Redefine IP Storage Networking
Don't settle for a legacy IP networkExplore
Brocade data center SLX and VDX switches leverage the cross-domain workflow capabilities of Brocade Workflow...
Brocade Campus Fabric Technology for ICX switches feature flexible scalability, simplified management, and low TCO....
Consolidate services for all your networks on one Carrier Ethernet platform. Support high bandwidth applications...
With Brocade Fibre Channel technology-based backbones and switches, you’ve got the firepower to deliver...
With Brocade IP storage networking, you benefit from recent innovations in Ethernet technology. Lightning-fast 10...
Brocade’s software defined networking controllers and applications make it possible for you to address your data...
Get the most from your network with Brocade network virtualization solutions. Achieve carrier-class performance in...
Brocade vADC solutions provide fast, reliable application delivery across your virtual and cloud platforms at...
Get your choice of hardware and software SLA’s plus 24×7 access to Brocade's Technical Assistance Center (TAC) via phone and the MyBrocade self-service portal.
Brocade's high touch support offering adds enhanced response times and a Support Account Manager (SAM) to Essential Support plus many other proactive, preferential, and personal features.
The Services Add-On Menu provides additional flexibility to support contracts by offering a wide variety of features that reduce downtime and augment customer environments.
Don't settle for a legacy IP networkExplore
Revolutionizing business models for the Third PlatformExplore
Free 30-Day Trial: Brocade Virtual Traffic Manager, the leading virtual application delivery platform for the New IPExplore
Today, network administrators manually translate requests for new network services and business rules into specific, static networking configurations. For example, a business rule may dictate blocking access to a particular resource by a particular group of users. Creating a networking configuration to serve this business rule requires knowledge of network specifics and user identification. And translating a business rule into a network configuration requires extensive networking expertise and product knowledge, and even then, the process is prone to errors.
Very soon, that task will be simple and automated. At that point administrators will be able to define intended network services and business rules, like networking policies, by defining the intent itself. From this intent-based policy definition the software will automatically compile the request into configurations that are executed by the network.
Intent-based policies can be extremely dynamic, implemented under specific circumstances and deactivated when they are no longer needed. Imagine a web-based meeting that requires more bandwidth to ensure high-quality video transmission. That need can be expressed as an intent that can even be declared by the video conferencing application itself. During the meeting, the network would serve that intent by directing resources as needed. After the meeting, those resources would automatically be released for other uses. Other examples of intent-based policies include:
Detect Denial of Service (DoS) attacks and mitigate them
Optimize network resources to accommodate high traffic volumes
Track server resource utilization and balance workloads to maintain service levels
Defining a policy engine
Brocade is participating in the OpenDaylight Network Intent Composition (NIC) project, which is developing an intent-based policy interface and framework for networking applications. This policy framework will be available on the Brocade SDN Controller (formerly known as Brocade Vyatta Controller). Contributors from Brocade are also participating in the Congress OpenStack project, which is developing an open-source framework for intent-based policy management across cloud services, such as application, network, compute, and storage.
Intent-based policy framework is a major upgrade in policy-based management technology. Manual/Static is becoming Automated/Dynamic. Administrator-defined is evolving into application-requested. But the most significant change is the automated translation from intent to configuration.
Automation and orchestration are central to the New IP because they are so well suited to the software-driven, programmable architecture model, while increasing operational efficiency and reducing costs across-the-board.
In the policy arena, automation provides immediate, practical benefits. Enhanced security. Improved performance. Lower operating costs. Even vast energy savings when policies are used to control lighting and climate control systems, or to redistribute workloads to increase server utilization. All coming soon, to a network near you. Imagine the possibilities.
A policy architecture and framework is discussed to support NFV environments, where policies are used to enforce business rules and to specify resource constraints in a number of subsystems.Read More
This session describes an open architecture for automating resource optimization, where operators provide a policy describing how workloads ought to be optimized, and OpenStack continually monitors and migrates workloads to satisfy that policy.Read More
One of the goals of Network Functions Virtualization (NFV) is to offer the NFV infrastructure as a service to other SP customers - this is called NFVIaaS.LEARN MORE