Sasha Ratkovic

Author Archives: Sasha Ratkovic

IDG Contributor Network: A taxonomy of Intent-Based Networking (IBN)

You have probably heard all sorts of claims by various vendors and solutions that they are providing or supporting Intent-Based Networking (IBN), yet there is a wide range of capabilities that are all very confusing.One way to make sense of this is to apply a "maturity model" like the one used to classify the maturity level of RESTful web services implementations. The Richardson Maturity Model divides capabilities of RESTful web services into levels, starting from 0 and going up as the maturity of the implementation increases. Just like IBN, REST had received its fair share of hype. While the REST principles were clearly defined in Roy Fielding’s dissertation, in practice the REST label was attached to implementations with wildly varying levels of conformance to the original principles, starting from anything that had the words “HTTP” and “JSON” in it to full blown “hypermedia as the engine of application state.”To read this article in full, please click here

IDG Contributor Network: A taxonomy of Intent-Based Networking (IBN)

You have probably heard all sorts of claims by various vendors and solutions that they are providing or supporting Intent-Based Networking (IBN), yet there is a wide range of capabilities that are all very confusing.One way to make sense of this is to apply a "maturity model" like the one used to classify the maturity level of RESTful web services implementations. The Richardson Maturity Model divides capabilities of RESTful web services into levels, starting from 0 and going up as the maturity of the implementation increases. Just like IBN, REST had received its fair share of hype. While the REST principles were clearly defined in Roy Fielding’s dissertation, in practice the REST label was attached to implementations with wildly varying levels of conformance to the original principles, starting from anything that had the words “HTTP” and “JSON” in it to full blown “hypermedia as the engine of application state.”To read this article in full, please click here

IDG Contributor Network: Intent-based networking can turn your data center into a digital crime scene

An important side effect of digital transformation is that your network is likely to become a digital crime scene. As such, it needs a systematic approach to identify the culprit. In this analogy, a crime can be equivalent to a network outage or gray failure. And this is where intent-based networking (IBN) can help.The general approach in solving a crime like this is to collect as much information as possible, as soon as possible, and to narrow down the pool of suspects. So, let’s see via an example what role IBN plays in all this.Digital crime scene profiling Without “intent” you don’t even know that a crime has been committed. Finding traces of blood in a room in a blood bank or hospital are expected. Finding traces of blood in a room of a home of a missing person is a different matter. But without intent it’s hard to distinguish a blood bank from a home. In a similar manner, dropping a packet of an intruder or forbidden traffic source is a good thing. Dropping a packet of a customer because of a misconfigured ACL is a bad thing. Intent helps you differentiate the two.To Continue reading

IDG Contributor Network: Intent-based networking can turn your data center into a digital crime scene

An important side effect of digital transformation is that your network is likely to become a digital crime scene. As such, it needs a systematic approach to identify the culprit. In this analogy, a crime can be equivalent to a network outage or gray failure. And this is where intent-based networking (IBN) can help.The general approach in solving a crime like this is to collect as much information as possible, as soon as possible, and to narrow down the pool of suspects. So, let’s see via an example what role IBN plays in all this.Digital crime scene profiling Without “intent” you don’t even know that a crime has been committed. Finding traces of blood in a room in a blood bank or hospital are expected. Finding traces of blood in a room of a home of a missing person is a different matter. But without intent it’s hard to distinguish a blood bank from a home. In a similar manner, dropping a packet of an intruder or forbidden traffic source is a good thing. Dropping a packet of a customer because of a misconfigured ACL is a bad thing. Intent helps you differentiate the two.To Continue reading

IDG Contributor Network: Amadeus and intent-based analytics

In one of my favorite movies of all time, Amadeus, there is a scene in which a conversation takes place between Mozart and the Holy Roman Emperor, Joseph II, just after the first performance of the opera The Marriage of Figaro. During exchange, the Emperor “explained” to Mozart, in a condescending way, that while the opera was excellent, it had “too many notes.” He went on to suggest “Just cut a few and it will be perfect.” Nonplussed, Mozart calmly replied “Which few did you have in mind your majesty?” A pregnant pause ensues, and the Emperor is only saved by a distraction which allows the change of subject. This “change request” – while it appeared on the surface trivial to the Emperor – turned out to be quite a challenge, as it required the complete knowledge of the score (state/intent) and required composition skills (design/action). So, what does this have to do with networking?To read this article in full, please click here

IDG Contributor Network: Amadeus and intent-based analytics

In one of my favorite movies of all time, Amadeus, there is a scene in which a conversation takes place between Mozart and the Holy Roman Emperor, Joseph II, just after the first performance of the opera The Marriage of Figaro. During exchange, the Emperor “explained” to Mozart, in a condescending way, that while the opera was excellent, it had “too many notes.” He went on to suggest “Just cut a few and it will be perfect.” Nonplussed, Mozart calmly replied “Which few did you have in mind your majesty?” A pregnant pause ensues, and the Emperor is only saved by a distraction which allows the change of subject. This “change request” – while it appeared on the surface trivial to the Emperor – turned out to be quite a challenge, as it required the complete knowledge of the score (state/intent) and required composition skills (design/action). So, what does this have to do with networking?To read this article in full, please click here