Analyzing SD-WAN Deployment Challenges in the Retail Sector
DOI:
https://doi.org/10.32628/CSEIT241051028Keywords:
SD-WAN Implementation, Retail Network Transformation, IT Deployment Failure Analysis, Network Security Integration, Legacy System CompatibilityAbstract
This article presents a comprehensive case study analysis of a significant SD-WAN deployment failure within a large retail chain, offering critical insights into the challenges and complexities associated with network modernization in the retail sector. Through an in-depth examination of the implementation process, we identify key factors contributing to the failure, including inadequate pre-deployment assessment, poor vendor selection, overlooked security requirements, and difficulties integrating with legacy systems. The article employs a rigorous methodology, combining semi-structured interviews, document analysis, and on-site observations to provide a nuanced understanding of the technical, organizational, and human factors at play. By analyzing the consequences of the failed deployment, including increased operational costs, customer dissatisfaction, and reputational damage, we derive valuable lessons and best practices for future SD-WAN implementations. The article concludes with a discussion of risk mitigation strategies, the importance of tailored solutions, and long-term considerations for SD-WAN success in retail environments. This article contributes to the growing body of knowledge on SD-WAN adoption, offering practical guidance for retailers and IT professionals navigating the complexities of network transformation in an increasingly digital retail landscape.
Downloads
References
Z. Yang, Y. Cui, B. Li, Y. Liu and Y. Xu, "Software-Defined Wide Area Network (SD-WAN): Architecture, Advances and Opportunities," 2019 28th International Conference on Computer Communication and Networks (ICCCN), Valencia, Spain, 2019, pp. 1-9, doi: 10.1109/ICCCN.2019.8847124. [Online]. Available: https://ieeexplore.ieee.org/document/8847124 DOI: https://doi.org/10.1109/ICCCN.2019.8847124
G. Xu, B. Dai, B. Huang, J. Yang, and S. Wen, "Bandwidth-aware energy efficient flow scheduling with SDN in data center networks," Future Generation Computer Systems, vol. 68, pp. 163-174, 2017. [Online]. Available: https://www.sciencedirect.com/science/article/abs/pii/S0167739X16303028 DOI: https://doi.org/10.1016/j.future.2016.08.024
S. Troia, L. M. M. Zorello, A. J. Maralit, and G. Maier, "SD-WAN: An Open-Source Implementation for Enterprise Networking Services," in 2020 22nd International Conference on Transparent Optical Networks (ICTON), Bari, Italy, 2020, pp. 1-4, doi: 10.1109/ICTON51198.2020.9203058. [Online]. Available: https://ieeexplore.ieee.org/document/9203058 DOI: https://doi.org/10.1109/ICTON51198.2020.9203058
R. K. Yin, Case Study Research and Applications: Design and Methods. Thousand Oaks, CA: SAGE Publications, 2017. https://www.google.co.in/books/edition/Case_Study_Research/FzawIAdilHkC?hl=en&gbpv=1&dq=inauthor:%22Robert+K.+Yin%22&printsec=frontcover
Guesmi, T.; Kalghoum, A.; Alshammari, B.M.; Alsaif, H.; Alzamil, A. Leveraging Software-Defined Networking Approach for Future Information-Centric Networking Enhancement. Symmetry 2021, 13, 441. https://doi.org/10.3390/sym13030441 DOI: https://doi.org/10.3390/sym13030441
Ramaiyan, Sugumar & Appusamy, Rajesh & Renganathan, Manivannan. (2018). Audit: Performance Analysis of Software Defined Network in Cloud Computing. Journal of Computational and Theoretical Nanoscience. 15. 2202-2209. 10.1166/jctn.2018.7437.. [Online]. Available: https://doi.org/10.1166/jctn.2018.7437 DOI: https://doi.org/10.1166/jctn.2018.7437
M. Liyanage, I. Ahmad, A. B. Abro, A. Gurtov, and M. Ylianttila, "A Comprehensive Guide to 5G Security," John Wiley & Sons, 2018, pp. 231-243. [Online]. Available: https://onlinelibrary.wiley.com/doi/book/10.1002/9781119293071 DOI: https://doi.org/10.1002/9781119293071
Demetris Booth,2023, "5 Best Practices for Implementing Secure and Effective SD-WAN“ [Online]. Available: https://www.catonetworks.com/blog/sd-wan-best-practices-for-secure-and-effective-implementation/
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Scientific Research in Computer Science, Engineering and Information Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.