Downloads: 2 | Views: 50 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Research Paper | Information Technology | India | Volume 11 Issue 10, October 2022 | Popularity: 4.7 / 10
SD - WAN Technology: Advantages and Use Cases
Udit Patel, Sanjay Poddar
Abstract: This extensive paper examines the development, relevance, historical background and architecture, and issues surrounding WANs and MPLS in enterprise networking. It presents SD - WAN as a way of doing WAN and a subclass of Software Defined Networking (SDN) that overcomes the constraints of traditional WANs and MPLS by offering more flexibility, greater efficiency, and advanced protection measures at a lower cost. The paper also describes the main components of SD - WAN, such as edge devices, centralized controllers, and transport networks, and how the latter form a comprehensive outline of the SD - WAN?s technical solution. Furthermore, the paper also discusses the various practical applications of SD - WAN across different industries such as finance, retail, healthcare, and remote work that prove the adaptability of SD - WAN to the current and ever - evolving enterprise networking requirements. The paper also examines the future direction of SD - WAN based on AI & machine learning, edge computing, 5G, and multi - cloud, which will further expand the adoption of SD - WAN. Ending with a debate on digital transformation, the paper highlights how SD - WAN is now an essential component in the modernization process of enterprise networks.
Keywords: Wide Area Networks (WAN), SD - WAN, MPLS, Network Security, Edge Devices, Centralized Controller, Digital Transformation, AI, 5G Networks, Multi - Cloud Integration
Edition: Volume 11 Issue 10, October 2022
Pages: 1434 - 1448
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Information Technology, United States of America, Volume 13 Issue 10, October 2024
Pages: 914 - 917Data Governance and Security - A Comprehensive Review of Snowflake and Databricks
Rameshbabu Lakshmanasamy
Downloads: 0
Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017
Pages: 2487 - 2494Cybersecurity Strategies for Legacy Telecom Systems: Developing Tailored Cybersecurity Strategies to Secure aging Telecom Infrastructures against Modern Cyber Threats, Leveraging your Experience with Legacy Systems and Cybersecurity Practices
Jeevan Manda
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, United States of America, Volume 12 Issue 2, February 2023
Pages: 1766 - 1772Remote Browser Isolation: A Path to Zero Trust Security in the Modern Enterprise
Dhaval Gogri
Downloads: 103
Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016
Pages: 1465 - 1469PTP Method in Network Security for Misbehavior Detection Using Entropy
Neha Pathak, R. S. Apare
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, Saudi Arabia, Volume 6 Issue 3, March 2017
Pages: 2100 - 2104Information and Computer Network Security Policy for Sudanese Telecom Companies
Mohamed Ibrahim Gali, Mudawi Al Musharaf, Abdelrahman Elsharif Karrar