30
30
CONNECTIVITY
" The transition to SDN is something network engineers should consider . Likewise , there needs to be discussions about how to address the IoT and everything it brings with it ."
considered . As well as security issues , this has substantial network performance implications as network administrators don ’ t have sight of how traffic is being routed and optimised by the provider .
It ’ s difficult to plan for the bandwidth needs of known cloud services , but it ’ s even more difficult to plan for the unknown . This includes end users leveraging online storage , file sharing and other cloud-based services without the knowledge of IT . As well as security repercussions , these free or ‘ freemium ’ cloud services are becoming just as much an aspect of the shadow IT phenomenon as anything else and , needs to be addressed .
These challenges can be overcome but there isn ’ t a simple solution . IT professionals need to identify their biggest security concerns , before following corporate security regulations to ensure compliance certifications are achieved . Once complete , they should build a plan with the cloud service provider to meet relevant requirements . A good way to approach network performance is to monitor the user experience using a system that differentiates whether a slowdown is due to network latency , or slow server response - for example , deep packet inspection . To solve the bandwidth issues of unauthorised cloud services , specific services can of course be blocked company-wide . But administrators must ensure there is management buyin and also offer alternative services - after all , there is a reason end users sought out the ‘ shadow ’ cloud service in the first place .
Wireless and mobile Wireless technology is essential in organisations today . More so given the low cost to buy and manage wireless equipment compared to the costs of traditional cabled workspace wire closets . However , there are also challenges with such technology - primarily around sufficient signal strength and mobile working . Large wireless environments create their own problems . Imagine the challenges of running a wireless network in an organisation such as a large university .
“ Suddenly you ’ re tracking 187,000 devices . Unlike an office where most users roam between their desks and a conference room or two in a fairly reliable pattern , I have thousands of students sweeping majestically across campus like technology-laden wildebeest crossing the Serengeti .”
With mobile working being implemented and encouraged across most organisations , network managers are experiencing the same issue identified by the university . However there are solutions , such as IP address management , wireless heat maps , and user device tracking which augments traditional network device monitoring to help combat these challenges . For a long time these were seen as quite costly , although this is no longer the case . As a network manager , wireless environments could become less of a concern once new cost-effective solutions have been explored .
From IPv4 to IPv6 For years there has been talk about the looming evolution from IPv4 to IPv6 . Most notably because IPv4 isn ’ t ‘ futureproof ’ - the Internet is running out of IPv4 addresses . However , despite IPv6 having the advantage of making managing network services much easier , adoption has been somewhat slow . This is largely due to costs , and explains why IPv6 addresses currently only contribute to a limited number of today ’ s Internet .
Many network administrators don ’ t realise how common it is for IPv6 to already be enabled and operative in most businesses . This is leading to the creation of unmanaged IPv6 enabled ‘ shadow networks ’, which has the potential to cause huge security risks . If there are unknown and unmonitored IPv6 systems within an organisation there is a high chance that devices using IPv6 addresses will contain security flaws . And this will inevitably go unnoticed by network administrators .
It ’ s important for network managers become aware of this issue and implement policies to overcome the IPv6 challenge . The main way to gain control is to simplify the IP address management process . This can be achieved using tools that automatically gather data on addresses in use , what address types are used by various devices , and even keeping a history of conflicts and usage for both IPv4 and IPv6 . Such a toolset would allow network managers to track critical assets and provide reports which include IP address parameters , as well as monitor devices currently supporting IPv6 , map existing IPv4 space and proposed IPv6 space and document devices which will need to be replaced by IPv6 support .
The transition to SDN is definitely something network engineers should consider . Likewise , there needs to be discussions about how to address the IoT and everything it brings with it . But they shouldn ’ t forget about the issues affecting their networks today , because without rectifying these first , they will have more on their plate when SDN and IoT evolves . n
www . networkseuropemagazine . com