{"id":5272,"date":"2018-02-13T11:30:03","date_gmt":"2018-02-13T17:30:03","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=5272"},"modified":"2018-01-22T11:32:02","modified_gmt":"2018-01-22T17:32:02","slug":"intent-based-networking","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/intent-based-networking\/","title":{"rendered":"Intent-Based Networking"},"content":{"rendered":"<p><span style=\"font-family: verdana, geneva, sans-serif;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/01\/intent-based-network-management.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-5273\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/01\/intent-based-network-management.jpg\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/01\/intent-based-network-management.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/01\/intent-based-network-management-150x150.jpg 150w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/a>The software-defined approach to network management and implementation relies on the creation of an abstraction layer, to provide a virtual overlay on the physical infrastructure of servers, switches, routers, and wireless access points.<\/span><\/p>\n<p>\u00a0<\/p>\n<p>\n <span style=\"font-family: verdana, geneva, sans-serif;\">Historically, the creation and management of these virtual network layers has been accomplished through a combination of virtual Local Area Networks (VLANs), Virtual Private Networks (VPNs), and network segmentation rules.<\/span><\/p>\n<p>\u00a0<\/p>\n<p>\n <span style=\"font-family: verdana, geneva, sans-serif;\">But technologies being pioneered by Cisco and a number of startup companies are providing an alternative framework for software-defined infrastructure management, in the form of a strategy known as intent-based networking.<\/span><\/p>\n<h3>\n <span style=\"font-family: verdana, geneva, sans-serif;\">What Is Intent-based Networking?<\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">An intent-based network (IBN) uses machine learning and advanced automation for management and monitoring.<\/span><\/p>\n<p>\u00a0<\/p>\n<p>\n <span style=\"font-family: verdana, geneva, sans-serif;\">The idea itself isn\u2019t particularly new, but it\u2019s only in recent years that technology has developed to the stage where intent-based networking systems (IBNS) can become a practical reality. Today\u2019s machine learning algorithms may allow network administrators to set policies which define a desired state for the network, then deploy automated network orchestration software to implement those policies.<\/span><\/p>\n<p>\u00a0<\/p>\n<p>\n <span style=\"font-family: verdana, geneva, sans-serif;\">According to Gartner Research Vice President Andrew Lerner: \u201cIntent-based networking systems monitor, identify and react in real time to changing network conditions.\u201d<\/span><\/p>\n<p>\u00a0<\/p>\n<p>\n <span style=\"font-family: verdana, geneva, sans-serif;\">Lerner defines four characteristics of the intent-based network:<\/span><\/p>\n<p>\u00a0<\/p>\n<p>\n <span style=\"font-family: verdana, geneva, sans-serif;\">1. Translation and validation: Commands issued by network administrators may be translated into actions performed via software platforms. Managers and administrators can develop high-level business, networking, and security policies, in the knowledge that the IBNS can verify whether or not these policies may be executed.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">2. Automated implementation: Once a human network manager has defined the desired state of a system, the intent-based networking software manipulates available resources to create that desired state, and enforce all defined policies.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">3. Awareness of state: Intent-based networking systems are \u201cself-aware\u201d, to the extent that they continuously gather information on the network and monitor its state.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">4. Assurance and dynamic optimization\/remediation: An IBNS employs machine learning to select the best ways to implement desired network states, and can automatically take remedial actions to maintain a network state and optimize network operations.<\/span><\/p>\n<p>\u00a0<\/p>\n<p>\n <span style=\"font-family: verdana, geneva, sans-serif;\">In theory, an IBN solution would enable administrators to easily and automatically manage multi-vendor and multi-device environments, with policies that treat the network in aggregate terms, but with the fine-grained control needed to address the issues and requirements of specific business units and\/or hardware sets.<\/span><\/p>\n<p>\u00a0<\/p>\n<p>\n <span style=\"font-family: verdana, geneva, sans-serif;\">Though no fully market-ready solutions have yet been released, Cisco and a handful of startup companies have laid out road-maps for the creation of IBNS platforms and related products, and it\u2019s on the basis of these that we may look at some of the principles and practices involved.<\/span><\/p>\n<h3>\n <span style=\"font-family: verdana, geneva, sans-serif;\">Managing The IBN<\/span><\/h3>\n<p>\n <span style=\"font-family: verdana, geneva, sans-serif;\">Fundamental to the IBN philosophy is the ability of human network administrators to create policies tailored toward their particular enterprise, and then define network states corresponding to the conditions spelled out by these policies.<\/span><\/p>\n<p>\u00a0<\/p>\n<p>\n <span style=\"font-family: verdana, geneva, sans-serif;\">In managing the intent-based network, this approach demands a command post or nerve center providing deep insight and granular control over the various network elements. Cisco has addressed this need through its DNA Center interface for managing software-defined access(SD-Access) intent-based networks.<\/span><\/p>\n<p>\u00a0<\/p>\n<p>\n <span style=\"font-family: verdana, geneva, sans-serif;\">Such a control interface takes on the task of creating the virtual overlay network, which can segment the network into various layers, each having specific policies \u2013 but allowing all the segments to be centrally managed. User names, passwords, and IP addresses may all be managed from this central point. <\/span><\/p>\n<h2>\n <span style=\"font-family: verdana, geneva, sans-serif;\">Designing The Network<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">From the administration console, managers of the IBN should be able to configure settings for every device in the network. This facilitates the process of network design, whereby administrators can not only create definitions for all the sites comprising the extended corporate campus (central office, branch divisions, remote sites, etc.), but also define how each device in every domain should be configured.<\/span><\/p>\n<p>\u00a0<\/p>\n<p>\n <span style=\"font-family: verdana, geneva, sans-serif;\">Using the design tool-set, administrators may create the necessary definitions to establish host protocols, set domain names, establish syslog files and configure management protocols. Each time a new device is deployed at a particular site, the IBN software automatically retrieves the configuration settings for that location, and installs them on the device. <\/span><\/p>\n<h3>\n <span style=\"font-family: verdana, geneva, sans-serif;\">Policy Management<\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Policy management for the intent-based network requires administrators to create and manage profiles for their virtual network overlays. In principle, all the users and devices assigned to one virtual network remain logically confined to it, so a firewall would be required to gain access to a different virtual network.<\/span><\/p>\n<p>\u00a0<\/p>\n<p>\n <span style=\"font-family: verdana, geneva, sans-serif;\">A combination of firewalls, MPLS deployments and virtual reference stations could in theory be used to execute similar policy controls over different classes of devices, but in practice this would require a fair amount of manual labor and human intervention.<\/span><\/p>\n<p>\u00a0<\/p>\n<p>\n <span style=\"font-family: verdana, geneva, sans-serif;\">But the virtualized approach allows segmentation to occur within network segments, providing very fine levels of granular control. So for example, within a virtual network created for employees, each division may be assigned its own network segment and rules specific to each business unit. This degree of micro-segmentation also makes it easier for security managers to limit the spread of potential damage, if a single segment is breached.<\/span><\/p>\n<h3><span style=\"font-family: verdana, geneva, sans-serif;\">Provisioning<\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">The provisioning tool-set of the IBN provides the functions needed to implement the rules defined by the network policy and configuration settings. And the management software provides simple drag-and-drop mechanisms for network managers to dictate which devices should be specific to which domain, and the policies that should be enforced on those devices.<\/span><\/p>\n<h3>\n <span style=\"font-family: verdana, geneva, sans-serif;\">Enforcing Policies<\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Policy enforcement on the intent-based network is an ongoing and dynamic process. Software tools within the management center collect network operations data, while monitoring tools and prescriptive algorithms map observed performance against benchmarks, to determine which activities, applications, or processes currently active on the network are behaving as expected. In some instances, the software may even be able to provide remedial suggestions or troubleshooting procedures.<\/span><\/p>\n<h3>\n <span style=\"font-family: verdana, geneva, sans-serif;\">The Way Of The Future?<\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">It should be stressed that intent-based networking is still very much in its infancy. The 1.1 release of Cisco\u2019s DNA Center is expected to be available in January 2018. Other names to watch for include Anuta Networks, which is offering a solution aimed at separating network services from hardware components, so as to facilitate highly automated processes, and Apstra, which is floating the idea of a vendor-agnostic network operating system which can be used to deliver IBN.<\/span><\/p>\n<p>\u00a0<\/p>\n<p>\n <span style=\"font-family: verdana, geneva, sans-serif;\">But industry analysts don\u2019t expect IBN to become a mainstream offering until at least 2020.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The software-defined approach to network management and implementation relies on the creation of an abstraction layer, to provide a virtual overlay on the physical infrastructure of servers, switches, routers, and wireless access points. \u00a0 Historically, the creation and management of these virtual network layers has been accomplished through a combination of virtual Local Area Networks [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":5273,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,6],"tags":[],"class_list":["post-5272","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-tech"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/5272","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=5272"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/5272\/revisions"}],"predecessor-version":[{"id":5276,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/5272\/revisions\/5276"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/5273"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=5272"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=5272"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=5272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}