The term "invisible network" in cloud computing can have a couple of different meanings, depending on the context. Here are two common interpretations: **1. Abstraction and automation:** - In this sense, the invisible network refers to the way cloud providers manage the underlying infrastructure and network complexities behind the scenes. Users don't need to worry about provisioning, configuring, and maintaining physical servers, switches, routers, and cables. They simply consume the network as a service, accessing resources and connecting to applications seamlessly. This abstraction allows for faster deployments, increased agility, and simplified operations. - Technologies like software-defined networking ([[SDN]]) and overlay networks play a crucial role in achieving this invisibility. They virtualize the network, decoupling it from the underlying hardware and enabling dynamic provisioning and configuration based on application needs and traffic patterns. **2. Security and Zero Trust:** - Here, the invisible network refers to the concept of securing communication channels without sacrificing user experience. This is particularly relevant in cloud environments with distributed microservices and dynamic workloads. - Techniques like service meshes and [[Zero-trust network access]] ([[ZTNA]]) come into play. Service meshes like [[Envoy]] or [[Istio]] create a dedicated network layer for microservices, enforcing security policies and encrypting communication between them. ZTNA eliminates the concept of a traditional network perimeter, granting access based on identity and context rather than IP addresses, making the network invisible to unauthorized users. **Overall, the idea of an invisible network in cloud computing is about:** - **Shifting focus from infrastructure management to service consumption:** Users don't get bogged down in managing the network; they simply leverage it as a readily available resource. - **Enhancing agility and scalability:** The network adapts to changing demands automatically, supporting rapid deployments and dynamic workloads. - **Improving security:** Threats are minimized by obscuring the network from unauthorized access and implementing granular control mechanisms. By embracing the invisible network, cloud users can focus on their core business objectives while the cloud provider takes care of the intricate infrastructure behind the scenes. # References ```dataview Table title as Title, authors as Authors where contains(subject, "invisible network") ```