Premium Content

Access "Application - aware networking emerges but has far to go"

Published: 11 Dec 2012

In a business environment dominated by cloud computing, mobility and Web-based applications, enterprises need smarter, application-aware networks to ensure performance. But while application awareness is emerging on individual Layer 4-7 network components, such as firewalls and WAN optimisation appliances, there’s still a way to go in generating application-intelligent policy across these components. What’s more, application intelligence in Layers 2 and 3, where it could be most crucial, is a way off. Why the need for application-aware networks now? Ten or 15 years ago, Layer 4 visibility was application-aware enough. If a router could see the port destination, it could make a decent guess about the nature of the application and apply quality of service (QoS) policy. With the same information, a firewall could decide whether to allow or deny traffic. If it was headed for Port 80, for example, it was pretty clear that it was HTTP traffic. It was a best-effort affair. But today, best effort isn’t good enough. Hundreds of applications are running over HTTP, ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Spies in the VPN
    CWE_150414_ezine_252.png
    E-Zine

    In this week’s Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out ...

  • IT Priorities 2014 Special Report
    prem_IT_priorities_2014_FINAL-1.jpg
    E-Handbook

    Computer Weekly editors draw on their expertise to explain the main technology trends for IT in the UK and across Europe in 2014.

  • Detecting the use of TrueCrypt
    RH 3 Davies-1.jpg
    E-Handbook

    This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of ...