Gartner Analysis & Predictions: Enterprise Network Infrastructure and Services

by Bjarne Munch | To Chee Eng | Greg Young | Danellie Young | Vivek Bhalla | Andrew Lerner |Danilo Ciscato of Gartner Group

Overview:

This new Gartner Group report is on the key impacts of digital business, cloud and orchestration strategies. In particular, IT leaders must continue to focus on meeting enterprise needs for expanded WAN connectivity, application performance and improved network agility, without compromising performance.

Key Findings:

  • As enterprises increasingly rely on the internet for WAN connectivity, they are challenged by the unpredictable nature of internet services.
  • Enterprises seeking more agile WAN services continue to be blocked by network service providers’ terms and conditions.
  • Enterprises seeking more agile network solutions continue to be hampered by manual processes and cultural resistance.
  • Enterprise’s moving applications to public cloud services frequently struggle with application performance issues.

Recommendations:

IT leaders responsible for infrastructure agility should:

  • Reduce the business impact of internet downtime by deploying redundant WAN connectivity such as hybrid WAN for business-critical activities.
  • Improve WAN service agility by negotiating total contractual spend instead of monthly or annual spend.
  • Improve agility of internal network solutions by introducing automation of all operations using a step-wise approach.
  • Ensure the performance of cloud-based applications by using carriers’ cloud connect services instead of unpredictable internet services.
  • Improve alignment between business objectives and network solutions by selectively deploying intent-based network solutions.

Strategic Planning Assumptions:

Within the next five years, there will be a major internet outage that impacts more than 100 million users for longer than 24 hours.

  • By 2021, 25% of enterprise telecom contracts will evolve to allow for greater flexibility such as canceling services or introducing new services within the contract period, up from less than 5% today.
  • By 2021, productized network automation (NA) tools will be utilized by 55% of organizations, up from less than 15% today.
  • By YE20, more than 30% of organizations will connect to cloud providers using alternatives to the public internet, which is a major increase from 5% in 3Q17.
  • By 2020, more than 1,000 large enterprises will use intent-based networking systems in production, up from less than 15 today.

Analysis:

Gartner Group has five predictions that represent fundamental changes that are emerging in key network domains, from internal networking to cloud services and WAN services.

two key aspects that the majority of Gartner clients struggle with:

  1. The increased interest in utilizing the internet for WAN connectivity continues to raise concerns about the performance of public internet services and performance of applications deployed in public cloud services. We discuss the risk that enterprises encounter due to the unpredictable nature of the internet, and we discuss how an enterprise can use MPLS to connect directly to public cloud services instead of using the internet.
  2. Enterprises continue to need new business solutions deployed faster, but remain hampered by the inability of network solutions and network services to respond fast enough and rectify performance issues fast enough. We discuss three options to improve network operations as well as network services.
Figure 1. Five Predicts to Create a Better Enterprise Network

Enlarge Image

Source: Gartner (December 2017)

Strategic Planning Assumptions

Strategic Planning Assumption: Within the next five years, there will be a major internet outage that impacts more than 100 million users for longer than 24 hours.

Analysis by: Andrew Lerner, Greg Young

Key Findings:

  • We are increasingly seeing organizations use the internet as a WAN, and estimate that approximately 20% of Gartner clients in many geographic regions have at least some critical branch locations entirely connected via the internet.
  • Most IT teams don’t have a detailed understanding of the multitude of applications and services that are being used on the public internet and/or their criticality. This is because of years of line of business (LOB)-centric buying and the proliferation of SaaS.
  • While the internet is highly resilient, there are specific infrastructure and technology hot spots that, if compromised, could threaten the internet as a whole or large portions of it. This could be the result of natural disasters, man-made accidents or intentional acts.
  • Natural disasters and man-made acts that could impact large portions of the internet include earthquakes, solar flares, electronic pulses, meteors, tsunamis, hurricanes, major cable cuts and network operator errors.
  • Intentional acts include hacktivism, terrorism toward critical infrastructure, and/or coordinated distributed denial of service (DDoS) attacks, attacks against carrier- and ISP-specific components, and protocols (e.g., SS7).

While the probability of each of these events individually is small, the likelihood that at least some of them will occur over an extended period of time is actually surprisingly high. For example, even if there is only a 1% chance that any of the 11 examples identified above results in an outage within a year, there is a statistical likelihood of over 45% that at least one of them will occur over a five-year period. Further, to date, there have been indications that the internet is vulnerable to sizable outages:

  • In 2008, millions of users and large portions of the Middle East and India were impacted by a cable cut. 1
  • In 2016, a large DDOS attack resulted in many large e-commerce sites going down, including Twitter, Netflix, Reddit and CNN. 2
  • In 2015, Telekom Malaysia created a routing problem that rendered much of the Level 3 network unavailable. 3
  • It has been widely reported that 70% of all internet traffic goes thru Northern Virginia 4 and, while this might be an overstated, there’s no doubt that there are several major chokepoints in the internet infrastructure.

Market Implications:

At a minimum, an extended and widespread internet outage would cause dramatic revenue loss for enterprises, and could even create life-threating situations depending on what business the organizations is in. Initially, many organizations often brush this off by saying, “Well there’s not much we can do about it anyway” or “If there is a large internet outage due to a natural disaster, then personal safety is the priority and the enterprise connectivity is the least of our concerns.” However, there are very specific and actionable items that infrastructure and operations (I&O) leaders should take to mitigate the impact of a large outage.

Strategic Planning Assumption: By 2021, 25% of enterprise telecom contracts will evolve to allow for greater flexibility such as canceling services or introducing new services within the contract period, up from less than 5% today.

Analysis by: Danellie Young

Key Findings:

  • Enterprise telecom contracts are typically fixed in both term duration and for the services required for procurement.
  • Most larger revenue contracts ($1 million annually) require the enterprise to agree to minimum revenue commitments on an annual basis.
  • Major WAN decisions are made by 31% to 47% of enterprises each year, including equipment refresh or carrier renegotiations (assuming the refresh cycle on routers is six years, and the average enterprise WAN service contract is three years).
  • A large majority of enterprises are struggling with the cost, performance and flexibility of their traditional WAN contracts, further exacerbated by the proliferation of public cloud applications.

Market Implications:

Enterprise telecom contracts remain rigid and fixed, with specified services required to ensure compliance. Typically such contracts penalize customers when services are disconnected midterm. Enterprise telecom contracts are typically negotiated on 36-month cycles, based on either full-term or revenue commitments. Revenue commitments are set based on monthly spend, annual spend or total contract spending. Upon meeting the contract’s revenue commitment, the enterprise can then renegotiate or consider alternative services or providers since their financial obligation has been met. Terminating contracts early for convenience will typically levy penalties on the enterprise. These penalties range from 100% of the monthly recurring charges (MRCs) to a percentage of the MRCs to a declining portion through the remainder of the term (i.e., 100% in the first 12 months, 75% in months 13 to 24 and 50% through the end of the term).

Currently, contracts are split between term and revenue commit contracts, whereby most of the revenue commitments are made on an annualized basis. Alternatively, a small number (5%) are offered or negotiated with total contract values tied to them. Total contract revenue commitments enable the enterprise to meet the obligation earlier in their contract and provide the opportunity to negotiate new lower rates and a new contract, and to solicit competitive proposals before the full 36-month cycle terminates.

In addition to traditional voice and data services, many networking vendors now offer SD-WAN functionality products, while carriers and managed service providers (MSPs) are beginning to launch and roll out managed SD-WAN services as an alternative to managed routers. Contract flexibility will be needed to allow the enterprise the flexibility to migrate to new solutions, without financial risk or paying early termination fees on services. Thus, while we anticipate rapid adoption of SD-WAN and virtualized customer premises equipment (vCPE) solutions in the enterprise, SD-WAN by itself will not improve contractual conditions.

………………………………………………………………………………………………………………………………

 

Gartner’s Advice to use Multi-Vendor Network Architectures Contradicts Industry Trends, e.g. SD-WANs, NFV

Editor’s Note:  Why Single Vendor Solutions Dominate New Networking Technologies

There are no accredited standards for exposed interfaces or APIs* in SD-WANs, NFV “virtual appliances,” Virtual Network Functions (VNFs), and access to various cloud networking platforms (each cloud service provider has their own connectivity options and APIs).  Those so called “open networking” technologies are in reality closed, single vendor solutions.  How could there be anything else if there are no standards for multi-vendor interoperability within  a given network?

In other words, “open” is the new paradigm for “closed” with vendor lock-in a given.

* The exception is Open Flow API between Control and Data planes-from ONF.

Yet Gartner Group argues in a new white paper (available free to clients or to non clients for $195),  that IT end users should always adopt multi-vendor network architectures.  This author strongly agrees, but that’s not the trend in today’s networking industry, especially for the red hot “SD-WANs” where over two dozen vendors are proposing their unique solution in light of no standards for interoperability or really anything else for that matter within a single SD-WAN.

Yes, we know Metro Ethernet Forum (MEF) has started working on SD-WAN policy and security orchestration across multiple provider SD WAN implementations. They’ve also written a white paper “Understanding SD-WAN Managed Services,” which defines SD-WAN fundamental characteristics and service components. However, neither MEF or any other fora/standards body we know of is specifying functionality, interfaces for interoperability within a single SD-WAN.

…………………………………………………………………………………………………….

Here are a few excerpts from the Gartner white paper is titled:

Divide Your Network and Conquer the Best Price and Functionality

“IT leaders should never rely on a single vendor for the architecture and products of their network, as it can lead to vendor lock-in, higher acquisition costs and technical constraints that limit agility. They should segment their network into logical blocks and evaluate multiple vendors for each.”

Key Challenges:

  • Vendors tend to promote end-to-end network architectures that lock clients with their solutions because they are focused on their business goals, rather than enterprise requirements.

  • Enterprises that make strategic network investments by embracing vendors’ architectures without first mapping their requirements often end up with solutions that are overhyped, over-engineered and more expensive.

  • Enterprises that do not create and actively maintain a competitive environment can overpay by as much as 50% for the same equipment from the same vendor. Savings can be even greater when comparing to other vendors with a functionally equivalent solution.

Recommendations:

IT and Operations leaders focused on network planning should:

  • Divide the network into foundational building blocks, defining how they interwork with each other, to enable multiple vendor options for each block.
  • Remove proprietary components from the network, replacing them with industry standard elements as they are available, to facilitate new vendors to make competitive proposals.
  • Get a technical solution that meets needs at the lowest market purchase price by competitively bidding on each building block.
  • Ensure that operations can deal with multiple vendors by planning for network management solutions and processes that can cope with a multivendor environment.

Introduction

Network technologies have matured in the last 20 years and are a routine component of every IT infrastructure. No vendor can claim a unique “core competency” nor “best-of-breed” capabilities in every area of the network, so there is no reason to treat the network as a monolithic infrastructure entrusted to a single supplier. However, we regularly speak to clients that still give credit to the myth of the single-vendor network. They believe that having only one networking vendor provides the following advantages:

  • There is no need to spend time designing a solution, as you simply get what leading vendors recommend.
  • Products from the same vendor are designed to work seamlessly together, with limited or no integration challenges.

  • The procurement process is simplified with only one vendor, and there’s no need to deal with time-consuming, vendor-neutral RFPs.

  • A higher volume of purchases with one vendor would result in a better discount.

  • You only have a single vendor to hold accountable in case you run into problems, and one that will respond quickly given the loyalty and volume of purchases.

However, these perceived advantages are largely a myth, as much as open networking and complete vendor freedom is a myth. The harsh reality that we frequently hear from clients that followed this single-vendor strategy includes:

  • Holistic designs recommended by vendors are not necessarily the best. They are often over-engineered, include products that are not aligned with enterprise needs and are ultimately more expensive to buy and maintain.
  • Diverse product lines from the same vendor share the brand, but they are rarely designed to work together from the start, since they often come from independent BUs or acquisitions, making them difficult to integrate.
  • A higher volume of purchases does not automatically translate into better discounts. For most vendors, their best discounts are reserved for competitive situations and will generally offer savings of 15% to 50% when compared with the best-negotiated sole-source deals.
  • Having to deal with just one vendor for technical issues is simpler, but does not necessarily translate in shorter time to repair and better overall network availability, which is the real goal.

Clients that pursue a multivendor strategy report that time spent on RFPs and evaluation of different vendors is not a waste, because it increases teams’ skills, motivates them to stay abreast of market innovations, prevents suboptimal decisions and pays off — technically and financially.

Divide the Network Into Foundational Building Blocks to Enable Multiple Vendor Options for Each Block

Network planners and architects must break the network infrastructure into smaller, manageable blocks to plan, design and deploy a “fit-for-purpose” infrastructure that addresses the defined usage scenarios and control costs (Figure 1 shows typical building blocks).

Figure 1. Example of Network Building Blocks

Enlarge Image*Security is not addressed in this document. Note: There is no hierarchy associated with block positioning in this picture.

Source: Gartner (October 2017)

……………………………………………………………………………………….

The key objectives of this activity are to:

  • Identify network blocks that have logical and well-defined boundaries.
  • Document and standardize as much as possible the interfaces between the various building blocks, to allow choice and enable use of multiple vendors.

This building block approach is useful because not all network segments have the same properties. In some segments little differentiation exists among suppliers, and there is a high degree of substitution within a building block, so enterprises can seek operational and cost advantages. For example, wired LAN switching solutions for branch offices are largely commoditized, and the difference between vendors is hard to discern in the most common use cases.

In other cases, such as in the data center networking market, there is more differentiation among vendors, and the segmentation approach ensures that enterprise architectural decisions align with IT infrastructure strategies and business requirements.

There are no hard-and-fast industry rules on where the boundaries between blocks must be drawn. Each enterprise has to split network infrastructure in a way that makes sense for them. The most common approach is segmentation around functional areas, such as data center leaf and spine switches, WAN edge, WAN connectivity, LAN core and LAN access. Each segment could further be split. For example, LAN access includes wired and wireless, while WAN edge might include WAN optimization and network security services. Another complementary segmentation boundary can be the geographical place, as a large organization with subsidiaries in multiple locations could select different vendors on a regional or country basis for some blocks. Disaggregation is creating another possible segmentation, since hardware and software can be awarded to different vendors for some solutions like white-box Ethernet switching.

Defining building blocks also protects organizations from the “vendor creep” trap. As vendors acquire small companies and startups in adjacent markets, they often encourage enterprises to add these new products or capabilities to the “standardized” solution. If the enterprise defines its foundational requirements, it can easily determine whether the new functionality truly solves a business need, and whether any additional cost is warranted.

Remove Proprietary Components From the Network to Facilitate New Vendors to Make Competitive Proposals

Employment of proprietary protocols and features inside the network limits the ability to segment the network into discrete blocks and makes this activity more difficult.

Within building blocks, it is acceptable to use proprietary technologies, as long as enterprises compare vendors against their business requirements (to avoid over-engineering) and the solution provides a real and indispensable functional advantage. It is important to express the business functionality as a requirement and not to tie requirements to specific proprietary technologies. 

Between building blocks, it is critical to avoid proprietary features and use standards, since proprietary protocols favor using certain vendors and disfavor others, leading to loss of purchasing power. Sometimes it’s necessary to employ a proprietary protocol, for example:

  • To obtain functionality that uniquely meets a critical business need. If so, then it’s critical that these protocols be reviewed regularly and are not automatically propagated into new buying criteria over the long term.

  • In the early stages of market development, before standards have caught up to innovation. However, once standards exist, or the technology has started to move down the commodity curve, it is imperative that network architects and planners migrate to standards-based solutions (as long as business requirements aren’t compromised). Examples of industry standards that replace previous proprietary solutions are Power over Ethernet Plus (PoE+) and Virtual Router Redundancy Protocol (VRRP) (see Note 1).

In these cases it is essential to document and motivate the exception, so that it can be periodically reviewed. Proprietary technologies should always be avoided in the interface between the network and other components of IT infrastructure (for example, proprietary trunking to connect servers to the data center network).

Get a Technical Solution That Meets Needs at the Lowest Market Purchase Price by Competitively Bidding on Each Building Block

Dividing the network provides a clear definition of what is really needed within each building block, which in turns enables a fit-for-purpose approach and a competitive bidding process.

–>The goal is not to bid on the best technical solution for each block, but on one that is good enough to meet requirements.

This enables real competition across vendors and provides maximum price leverage, since all value-adds to the common denominator can be evaluated separately and matched with the cost difference.

By introducing competition in this thoughtful manner, Gartner has seen clients typically achieve sustained savings of between 10% and 30% and of as much as 300% on specific components like optical transceivers.

Discern the Relationships Between Networking Vendors and Network Management Vendors

You may also find that networking vendors have some level of leverage with certain other vendors specialized in network management. Therefore, it is valuable to understand the arrangement of any partner agreement and whether this can be leveraged to your organization’s benefit. 

………………………………………………………………

Editor’s Closing Comment:

The advice provided above by Gartner Group seems very reasonable and mitigates risk of using only a single vendor for a network or sub-network.  If so, how can any network operator or enterprise networking customer justify the single vendor SD-WAN solutions that are proliferating today?

Readers are invited to comment in the box below the article (can be anonymous) or contact the author directly (ajwdct@comsoc.org).

……………………………………………………………………………..

References:

 

https://www.firemon.com/resources/collateral/avoid-these-bottom-ten-networking-worst-practices/

https://www.networkworld.com/article/3142053/lan-wan/gartner-predicts-sd-wans-to-replace-routers-but-which-sd-wan-is-the-question.html

https://www.gartner.com/doc/3783150/market-trends-csps-approach-sdwan

 

 

 

Recent Posts