• Telecommunications Consulting

    Telecommunications Consulting

    Consulting Services from Network Design to Project Management Read More
  • Internetworking Training Experts

    Internetworking Training Experts

    Click on Training and then Courses. Read More
  • Wireshark Experts

    Wireshark Experts

    Packet analysis expertise is critical in today's networks, and being able to use the best packet analyzer application is a skill we can help you and your team attain. Read More
  • Are you a Network Scientist?

    Are you a Network Scientist?

    Online Learning, Instructor Led in person or Web-based delivery. Check out our online school. Read More
  • Online Certification Training

    Online Certification Training

    Find out about our Network Self Certification Program for Rural Service Providers here! Read More
  • IPv6 Experts

    IPv6 Experts

    Along with other Internet regions, ARIN is out of IPv4 Addresses. Are you IPv6 fluent? Are you IPv6 ready? Read More
  • Enabling the IoT with Wireless

    Enabling the IoT with Wireless

    Without wireless, we cannot have the Internet of Things. Read More
  • MPLS Book for iPad and iPhone

    MPLS Book for iPad and iPhone

    Get Mr. Walding's book here! Read More
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8

Welcome to CellStream, Inc. - Telecom Consulting and Training!

Welcome to our home on the Internet, where we can not only share information, but also interact with each other. If you are a visitor to the site, there are a number of things to view: our FAQ'sNetworking and Computing Tips, our CellStream Blog, and other fun reading can all be found in the drop down menus above.  The Training menu provides access to our courses, our course calendar, and learning services.  The Consulting Menu provides information on our consulting services and a place to meet our consulting and teaching team.  Registered CellStream folks and our clients will log in using their private credentials to access projects, calendars and discussions.

Thanks for visiting! We always welcome comments and suggestions.

This question (really two questions) has been popping up quite a bit lately.  Let me see if I can explain.

Screen Shot 2015 10 06 at 2.45.00 PM

First, let's define what SD-WAN is.  SD-WAN leverages the SDN concept of separating the control plane from the data plane and creating a controller running software that can enact control and policies on the network.  However, in the SD-WAN implementation, the controller never actually receives nor forwards any network traffic.  The controller contains software and policy databases, along side a communication protocols to interface to network devices.  In this implementation what really happens is the controller can query the network devices, even decode packet flows and streams.  It can then instruct the end nodes to tunnel and encrypt traffic usually using IPsec inside VxLAN.

In the diagram on the right we see everything in black and green being part of the Enterprise Network and the Blue being the Service Provider network.

The key here is the controller and it's ability to provision tunnels on interfaces of the enterprise nodes in such a way to leverage either/or the MPLS, Internet or other network interfaces that may be available to meet enterprise application goals.

The object of this service is to simplify provisioning as the network manager in the enterprise no longer is configuring routers and switches (as much anyway), and the Controller function can provide traffic analysis and best path selection out of the available interfaces.  I have heard that this new product replaces the router, and that sound byte has resonated in the industry.  While this is potentially possible over time, it is not likely in the short term.

Nonetheless, this new set of tools we call SD-WAN is a major step forward for network managers as we use software to control the networks.  The security vulnerability, of course, is the controller. These devices will need to be very secure, not Linux based honey holes for the hackers. Although the companies making these solutions say their nodes keep operating if the controller is wiped out, more or less frozen in place.  At least the network stays up.

The node boxes technically can be anything, but most of the players offer x86 based systems as their nodes.  The entrants into the market boast "open" design, but they truly are closed with "open" API's.  Seems these days, if you have an API you are "open".

Now for the second question - does this replace MPLS?  Perhaps in the enterprise networks, if the encryption and encapsulation can operate at the breakneck speeds required of forwarding.  That said, SD-WAN is not likely to replace MPLS if the blue box above is a Service Provider network.  The MPLS services there are seen by the enterprise nodes as interfaces, end of story.  None of this addresses MPLS' sweet spot called Traffic Engineering.  Furthermore, no one has explained how the enterprise and the service provider interface for SD-WAN, like many of the issues (MTU and Fragmentation management, IPv6 support, etc.) much of this is to be determined as of this writing.

It is early days for SD-WAN and we may see a lot more development and functionality in the coming months.

We hope this helps answer the question(s).

Comments powered by CComment

Our Latest Content

  • IPv4 Subnetting Illustrated

    Yes yes, you can always use an IPv4 calculator to determine the IPv4 subnet addresses, and most of these are

    Read More
  • How do I install /upgrade Wireshark in Ubuntu Linux?

    First things first - the Wireshark downloads page is here: https://www.wireshark.org/download.html I know I have put the answer to this in

    Read More
  • Adding Packet Comments in Wireshark

    Just a quick tip on how to add packet comments to your packet captures. The usecases are fairly straight forward: 

    Read More
  • Packet Diagram feature in Wireshark

    In Wireshark 3.3.0 development release, and 3.4.0 stable release and later, you are going to find a hidden gem.  Wireshark

    Read More
  • Nested Display Filter Buttons feature in Wireshark

    In Wireshark 3.4.0 stable release and later, you are going to find a display button feature that we have already

    Read More
  • 1
  • 2
  • 3
  • 4

Our Most Popular Articles

  • What is the 'arp' command, and how can I use it?

    Let's answer the question, but before I do, you can watch my ARP lesson on Youtube here: https://youtu.be/aD_caJxD7nY and look at the

    Read More
  • A Great Toolkit for Presenters - Zoomit!

    ZoomIt is a utility for the public speaker in all of us. When presenting information, sometimes it is helpful to

    Read More
  • 3 Ways to put your Wi-Fi Interface in Monitor Mode in Linux

    Check out these great references as well:   Our Wireless custom profile for Wireshark  Our Udemy course on Wireless Packet capture

    Read More
  • Neighbor Discovery (ND) Table in IPv6 Windows, Linux and MAC Machines

    Check out these additional IPv6 Resources: Our IPv6 overview course at Udemy Our IPv6 Custom Profiles for Wireshark Our IPv6

    Read More
  • T-Shark Usage Examples

    Check out these great references as well:   Our custom profiles repository for Wireshark  Our Udemy course on Wireshark   Our Udemy

    Read More
  • 1
  • 2
  • 3
  • 4

Did you learn something?
Did I save you time? 

Buy me a coffeeBuy me a coffee!

Subscribe to our Newsletter!

Subscribe to our newsletter to learn about upcoming classes, new networking how to's and much more.

Find by Tag

4G Networks 5G Networks 6LoWLAN 6LoWPAN 802.11 802.11ah 802.11ax 802.11ay 802.11az ACL Addressing Analysis Ansible Architecture ARP AToM Backup Bandwidth BGP Biography Bloom's Taxonomy Cable CBRS CellStream Cellular Central Office Cheat Sheet Chrome Cisco Clock Cloud Computer Consulting CPI Data Center Data Networking Decryption DHCPv4 DHCPv6 Display Filter DNS Documentation dumpcap ECMP EIGRP Ethernet Ethics Flipping the Certification Model Follow Me Fragmentation G-MPLS Git GNS3 Google GQUIC Hands-On History Home Network HTTPS ICMP ICMPv6 IEEE 802.11p IEEE 802.15.4 In A Day Internet IOS Classic IoT IPsec IPv4 IPv6 IS-IS L2 Switch L2VPN L3VPN LDP Linux LLN Logging LoL M-BGP MAC Macro Microsoft mininet Monitoring Monitor Mode MPLS Multicast Name Resolution Netcat Netflow NetMon netsh Networking Network Science nmap Npcap nslookup Online Learning Online School OpenFlow OSPF OSPFv2 OSPFv3 OSX OTT Parrot PIM Ping Policy POTS POTS to Pipes PPP Profile Profiles Programming Project Management PW3E Python QoS QUIC Remote Desktop Requirements RIP Routing RPL RSVP Rural SAS SDN Security Self Certification Service Provider Small Business Smartport SONET Speed SSH SSL Subnetting T-Shark TCP TCP/IP Telco Telecom 101 Telecommunications Telephone Telnet TLS Tools Traceroute Traffic Analysis Traffic Engineering Training Travel Tunnel Ubuntu Utility Video Virtualbox Virtualization VoIP VRF VXLAN Webex Wi-Fi Wi-Fi 6 Windows Wireless Wireless 5G Wireshark Wireshark Tip WLAN ZigBee Zoom

Twitter Feed