – Centralizes management, and allows network admins to see the network through a single pane of glass; sets policies for the orchestrator to execute.
  • SD-WAN Service Orchestrator – A virtualized manager for the network, overseeing traffic and applying/pushing policies and protocols set by network admins.
  • SD-WAN Edge – A device in which the network endpoints reside. Can be located in a branch office, data center, or cloud platform. Actually handles the application flows and packets affected by the policies and protocols defined by the orchestrator.
  • SD-WAN Gateway – A virtual cloud gateway accessible over the internet that allows the SD-WAN edge at branches to communicate in the cloud. Will handle SD-WAN traffic and control and provides an extra layer of protection by insulating applications from interruptions during circuit flapping. Because the user sessions are connected to the gateway, the sessions are kept active during the interruptions as opposed to sessions connecting directly to the cloud service.
  • Application Flow – A sequence of application packets from a source to a destination; in this case usually office to office, office to the datacenter, or office to cloud platform.
  • Internet Breakout – When one or more of the underlay connectivity services is an Internet Service, certain application flows can be forwarded directly out to the Internet as opposed to sending it to another SD-WAN device.
  • Policies – A set of rules that are assigned to an application flow to determine how the packets are handled
  • Virtual Tunnels – The virtual point to point tunnels, built over the top of an underlay connectivity service such as internet or MPLS connecting various SD-WAN Edge devices to another Edge device or to an SD-WAN Gateway.

Why Choose SD-WAN?

Banner Image

  • Faster failover times for critical applications, ensuring virtually no downtime with redundant, diverse circuits
  • Improved application performance for both data and voice/video applications
  • Increased bandwidth at a lower cost, as the network traffic can be provisioned for optimal speeds and throttle low-priority applications
  • Centralized management across branch networks through a simple management console, which reduces the need for manual configuration and on-site IT staff

  • Reduced complexity for WAN topology
  • Consolidation of multiple hardware devices including the router, firewall, wan optimization, wireless access points, and VPN concentrators
  • Full visibility into the network, as the controller gives operators a holistic view of the network
  • More options for the connection type and vendor selection, since the network underlay is independent of the SD-WAN provider

Why Work With Us?

Banner Image

  • We are independent and can deliver multiple options
  • We will learn your existing business structure and goals
  • We will understand your existing topology and future state
  • We will determine the optimal SD-WAN solution
  • We will adequately research to source the optimal supplier
  • We will implement and support the solution that best fits your needs

  • After implementation we will provide ongoing support, this includes excellent customer service and escalations
  • We will operate as integrated features of your organization’s ecosystem

Is SD-WAN Right for My Organization?

Banner Image

Enterprises have been increasingly investing in open and flexible cloud solutions, and SD-WAN represents an effort to engineer similar benefits in their data center architecture. SD-WAN architecture is particularly beneficial to environments separated by distance — for example, between main offices and branch offices. Whereas traditional WAN can be expensive and complex, SD-WAN architecture reduces recurring network costs, offers network-wide control and visibility, and simplifies the technology with zero-touch deployment and centralized management. The key to the SD-WAN architecture is that it can communicate with all network endpoints without the need for external mechanisms or additional protocols.

This means customers have the flexibility to choose the type of underlay network that works best for their users and environment, maximizing the utilization by allowing you to use all available bandwidth across available underlay networks.

As cloud based applications continue to be adopted and consumed, leveraging a flexible SD-WAN platform allows you to maximize application performance and efficiency in a way that traditional hub-and-spoke networks cannot.

Consider the following:

  • How many offices do you have and where are they located?
  • What is your current network topology?
  • What type of connectivity do you have at each location? MPLS, the internet, etc.
  • What are your mission critical applications?
  • What are you using for your voice or video applications?
  • What cloud or SaaS applications are you utilizing today? Azure, AWS, O365?
  • Do you have remote workers?
  • What kind of firewall are you utilizing today?
  • Are you using any WAN optimization devices?

Things to Consider

Banner Image

  • Understanding the flavors of SD-WAN and their niche focus
  • Understanding the customer’s own internal applications and constraints
  • Understanding the customer’s corporate strategy moving forward
  • Understanding the customer’s cloud strategy going forward
  • Understanding the customer’s security strategy moving forward

These are all considerations that should be discussed before deciding on an SD-WAN solution. There are so many different flavors and specific use cases for SDWAN that understanding the overall environment (the applications, digital strategy, security) is paramount to designing the right SD-WAN solution.

Things to Consider with Suppliers

Banner Image
Banner Image
Banner Image
Banner Image
Banner Image
32
Years in Business
Banner Image
1500+
Customers Served
Banner Image
20,000+
Agents Supported
Banner Image

Jimi Shah

Director of Client Solutions

Frequently Asked Questions

Are there any single points of failure?

There are no single points of failure in the SD-Wan architecture. For the distributed WAN architecture, a hybrid SDN approach offers the benefits of centralized control plane policies, but with distributed local control plane forwarding with local real-time knowledge of link conditions for reliability. All local Edge devices will continue functioning as normal even if communications with centralized orchestrators is disrupted. Onsite Edge devices support high availability configurations and any cloud gateways utilized are also redundant with sub-second failovers.

Does SD-WAN require replacing all private circuits? Or does a site require a private line?

SD-WAN provides the flexibility to support hybrid WAN connectivity combining private with public Internet circuits or pure Internet only connected sites. The various Dynamic Multi-path Optimization techniques ensure all different WAN circuits are utilized to their fullest based upon pre-defined performance and capacity rules.

How do you provide QOS over internet links? I thought QOS was not possible over the internet.

Traditional QOS with the DSCP and TOS markings is not possible over internet. However, if you look at the way traditional QOS rules operate, they only go into effect if you run out of bandwidth. And when you run out of bandwidth, then the QOS rules are designed to reserve bandwidth for the critical applications like voice and video to prevent loss and jitter. If you think about it, traditional QOS rules are basically designed to eliminate loss/jitter and to ensure the voice/video packets have the best chance possible to get to the end destination. SDWAN techniques like packet replication and best path selection provide the same end results. Replicating each voice packet over 2 or 3 internet links eliminates the chance for loss or jitter affecting the call. Best path selection used in conjunction also choose the links that have the least amount of loss and jitter; not just low latency or up/down status. While they don’t utilize the same tagging concept, the techniques utilized still yield the same end result — eliminating loss and jitter and ensuring the packets has the best chance possible to getting to the destination.

Is my WAN traffic secure since we are now introducing internet circuits?

By default, all site-to-site enterprise traffic are sent over encrypted tunnels independent of the underlying transport — usually AES128/SHA1 ipsec tunnels. Internet-bound traffic typically isn’t as much. However, settings can typically be changed — even the encryption levels.