A look at WAN deployments through the ages. The future of WANs is no-WAN. Credit: Photographing London It is probably safe to assume that private networking has been an afterthought. In fact, the Internet Engineering Task Force (IETF) document (RFC 1918) that created private network addresses that are “un-routable” was released years after BGP-4 and IPV6 were codified into standards. In order to join private networks to each other, wide area networks (WANs) emerged. Initially, the benefits obtained by WANs were just pure connectivity. Subsequent benefits accrued, including the belief that private networks were secure because addresses of servers and clients in the private address could not be reached from the public network unless a “translation” or rule was established. This, however, may no longer be the case. Here’s a look at WAN deployments through the ages: The WAN before now WAN 1.0 Nearly every use of the Internet is a bi-directional packet flow that originates or terminates in a private network. Early WAN deployments were physical. Wires, pseudo wires, dark fiber, microwave, lasers and other schemes were used to connect buildings and properties. The WAN was truly a single managed network spanning geographic areas. These WANs used routers and switches, yet never shared or connected any information with the public Internet. WAN 2.0 Tunnels of all types (GRE, MPLS, IPSEC, etc.) emerged as a way to connect private networks across shared or public network infrastructure. A tunnel has one purpose – to get a packet to go somewhere it wouldn’t go otherwise. People argue a tunnel provides security or privacy, but in fact encryption technology provides this, and tunnels are not a prerequisite to encryption. Tunnels also present aggregated flows to networks breaking network understanding and thus fairness. Tunnels use between 10 and 20 percent additional bandwidth, and frequently cause packet fragmentation issues. Another way of looking at this is the need for a tunnel indicates networking technology is inadequate. The meteoric rise of tunnels in all aspects of networking strongly suggests networking needs to be rebooted. The WAN of today WAN 3.0 Collections of tunnels are called SD-WAN and often referred to as “virtual networks,” since anything that is “virtual” is better, right? A better technical term is “overlay.” These collections of tunnels running over one or more underlay networks are managed and controlled by a single party. There are no networking technologies that can interconnect these collections of tunnels. One interesting capability most WAN 3.0 solutions have is multi-path routing. Allowing routers to pick interfaces for specific applications is not part of a traditional network routing model. The multi-path routing is a primary source of ROI as enterprises are adjusting to the massive movement to cloud based services. The future of WAN is No-WAN WAN 4.0 Due to forces of mobility and cloud, the chances that a client and server are on the same managed WAN are now reduced to as low as 20 percent. WANs between data centers for east-west traffic will make less sense as application servers scatter from two locations to hundreds. What is needed is a way for the underlay to provide authenticated routing from one private network to another, through any number of network boundaries, at any time with optional encryption. No-WANs land Technology exists today that can easily eliminate the need for WANs completely. By signaling for network services in-band, routers can add new levels of security and policy control. Just as most applications today use cookies and single sign-on tokens, network signaling can communicate end-to-end. Many large technology companies have abandoned traditional networking and use proprietary schemes (Google, Facebook, Amazon, etc.) for their east-west traffic. They have achieved efficiencies and economies of scale – but their internal developments are not consumable by the rest of the world. There is promise, however, in recent IP routing research areas such as LISP, IPv6 segment routing and named data networking. However, putting all these routing advances into a blender, and adding all 25 years of industry protocols and experience, will not level the playing field. To properly secure, balance and route packets, networks need to understand services. Middle boxes like firewalls, DPI devices and load balancers understand services, but routers do not. This needs to change. The future network will not have tunnels or WANs or tags. The future network will provide secure packet routing from any private network to any private network through any number of IPv4 and IPv6 networks. The existing networks (private and public) will not change physically, but adding intelligence to routers at the edges will transform the internet from millions of separately managed networks connected by NATs to one large multi-network routing system with end-to-end controls. Related content opinion Beware the networking industrial complex How new approaches are disrupting networking and how service providers can adjust their capabilities to support those. By Patrick MeLampy Sep 13, 2018 5 mins Networking opinion Network engineers are from Mars, application engineers are from Venus We need to build a bridge between these groups and rise above the current set of solutions, or we will experience catastrophic infrastructure failures. By Patrick MeLampy Sep 12, 2018 6 mins Networking opinion We need innovation to help escape from the cloud-services land of Oz Industry-standard networking practices can streamline corporate access to public clouds. By Patrick MeLampy Sep 05, 2018 4 mins Networking opinion Does your network have a trade imbalance? Tariffs, trade balances and networking – help the network do what the business needs. By Patrick MeLampy Aug 23, 2018 4 mins Routers Network Monitoring Networking Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe