Skip to main content

Eyebrow Links

  • Angebot anfragen
  • Kontakt
  • Partner
  • Log in
  • Quote builder icon
Quote builder icon
Home
  • Lösungen
    Alle Lösungen
    Nach Anwendung
    Industrietaugliche LösungenUnternehmensnetzwerkeNetzwerk-ÜberwachungsdienstePhysische SicherheitKleine und mittlere Unternehmen (SMB)Intelligente GebäudeSoftware Defined Labs
    Nach Technologie
    CybersecurityNetzwerk-AutomatisierungVerlässlichkeitWAN-OptimierungWi-Fi
    Nach Industrie
    BildungBundesregierungGesundheitswesenHerstellungIntelligente StädteLandesregierungTransport

    Erfolgsgeschichten

    Wir helfen Unternehmen auf der ganzen Welt, ihr Geschäft auf die nächste Stufe zu heben.

    Sehen Sie, wie wir das machen
  • Produkte
    Alle Produkte
    Switche
    Unternehmens-CampusKleine und mittlere Unternehmen (SMB)Power Over Ethernet (PoE)Industrietauglich Alle Switche
    Drahtlose Lösungen
    Enterprise-KlasseKleine und mittlere Unternehmen (SMB)Outdoor / IndustrietauglichWireless AP-Router Alle drahtlosen Zugangspunkte
    Firewalls und Router
    Virtuelle UTM Firewalls1GbE UTM FirewallsSichere VPN RouterDrahtloser AP-Router Alle Sicherheitsvorrichtungen
    Netzwerkadapter
    Alle Netzwerkadapter
    Medienkonverter
    Verwaltete KonverterUnverwaltete KonverterIndustrietaugliche Konverter Alle Medienkonverter
    Transceiver
    100M SFP module1G SFP module10G SFP+ modules40G QSFP+ module100G QSFP28 module Alle Transceiver
    Netzwerk-Management
    Netzwerk-Dashboard (Vista Manager)Drahtloser Controller ((AWC)Cybersecurity Controller (AMF-Sec)WAN-Optimierung (AMF-WAN) Alle Netzwerkmanagement

    Produkt-Selektor

    Beschleunigen Sie Ihre Suche und vergleichen Sie ähnliche Artikel Seite an Seite.

    Probieren Sie es aus!
  • Dienstleistungen und Support
    Alle Dienstleistungen
    Dienstleistungen
    Advisory ServicesHosted ServicesImplementierungsdienstleistungenManaged ServicesSupport ServicesSchulungskurse
    Software-Unterstützung
    Pläne für die UnterstützungSoftware-DownloadsSoftware-LizenzierungSoftware-VersionshinweiseAussagen zur Anfälligkeit
    Produktunterstützung
    Net.Cover-SupportpläneProduktregistrierungInformationen zur GarantieListe der End-of-Sale-Produkte
    Unterstützung der Dokumentation
    InstallationsanleitungenKonfigurationsleitfädenLeitfäden für erste SchritteReferenz-LeitfädenSoftware-Versionshinweise Alle Dokumente

    Kunden-Support-Portal

    Sie erhalten Zugang zu Artikeln der Wissensdatenbank, Support-Tickets und mehr.

    Einloggen
  • Info über
    Alles über uns
    Informationen zum Unternehmen
    Unser Unternehmen PartnerprogrammPressemitteilungenAuszeichnungenKarriere bei Allied TelesisKarriere bei Allied TelesisUmweltinitiativenInformationen für Investoren
    Veranstaltungen
    AusbildungPersönliche Veranstaltungen
    Unsere Technologien
    Active Fiber MonitoringAlliedware PlusNetwork Automation (AMF)Autonomous Wave ControlChannel BlanketContinuous PoEResilient Ring (EPSR)Software-Defined Networking (SDN)IPv6 SupportMulti-Gigabit NetworksNetwork Loop ProtectionPower over Ethernet (PoE)Remote Power CycleSmart MissingLinkStacking (VCStack)

    Markenrichtlinien

    Laden Sie Marketing-Assets wie Logos oder Icons herunter und verstehen Sie, wie man sie verwendet.

    Visit ToolBox
  • Suchen
  • Dokumentation
    Alle Dokumente
    Unterstützung der Dokumentation
    InstallationsanleitungenLeitfäden für erste SchritteKonfigurationsleitfädenReferenz-LeitfädenSoftware-Versionshinweise
    Zeichnungen
    Mechanische ZeichnungenVisio-Schablonen

    Success Stories

    Wir unterstützen Firmen auf der ganzen Welt dabei die Geschäfte auf ein neues Level zu heben.

    Sehen Sie, wie wir das machen
  • Angebot anfragen Kontaktiere uns Partner » Einloggen »

A Migration Path to Software-Defined Networking (SDN) in an Enterprise Network

Bringing software control into an Enterprise network does not have to be an abrupt overnight change. In fact, transitioning from a traditional network to one that is based on Software-Defined Networking (SDN), can, and should, occur in a gradual manner.

There are a number of reasons why an abrupt transition to a completely software-defined network is extremely difficult to execute. For a start, the amount of planning that is required to ensure the continued operation of all current network services makes it prohibitively difficult—there are innumerable details to consider and analyze, and too many unexpected behaviors to foresee.

Testing the new solution is also problematic. It is not possible to pre-test the whole system, as that would mean setting up an entire parallel data network. It is only feasible to test limited subsets of the network.

Furthermore, the logistics of completing a network cutover to SDN in an acceptable outage window are extremely challenging.

The reality is that migrating to a software-defined network is necessarily a progressive process, which should occur in a series of steps, each of which addresses a particular need.

Why change to SDN?

The data network is a tool of the Enterprise, and the only reason for altering the operation of the network is to make it a tool that better serves the Enterprise. Putting time and money into reworking the network, simply to make it a different-looking network without any added value, is pointless.

The starting point of this transition is to identify the ways in which the business expects to get more value from its new, software-defined data network. The major benefits of introducing software control into the network are:

  • Cost reduction
  • Increased flexibility
  • Greater security
  • Improved user experience

These benefits are explained in more detail in the following sections.

Cost reduction

Network operating costs can be reduced in two main ways: simplifying complex tasks, and automating routine tasks. Clever software is the key to achieving both.

Software assistance simplifies complex tasks such as:

  • Troubleshooting problems
  • Bulk reconfiguration
  • Predicting resource contention

Unifying the network under software control enables the reliable automation of routine activities, such as:

  • Configuration backups
  • Software upgrades
  • Replacing faulty units

Reducing the amount of time that needs to be spent on these activities enables IT engineers to use their valuable hours performing more skilled tasks.

Increased flexibility

Mobility, convergence, and the proliferation of applications have all rapidly increased the number of capabilities that are now expected of an Enterprise network. These new capabilities must be delivered, and in a manner that conforms to organizational policies. As a result, today’s networks must operate in an increasingly agile manner which takes into account a large number of factors—including user identity, application content, device context and usage policies.

Gaining consistent levels of content awareness and dynamic behavior across the entire network would require capabilities that network nodes typically do not possess.

Centralizing content awareness, context awareness and decision making, and then pushing instructions out to the network nodes, is the most practicable means of achieving the required dynamic behavior throughout a network.

Greater security

A strong trend in advanced persistent threats is the installing of a “Trojan horse” application into the network. This Trojan will perform actions within the network, and may only very infrequently communicate with hosts outside the network.

Hence, threat protection systems that only monitor data exchanged with the Internet, will often miss the signs of a Trojan having been installed within the network, or will pick up the signs too late.

Again, the data analysis and decision making capabilities required for accurate threat protection are beyond the means of most network nodes, and so must be centrally provided. Centralized protection software can instruct network nodes to block the sources of suspicious traffic as it is detected.

Improved user experience

Increased flexibility, responsiveness and threat protection, together with reduced downtime, all add up to an improved user experience.

The majority of users give very little thought to the network infrastructure except when it malfunctions. What users want is high-performance access to their services and applications, when and where they need it. The best way to provide this experience is to optimize the network behavior, by means of responsive intelligent control.

A three-phase process

Gaining software control is a three-phase process:

  • Phase 1: unified management
  • Phase 2: OpenFlow hybrid
  • Phase 3: optimum SDN deployment

Each phase is described in more detail in the following sections.

Phase 1: Unified management

The first step towards bringing software control into a network is to unify the management of the network, so that it can be managed as a single entity.

Allied Telesis unifies network management with Allied Telesis Autonomous Management Framework™ (AMF), which embeds an intelligent management framework into a network.

AMF provides:

  • Automatic creation of a management communication path throughout the network
  • Automation of routine tasks such as backups, software upgrades and device health-checking
  • Zero-touch replacement of failed units, and provisioning of new network nodes
  • Simultaneous configuration of multiple network nodes
  • Collection of troubleshooting information from multiple nodes concurrently

These facilities achieve the bulk of the cost-reduction needs when transitioning to a software-controlled network. Furthermore, AMF facilitates the introduction of control applications. The ability to configure multiple nodes simultaneously is a key enabler of event-based network control applications. Such programs can easily alter filters, QoS settings, VLAN parameters or routing policies across the whole network, based on such factors as time of day, server load, sustained WAN congestion, and many more.

Introducing AMF into an existing network is straightforward—it simply requires a few configuration commands on each device. Importantly, AMF can operate in a mixed-vendor network. AMF connections can be tunneled across non-AMF-capable networks, thereby enabling it to be extended across the Internet or other WAN service.

This is a low-impact first step, which yields a high return in cost savings and centralized network control.

Phase 2: OpenFlow hybrid

Whilst AMF provides unified network management, the key to direct programmatic control of network data flows is OpenFlow.

OpenFlow is an open-standards interface that allows fine-grained control over how a network device forwards or drops data streams. Once OpenFlow is enabled on network nodes, detailed programmatic control becomes possible.

Fortunately, OpenFlow can be brought into a network in a staged fashion. A network can operate quite successfully for an extended period in a hybrid OpenFlow mode. The hybrid mode can apply to the network as a whole, in a situation where some nodes in the network support OpenFlow while others don’t. Furthermore, nodes themselves can operate in hybrid mode, whereby some ports or VLANs are controlled by OpenFlow and some are not.

So, for example, OpenFlow can be introduced on a set of edge switches—maybe those in a particular department—and perhaps even on just some ports of those switches. In this way, software for network control can be trialed on a subset of users. These users’ data can then be controlled by centralized software applications. For instance, the policy routing and bandwidth limits applied to their data streams can be controlled by instructions from the centralized software, rather than by static configuration on the switches. The performance of this new mode of operation, and its ability to apply finer control based on network conditions, can then be evaluated and optimized.

The hybrid mode of operation provides a suitable environment in which to determine which SDN applications truly add value to the organization, and which are of limited, or no benefit.

Phase 3: Optimum SDN deployment

The transition from a hybrid network to a completely software-defined network may be very gradual, or may in fact never be complete. The deployment of SDN may only provide distinct benefit in certain sections of the network, and not be extended to other sectors.

On the other hand, in some networks, the benefits of SDN are so clear that it is quickly deployed to the whole network.

Whatever the case, the peaceful coexistence of traditional and software-defined networking means that the optimum level of SDN in the network can be discovered over time, and regularly reviewed as the technology develops.

Secure Enterprise SDN—a real SDN solution for the Enterprise

Allied Telesis have created a true, practical, Enterprise SDN solution, called Secure Enterprise SDN.

The elements of this solution are:

  • AMF, to provide unified network management
  • OpenFlow, to provide an open-standards control interface to the networking nodes
  • Secure Enterprise SDN Controller (SESC)–Allied Telesis’ Openflow controller
  • Security, mobility and user/device management applications

This solution can be implemented in the multi-phase manner described above, pausing at any step along the way, or can be taken quickly through to a completely SDN-controlled network.

Irrespective of the extent to which the network is transferred to SDN control, the solution is an effective framework within which to bring SDN into the network.

The policies applied to groups of users can be defined in an HR-facing application, and back-end software converts these policies into instructions which are delivered, via the SDN controller, to individual network nodes. The network recognizes the identities of connected users and dynamically applies access restrictions, service levels, and device usage permissions, based on user profiles defined in the HR application.

Device security postures defined as high-level policies are applied in a granular fashion to each connected device, and non-conformant devices are automatically quarantined.

Rules for the use of mobile devices are applied as filters that block certain traffic to/from mobile devices, and as disconnection of devices being operated outside of allowed locations.

Traffic security is applied at the heart of the network, immediately recognizing threat-related traffic, and rapidly disconnecting the source device from the network.

Delivering the goals of Enterprise SDN

The SES solution delivers the expected benefits of SDN in the Enterprise, by:

  • Using software to translate business rules into network control, rather than requiring IT staff to perform that translation, and manually implement it as network node configuration commands.
  • Ensuring unfailing security scanning of connected devices, and rapid, automated response to security threats detected in the network.
  • Reducing the time spent on network control and configuration–thereby reducing network operating costs.
  • Providing users with a consistent, reliable network experience.

Conclusion

Transitioning from a traditional network to one that is based on SDN can, and should, occur in a gradual manner. The migration to a software-defined network should ideally be a three-phase process, in which each step towards gaining software control addresses a need, and thus provides a benefit.

Managing the migration in this way avoids potential problems, issues and outages, and allows the network to meet the major benefits of introducing software control—cost reduction, increased flexibility, greater security, and an improved user experience.

Download PDF

Related

Software-Defined Networks

Software-Defined Networking (SDN) creates new possibilities for smarter infrastructure solutions

SDN and the Changing Face of Enterprise Networks

Enterprise data networks have evolved rapidly over the last few decades, and are continuing to evolve at a steady pace.

Understanding Enterprise SDN

This white paper discusses SDN—how and why it has emerged, and what effects it will have on Enterprise networking in the future.

Ensure Security Across Your Entire Network Using Software Defined Networking (SDN)

This article discusses an integrated threat detection and response solution from Allied Telesis and Flowmon.

Cybersecurity

Allied Telesis Self-Defending Network bietet eine intelligente Sicherheitslösung für Ihr drahtgebundenes und drahtloses Netzwerk zum Schutz vor Cyberangriffen

Kaohsiung City Gets Smarter with IoT Connectivity

Chunghwa System Integration selects Allied Telesis for smarter IoT connectivity in Kaohsiung City.

OpenFlow Certified Products

We're leading the market with OpenFlow v1.3-certified products for advanced SDN applications.

AMF-Security is Going to Change IT Security

This article describes how AMF-Sec can automate your network cybersecurity.
Diese seite teilen
LinkedinCreated with Sketch.You TubeCreated with Sketch.vimeoCreated with Sketch.
Folgen sie uns
Zum Seitenanfang
Support Portal PartnerportalWiederverkäufer findenKontakt Vertrieb

Footer menu

  • Wie man kauft
  • Newsroom
  • Blog
  • Bedingungen und Richtlinien
  • Karriere
  • Karriere
  • Veranstaltungen
  • Investoren
  • Wie man kauft
  • Newsroom
  • Blog
  • Bedingungen und Richtlinien
  • Karriere
  • Karriere
  • Veranstaltungen
  • Investoren

© 2025 Allied Telesis, Inc. All rights reserved.

ImpressumPrivacy settings