Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in

Similar documents
Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products

Research. Key Issues for Software as a Service, 2009

Research Agenda and Key Issues for Converged Infrastructure, 2006

IT asset management (ITAM) will proliferate in midsize and large companies.

The Lack of a CRM Strategy Will Hinder Health Insurer Growth

Cloud Decision-Making Criteria for Educational Organizations

Q&A: The Many Aspects of Private Cloud Computing

IT Architecture Is Not Enterprise Architecture

Data in the Cloud: The Changing Nature of Managing Data Delivery

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools

Key Issues for Identity and Access Management, 2008

Best Practices for Confirming Software Inventories in Software Asset Management

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity

Cloud IaaS: Service-Level Agreements

The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption

What to Consider When Designing Next-Generation Data Centers

The Current State of Agile Method Adoption

IT Operational Considerations for Cloud Computing

Key Issues for Data Management and Integration, 2006

Deliver Process-Driven Business Intelligence With a Balanced BI Platform

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing

Business Intelligence Platform Usage and Quality Dynamics, 2008

Eight Critical Forces Shape Enterprise Data Center Strategies

In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users

Private Cloud Computing: An Essential Overview

2010 FEI Technology Study: CPM and BI Show Improvement From 2009

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy

Q&A: How Can ERP Recurring Costs Be Contained?

The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other.

Agenda for Supply Chain Strategy and Enablers, 2012

Toolkit: Reduce Dependence on Desk-Side Support Technicians

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle

Use Heterogeneous Storage Virtualization as a Bridge to the Cloud

Key Issues for Consumer Goods Manufacturers, 2011

Overcoming the Gap Between Business Intelligence and Decision Support

Data Center Consolidation Projects: Benefits and Pitfalls

Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students

Discovering the Value of Unified Communications

The Five Competencies of MRM 'Re-' Defined

An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success

Tactical Guideline: Minimizing Risk in Hosting Relationships

Emerging PC Life Cycle Configuration Management Vendors

Recognize the Importance of Digital Marketing

Understanding Vulnerability Management Life Cycle Functions

Research. Mastering Master Data Management

Use These Guidelines for Making Better CRM Consulting Provider Selections

Gartner's View on 'Bring Your Own' in Client Computing

Containers and Modules: Is This the Future of the Data Center?

Real-Time Decisions Need Corporate Performance Management

Gartner Clarifies the Definition of the Term 'Enterprise Architecture'

For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.

The IT Service Desk Market Is Ready for SaaS

The What, Why and When of Cloud Computing

Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools

Gartner Updates Its Definition of IT Infrastructure Utility

Business Intelligence Focus Shifts From Tactical to Strategic

The Six Triggers for Using Data Center Infrastructure Management Tools

Managing IT Risks During Cost-Cutting Periods

Successful EA Change Management Requires Five Key Elements

Data Center Redesign Yields an 80%-Plus Reduction in Energy Usage

Cloud, SaaS, Hosting and Other Off-Premises Computing Models

Now Is the Time for Security at the Application Level

Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons

How BPM Can Enhance the Eight Building Blocks of CRM

Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.

When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud

Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game

Best Practice: Having a 'Big Picture' View of IP Telephony Will Give the Buyer More Control

The Seven Building Blocks of MDM: A Framework for Success

Governance Is an Essential Building Block for Enterprise Information Management

Gartner Defines Enterprise Information Architecture

Salesforce.com's Chatter: Facebook-Like Feel for CRM Applications

Key Issues for Business Intelligence and Performance Management Initiatives, 2008

How to Choose Providers for Mobile Consumer Application Platforms

XBRL Will Enhance Corporate Disclosure and Corporate Performance Management

2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities

How To Create A Cloud Computing System

Organizations Must Employ Effective Data Security Strategies

EHR Advantages and Disadvantages

Energy savings from well-managed data centers can reduce operating expenses by as much as 20%.

Cloud IaaS: Security Considerations

Data Center Consolidation: Top 10 Best Practices for Project Success

Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending?

Document the IT Service Portfolio Before Creating the IT Service Catalog

Risk Intelligence: Applying KM to Information Risk Management

Predicts 2008: The Market for Servers and Operating Systems Continues to Evolve

The Next Generation of Functionality for Marketing Resource Management

X.509 Certificate Management: Avoiding Downtime and Brand Damage

What Is the Role of Quality Assurance in a SaaS Environment?

How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits

ERP, SCM and CRM: Suites Define the Packaged Application Market

Case Study: Mohawk Fine Papers Uses a CSB to Ease Adoption of Cloud Computing

Establishing a Strategy for Database Security Is No Longer Optional

CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance

NAC Strategies for Supporting BYOD Environments

Transactional HR self-service applications typically get implemented first because they typically automate manual, error-prone processes.

Transcription:

Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must optimize the design of their network infrastructure to meet the increasing demands of data, voice and video applications. To accomplish this task, architects must change the way that they think about the network. No longer is the network being designed as a single homogeneous entity, since there are too many variables to considered at one time. The network must be segmented into smaller, logical pieces where all variables can be considered to achieve the business metrics and choose the best vendor. This research looks at how segmenting the network infrastructure into foundational building blocks provides clarity on the networking requirements and the ability to make better vendor choices at each layer of the network. Key Findings Enterprises segmenting their network infrastructure will understand the detailed business requirements within each functional building block and whether proprietary capabilities that will lock them into a specific vendor are defensible. Proprietary functionality is often used in the early stages of a market to solve a business problem, while employing innovation to create differentiation. The elimination of vendor-specific functionality from the segment boundaries and utilizing standards-based communication allows competitive bidding and typical savings of 10% to 15%. Recommendations Segment the network infrastructure into hierarchical building blocks to provide clarity into functional requirements. Remove proprietary technology from the functional boundary when an industry standard is available. Competitively bid on the functionality of each network infrastructure building block. 2011 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner's prior written permission. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner's research organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner's Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see "Guiding Principles on Independence and Objectivity" on its website, http://www.gartner.com/technology/about/ombudsman/omb_guide2.jsp

ANALYSIS The network is the lifeblood of most enterprises as data, voice and video course through the veins of connectivity. IT organizations must optimize the design of the new mission-critical criteria of the network infrastructure. To accomplish this task, network architects must change the way that they think about the network. No longer should the network be designed as a single homogeneous entity, since there are too many variables to consider at one time. Network architects must segment the network into smaller pieces, so that the specific requirements can be documented. Additionally, each segment of the network needs to be clearly defined to determine the contribution it makes to the larger infrastructure for example, within the access layer for an enterprise that is looking to solve a problem with where there is high transaction density (such as a library in higher education) or significant video-streaming requirements (such as in an enterprise that uses webcams for teleconferences, where the implementation of four to five 802.11n WLAN access points is designed to provide 450 Mbps within each coverage area, using three spatial streams, but would oversubscribe the closet access layer switch that the enterprise is connected to if it only has a 1 Gbps uplink). Segmentation can be used to identify and eliminate vendor-specific issues or dependencies, such as Cisco Discovery Protocol (CPD), which is used to share information about network equipment attached to the infrastructure at different layers of the network, and allow architects to understand and implement standards-based solutions, such as LLDP-MED, or document the trade-offs for why proprietary capabilities are required. This scrutiny of the functional building blocks provides a strategy that architects can use to build not only a better infrastructure that is supported by detailed requirements, but one that also allows enterprises to implement best-of-breed equipment within the segment. By introducing competition at each segment of the network, this strategy can also reduce the cost of implementation. Define the Foundational Building Blocks Although the definition of a network appears obvious, understanding the boundaries within a network of what should and should not be included in design projects is an important first step and is different from one enterprise to another. Collaboration on industry standards has shown that a layered approach allows network architects to break the physical network, while providing the level of functionality needed to address the business issues. As network architects break the network infrastructure into smaller, more-manageable pieces, there are no hard and fast rules, but the most common approach is segmentation around functional building blocks (e.g., LAN access, LAN core, data center, WAN routing and application acceleration). Modularity around standards-based boundary conditions should eliminate interoperability hurdles and hidden implementation costs, but may mean additional upfront design work to ensure that vendors support the required standard. The key objective is that networks are well-defined and defensible, and there are open interfaces between the various building blocks. Organizations can use the building block approach (see Figure 1) for two types of projects. In one case, there is little differentiation among a number of players in a market with a relatively simple ability to substitute one vendor for another (workgroup switching is one example). In this case, enterprises will be looking for operational and cost advantages. In other cases, such as in the data center, there will be significant differentiation among the vendors in a market, and the approach ensures that enterprises do not lose sight of the business requirements when making technology decisions. Publication Date: 15 March 2011/ID Number: G00210952 Page 2 of 5

Figure 1. Possible Network Building Blocks Source: Gartner (March 2011) Figure 1 shows building blocks of LAN, WAN, wireless, security, application acceleration, storage networking, voice and communication applications. In some cases, organizations combine LAN and WAN into a Layer 2 to Layer 3 connectivity building block; others will split the LAN into edge switching and core and aggregation. Defining the logical building blocks maps each area into the operational teams that manage the network. In large organizations, there will be operational specialists for LAN, WAN, security and other areas. These delineations are obvious dividing lines between at least some of the major building blocks. The building block definition may shift over time, or a function that is in one building block may transition to another. Operational teams will need to continue to communicate to ensure that responsibility for functionality is being properly managed. Defining building blocks also protects organizations from the "vendor creep" trap. As vendors acquire small providers in adjacent markets, enterprises often add these new products to the "standardized" solution, rather than going through the required analysis that the building block approach demands. Publication Date: 15 March 2011/ID Number: G00210952 Page 3 of 5

Layered Network Considerations Once the appropriate building blocks have been defined, the most important technical consideration is to ensure that there are no proprietary or other forced linkages between the building blocks. Networking emerged as a set of layered technologies for a reason there are different functions required, and a layered architecture ensures innovation, choice and an ability to meet various business requirements. Within building blocks, it is acceptable to use proprietary technologies, as long as organizations compare vendors against their requirements and there is sufficient ROI against potential lock-in costs. It is important to make the needed functionality a requirement, rather than making a specific proprietary technology a requirement. That keeps alternatives open and allows more choice. Between building blocks, it is important not to use proprietary protocols during the evaluation process, since they provide a competitive advantage to one vendor over another, and, in the end, the loss of competitiveness could mean the loss of purchasing power. If a decision is made to use a proprietary protocol that contradicts this philosophy because the functionality provided meets a critical business need, then it's critical that these protocols be reviewed regularly and are not propagated into new buying criteria over the long term. Proprietary protocols may be used and even needed in the early stages of market development, before standards have caught up to innovation. However, once standards are in place, or the technology has started to move down the commodity curve, it is imperative that network architects migrate from reliance on proprietary technology to standards-based solutions, as long as it does not jeopardize the metrics needed to meet the business needs. Examples of vendor-specific functionality include Brocade's Metro Ring Protocol (MRP); Extreme Network's Ethernet Automatic Protection Switching (EAPS); and Cisco's CDP, Cisco Compatible Extensions (CCX), Hot Standby Router Protocol (HSRP) or Enhanced Interior Gateway Routing Protocol (EIGRP). Using Competition to Save Money When the market was in "flight to safety" mode in the late 1990s and early 2000s, large vendors helped mitigate the risk by spending a lot of time and effort convincing network architects that nearly every component that they put their names on should be part of the "network," even if it was not an area of core competency. As networking technology and the market has matured, this isn't an appropriate approach to ensure the network will best meet business needs technically or financially. The functionality within each of the building blocks contributes to the overall capabilities of the network, which has significant impact on the reliability, security and performance of missioncritical business applications. As a result, while major vendors may have components that meet the criteria within each of the building blocks, it is very difficult for a single vendor to deliver the most cost-effective and industry-leading products in all product areas for all business needs to deliver a homogeneous, all-encompassing solution. It is important to note that the strategy does not preclude that after evaluation of each segment, a single vendor may be chosen based on the criteria established for that part of the network. What it does say is that a vendor that has a great data center switch solution does not automatically get selected for edge layer switching. Gartner has seen enterprises achieve an additional 10% to 15% discount based primarily on the introduction of competition, which typically moves pricing toward market pricing for equivalent functionality, and is not based on a quote from an incumbent or homogeneous solution provider. Segmenting network functionality provides clarity on what is needed within each of the building block, which allows for unneeded functionality to be eliminated, proprietary protocols to be removed and the requirement for a best-of-breed capability to be competitively bid. Publication Date: 15 March 2011/ID Number: G00210952 Page 4 of 5

RECOMMENDED READING Some documents may not be available as part of your current Gartner subscription. "Debunking the Myth of the Single-Vendor Network" REGIONAL HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT 06902-7700 U.S.A. +1 203 964 0096 European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM +44 1784 431611 Asia/Pacific Headquarters Gartner Australasia Pty. Ltd. Level 9, 141 Walker Street North Sydney New South Wales 2060 AUSTRALIA +61 2 9459 4600 Japan Headquarters Gartner Japan Ltd. Aobadai Hills, 6F 7-7, Aobadai, 4-chome Meguro-ku, Tokyo 153-0042 JAPAN +81 3 3481 3670 Latin America Headquarters Gartner do Brazil Av. das Nações Unidas, 12551 9 andar World Trade Center 04578-903 São Paulo SP BRAZIL +55 11 3443 1509 Publication Date: 15 March 2011/ID Number: G00210952 Page 5 of 5