• Technologies
    • Black Lotus Labs
    • Cloud
    • Edge Compute
    • Collaboration
    • Managed Services
    • Network
    • Security
  • Business Advice
    • 4th Industrial Revolution
    • Business Continuity & Disaster Recovery
    • Customer Experience
    • Data Driven Business
    • Operational Efficiency
    • Tech Trends
  • Industries
    • Financial Services
    • Healthcare
    • Gaming
    • Manufacturing
    • Media and Entertainment
    • Pharmaceutical
    • Public Sector
    • Retail
    • Technology
  • About Us
    • Leadership Perspectives
    • NewsRoom
    • LATAM Blog
  • Technologies
    • Black Lotus Labs
    • Cloud
    • Edge Compute
    • Collaboration
    • Managed Services
    • Network
    • Security
  • Business Advice
    • 4th Industrial Revolution
    • Business Continuity & Disaster Recovery
    • Customer Experience
    • Data Driven Business
    • Operational Efficiency
    • Tech Trends
  • Industries
    • Financial Services
    • Healthcare
    • Gaming
    • Manufacturing
    • Media and Entertainment
    • Pharmaceutical
    • Public Sector
    • Retail
    • Technology
  • About Us
    • Leadership Perspectives
    • NewsRoom
    • LATAM Blog

Before Making WAN Changes, Consider Your Bandwidth and Application Requirements

Paul Desmond Posted On March 19, 2020
0


0
Shares
  • Share On Facebook
  • Tweet It

In part 1 of this 3-part series on how to conduct a wide-area network assessment and prepare for WAN updates, we looked at foundational issues such as current challenges and objectives. In this installment, we’ll examine considerations around applications and bandwidth.

As with part 1, my source for information was Mike Lawson, Manager of SD-WAN/NFV Solutions Architecture for CenturyLink. Lawson is in the trenches with network architects and customers every day; as such, he understands the issues that lead companies to upgrade WAN services to newer technologies such as software-defined WAN (SD-WAN).

Visibility Into Apps – Who’s Using What

The initial question revolves around the visibility and control you have into how your applications are using bandwidth across various locations.

“Typically, customers have some level of visibility, but the question is how easy it is to use and whether they’re getting the information they need,” Lawson says.

Smaller companies may have some understanding into the amount of bandwidth different applications are using, but it’s unlikely that they can determine which groups of users are watching YouTube between 3 and 4pm every day, and therefore taking up significant chunks of bandwidth

Another question is whether you can create policies to prevent situations where users chew up too much bandwidth. If companies have to piece together data from multiple monitoring tools, it’s highly unlikely they can implement such policies, Lawson says.

Newer technologies like SD-WAN let users pull data from multiple sources into a single console, Lawson explains. This makes it easier to control the network as a whole, including applying policies to determine bandwidth usage by application, time of day, and other parameters.

Assessing Bandwidth Requirements

Companies also need to determine whether they’re providing adequate capacity and performance for bandwidth-intensive or delay-intolerant applications such as voice-over-IP and videoconferencing.

“Ask yourself, how much dedicated and predictable capacity do you need for voice and video?” Lawson advises. “The goal is to right-size the network, so applications have what they need but you’re not paying for bandwidth you’re not using.”

As noted in part 1 of this series, that’s an issue with services like MPLS where companies often buy multiple lines for redundancy, but only use the higher cost additional capacity when there’s a failure in the primary line.

Consider, too, whether you have international locations that are difficult or expensive to reach with your current service provider. Last but not least, if you use multiple carriers, be sure to ask how you manage relationships with them.

“Dealing with multiple providers can chew up valuable cycles that most IT shops can’t afford to waste,” Lawson notes.

In the next (and last) installment of this series, we’ll look at security and network resiliency issues.

Find out how to transform your hybrid network with CenturyLink SD-WAN.

Learn More

This articles was previously published on NetworkWorld on July 23, 2019.

This blog is provided for informational purposes only and may require additional research and substantiation by the end user. In addition, the information is provided “as is” without any warranty or condition of any kind, either express or implied. Use of this information is at the end user’s own risk. CenturyLink does not warrant that the information will meet the end user’s requirements or that the implementation or usage of this information will result in the desired outcome of the end user.

Related posts:

  1. Assessing Your WAN Strategy: Resiliency and Security at Branch Locations
  2. Rethinking Work from Anywhere (WFx) Technologies
  3. How customers benefit from our commitment to leadership—today and tomorrow
  4. Business Networking 101
0
Shares
  • Share On Facebook
  • Tweet It


Adaptive NetworkApplicationsSD-WAN


Author

Paul Desmond

Paul Desmond has been involved in the IT trade press since 1988. He is principal with PDEdit (www.pdedit.com), an IT publishing firm he founded in 2001 that produces content for the IT trade press and vendor communities, including white papers, case studies, blogs and Web sites. Prior to founding PDEdit, Paul spent 11 years at Network World, serving as a reporter as well as news editor and features editor. Under his leadership, Network World's features department took home a number of editorial excellence awards, including a 1996 Neal Certificate of Merit Award from the Business Press Association and two 1998 awards from the American Society of Business Press Editors. Paul has also served as editor of Redmond magazine and was the founding editor-in-chief of Redmond Channel Partner magazine, which earned a Neal Award for Best Startup publication of 2005. He was also founding editor of the eComSecurity.com Web site, now known as eSecurityPlanet.com.

Trending Now
Are Sophisticated Bots Knocking Down Your WAF?
Robert Kusters May 25, 2022
3 types of edge computing and when to use them
Lumen May 24, 2022
You may also like
Does MPLS still matter?
January 12, 2022
Expanding Lumen CDN in the Middle East with new node in Egypt
September 29, 2021
Utilizing Adaptive Optical Networks to Enable Digital Innovation and Accelerate Transformation
September 28, 2021
Visteon Puts Its Trust in CenturyLink As We Drive Toward an Autonomous Future
Read Next

Visteon Puts Its Trust in CenturyLink As We Drive Toward an Autonomous Future

  • Categories

    Adaptive Networking

    Connected Security

    Hybrid Cloud

    Communications and Collaboration

    Edge Computing


  • Lumen is guided by our belief that humanity is at its best when technology advances the way we live and work. With 450,000 route fiber miles serving customers in more than 60 countries, we deliver the fastest, most secure platform for applications and data to help businesses, government and communities deliver amazing experiences.

Services not available everywhere. ©2022 Lumen Technologies. All Rights Reserved.
Press enter/return to begin your search