Thursday, September 20, 2012

How Private Cloud helps your network


Secure Private Cloud for Networking

Your business may be considering a move to the “cloud” for some applications and communications services. Interest in cloud computing is driven by increasing expectations for always-on, geographically dispersed businesses—accompanied by decreasing budgets and staff availability to manage an in-house network.
But what does the cloud really mean to your network design and how you deliver voice and data services to users? What factors should you consider when evaluating how to use cloud-based applications with public and private network services? How do you create the best deployment of a private or hybrid public/private network for secure cloud computing?
Before moving to a cloud, it is important to identify the activities and applications that the cloud network will need to support. For example, do you want to:
- Access external storage and computing resources or cloud-based applications?
- Perform transactions—such as working with financial databases or verifying identities?
- Support real-time monitoring, collaboration, and instant communication?

The Drawbacks of a Public (Internet-Only) Network

After identifying your cloud computing goals, consider the type of network you want. Although a public network that uses the
Internet to transport all traffic may seem like an attractive choice, it involves significant trade-offs for performance and security.
Applications may not perform properly and/or bandwidth may not be available for mission-critical applications. Your network may
suffer latency, jitter, and packet loss.
For performance, a public network provider using the Internet can only deliver a “best effort” priority level that applies to all traffic. This limitation exists because all Internet traffic is vulnerable to moment-by-moment congestion levels and routing path availability, which can render your applications unusable. Applications on a public network may create user frustration if the network delivers a slow response or when access is blocked because of Internet problems.
Security is another critical concern in using public networks. Private Networks, MPLS in particular, are less susceptible to Denial of Service (DOS) and other attacks than networks that utilize the public network for site-to-site communications.
Additionally, although anti-virus, intrusion detection, and intrusion prevention services may be available, these services are usually applied only at the customer premises, which may be too late for protecting data and applications from unauthorized access, data theft, and disruption.
Together, the risk of network latency and security threats in a public network may outweigh the advantages of moving to a cloud environment in order to reduce computing costs and IT staff levels.

The Advantages of Private MPLS-based Network for Cloud Computing

In contrast to the limitations of a public network, private MPLS-based network offers many advantages for cloud computing. MPLS (Multi-Protocol Label Switching) has been the foundation technology for communications and creating private networks consisting of two or more locations. By design, MPLS creates a fully meshed network topology with multiple paths between any two or more sites. It automatically forwards your traffic via the optimal path, ensuring that packets—which carry data, voice calls, or video streams—are delivered quickly without bottlenecks or single points of failure. This efficiency makes MPLS ideal for supporting performance-sensitive applications such as Voice over Internet Protocol (VoIP) and videoconferencing, as well as financial and enterprise resource planning (ERP) transactions. Many large enterprises, healthcare organizations, government agencies, and other companies choose MPLS because of the advantages it offers for the safety and security of their networks and data.
MPLS is both a secure and “self-healing” network that maintains multiple routes to cloud-based applications. If a private network becomes congested, the network can automatically reroute packets using another available path. In addition, Class of Service (CoS) definitions can prescribe the priority levels for certain types of packets (e.g., voice, video, and point-of-sale) throughout a private network to ensure your applications have the network resources available to function properly.

Additional security measures can protect your data if you include Internet access in your private network design. A gateway security service will check the data packets before they enter your private network looking for intrusions, viruses, and related threats. A firewall can allow certain types of network traffic to access cloud-based applications, or it can deny external access.
A Carrier’s network plays a role your business’ cloud computing by connecting your business locations to each other and the Internet. This role means the capabilities the carriers network can greatly impact the performance, reliability, and security of your cloud-based applications.
The carrier must have an all-optical MPLS core network that offers a strong foundation for a private network because the MPLS network is engineered to maximize application performance. Redundant OCx links and a fault-tolerant point-of-presence (POP) architecture maximize network uptime and reliability. In addition, the carrier must use state-of-the-art MPLS routing technology to deliver your data with exceptionally low latency and packet loss.


High Performance Traffic Shaping and Class of Service

A critical factor for the success of cloud computing is delivering high performance levels for each traffic type and application carried on the network. MPLS networks use Class of Service (CoS) tagging or labeling to shape voice, video, and data traffic, then maintain that priority across the network. This prioritization delivers the quality of service that is an important requirement for a provider’s network.
CoS rules ensure that voice calls and videos have optimal sound and playback quality. Additionally, IT managers can control bandwidth costs and network performance by using CoS to prioritize voice traffic ahead of data applications and real-time video conference streams ahead of stored video downloads. A provider extends service classes to your sites using CoS-capable equipment to mark, queue, and prioritize traffic as it travels from the site to the MPLS network. This traffic marking and prioritization ensures consistent circuit performance for important applications. The provider-edge routers also prioritize and queue these traffic flows across the MPLS network and in the return direction from the network to the site.
It is important to note that any traffic destined for the Internet cannot be prioritized once it leaves the carriers network because they have no control over the Internet routers. (A carrier may have its own Internet routers but cannot not control the Internet routers owned or managed by other carriers.) However, critical applications that access the Internet can still benefit from priority handling within some networks while en route to the Internet.
Although most service providers support some form of CoS prioritization in their MPLS networks, not all of these offerings are alike. Some service providers support only a few options for traffic prioritization CoS definitions, covering the broad categories of voice, video, and data. The most common definitions are:
- Real-time: Voice services and customer VoIP and video traffic
- Critical: Mission-critical data—such as financial transactions and credit card data transmission
- Business: Enterprise applications—such as SAP, Oracle, or video surveillance traffic
- Data: Low-priority traffic—such as Internet browsing, file transfers, and stored video downloads
The ability to create multiple CoS definitions helps you better manage traffic in a private cloud by:
- Prioritizing business-critical applications
- Controlling bandwidth allocations and avoiding the need to over-provision or dedicate circuits
- Promoting consistent, interruption-free network performance
- Preventing critical applications from failing or impacting the user experience due to network congestion

Protect Your Network with Managed Security Services

To protect your cloud-computing solution, carriers offer powerful, cost-effective, and fully managed security solutions that are compliant with key industry standards, such as PCI and HIPAA. These services deliver a multilayer security approach that provides holistic protection from individual and blended threats, as well as coordinated security alerting, blogging, and reporting.
Carriers offer cloud-based network edge protection, as well as site-level solutions to protect your assets from external and internal threats. Security solution components—which are managed and maintained by the provider—typically include managed firewalls; intrusion prevention systems; antivirus, anti-spyware, and anti-spam software; and Web and content/URL filtering tools.
When delivered via a single platform, these components are classified as Unified Threat Management (UTM). When selecting a security solution, it is important to understand where the protection is being applied. In all scenarios, defense-in-depth is a best security practice.

No comments:

Post a Comment

Please see our site at lkconsulting.net