Mapping Out Must-Haves for Future-Ready Networks
How does this approach help hospitality operators to future-proof networks?
BRADBURY: Bandwidth, agility and security are the cornerstones of a future-proof network. A software-defined approach allows a network to be updated and improved via new software components, allowing for a longer and more robust development path for the network technology. Automation allows the network to adjust to and optimize for changing network capacities, applications and traffic flows.
How do networks need to change to accommodate this increased complexity?
BRADBURY: Networks must deliver consistently available bandwidth. Bandwidth growth has been going up by double-digit annual rates for years and that trend will continue. Networks must also be agile. One of the great benefits of cloud apps is the ability to add new applications or switch to a different application provider very quickly and easily. In combination with the modern “test and fail fast” paradigm, this results in unprecedented pace of change in retail IT. A reliable network should support fast adoption and turnover of applications without the need to reconfigure or rewrite policies for the network for every change.
The proliferation of cloud apps and guest WiFi means Internet access, which creates risk. Hospitality networks require security built in from the ground up, with integrated and centralized policy management and the ability to identify and react to the emergence of a threat, whether originating from the Internet or from a user on the local network.
- 4 Key Features for Next-Gen, Cloud-Friendly Networks
1. SD-WAN. This offers the ability to apply path control to multiple circuits, routing traffic across the best performing path based on application and session attributes. More than just a back-up circuit, SD-WAN features two circuits operating in conjunction with one another – achieving superior network availability and throughput at a lower cost compared to traditional failover network designs.
2. Application Assurance. While path control is important, equally critical is the ability to measure available bandwidth in real-time and to classify higher and lower priority traffic. Knowing the available bandwidth and the priority of each packet allows the network to apply traffic shaping, fitting the maximum amount of traffic into each pathway possible. The final element of Application Assurance is replication, which duplicates critical traffic and, bandwidth permitting, sends it over both paths to ensure application performance.
3. Security. A Next Gen Firewall (NGFW) and Unified Threat Management (UTM) secure the network edge and sense both internal and external traffic, identifying and addressing every serious threat that could mean a breach, protecting both business and customer data.
4. Zero Touch Configuration (ZTC). This simplifies the deployment, operation and maintenance of the network, getting new locations up and running faster; minimizing the impact to business operations during installation of new technology. A network isn’t truly efficient if a business has to spend enormous time and effort manually creating, maintaining or reworking the network and its policies.