Virtual Reality Check


Published on

If it is not virtual it is not cool appears to be the latest trend and that is before you even think about how lame it is not to have a smart phone or tablet. In this session we will examine the end to end network issues involved in keeping up with technology. Extended Overview: At a conference last week I was struck by the total lack of laptop PCs. Last year it was a sea of flipped up screens but this year it was all tablets and smart phones. As I networked with colleagues each one showed me their latest favourite app while the IT guys showed off the new VDI implementation. I met a networking guy quietly sobbing in the corner he relayed his worries over security, over network access and datacentre capacity. He and I discussed the issues and some ideas on how to resolve them. In the session "Virtual Reality Check" I will share some of the thoughts from that meeting.

Published in: Technology
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Virtual Reality Check

  1. 1. VIRTUAL REALITY CHECKTrevor DearingHead of Enterprise Marketing
  2. 2. THE GAME CHANGERS2 Copyright © 2010 Juniper Networks, Inc.
  3. 3. A TYPICAL EXECUTIVE STAFF SIDE-CONVERSATION “ How do I get this on the network? ”3 Copyright © 2010 Juniper Networks, Inc.
  4. 4. THE NEW DECISION ROUTE Leader Broker Operator Internet Information Services ERP4 Copyright © 2010 Juniper Networks, Inc.
  5. 5. THERE IS A FUNDAMENTAL SHIFT IN ACCESSTECHNOLOGY OCCURRING Requires RETHINK of network strategy  More wireless than wired ports  Security by user and application instead of by device or by physical port  Simplify the network5 Copyright © 2010 Juniper Networks, Inc.
  6. 6. THE ESSENCE OF NETWORKING: READING AND RUNNING Reading Running  What is the destination address?  Transport data as fast as possible  What are the security parameters?  What is the optimal path to get there? Reading = Processing Running = Transport Slow Fast Read Run6 Copyright © 2010 Juniper Networks, Inc.
  7. 7. 1 PROVIDE DEVICE-AGNOSTIC SECURE CONNECTION  Users will choose and change their mobile devices  Control the connection, not the device  Allow users to self-provision  Security works the same on premises and off7 Copyright © 2010 Juniper Networks, Inc.
  8. 8. BUILD ONE GENERAL PURPOSE,2 APPLICATION AGNOSTIC NETWORK  802.11N  1 GbE wireline access – POE + equipped  10 GbE uplinks  Reduce tiers and number of managed devices  Provide for integrated security8 Copyright © 2010 Juniper Networks, Inc.
  9. 9. 3 WIRED-LESS – MORE WIRELESS THAN WIRED  Wireless becomes the primary business premises access method  Requires:  Nonstop availability  Scalability  Seamless roaming9 Copyright © 2010 Juniper Networks, Inc.
  10. 10. A COMPREHENSIVE SECURITY MODEL Encompassing the Broader Security Ecosystem Device Network Application Secure Mobility Data Center Security Evolving Threats Spanning Spanning SpanningOS & Device Categories Physical & Virtual Inbound & Outbound10 Copyright © 2010 Juniper Networks, Inc.
  11. 11. SECURITY – THE NEW MODEL Hotel Model Castle Model11 Copyright © 2010 Juniper Networks, Inc.
  12. 12. THREE TECHNOLOGY SHIFTS IN THE DATA CENTERVirtualization / Consolidation • For organisations with over 50 servers an ROI of 8 months can be expectedMulti-core CPUs • Moore’s law still in actionConvergence • Initial cost savings can create new opportunities12 Copyright © © 2010 Juniper Networks,Inc. Copyright 2011 Juniper Networks, Inc.
  13. 13. VIRTUALIZATION Virtualization can deliver benefits beyond cost savings with the RIGHT converged infrastructure 1. Consolidation 2. Agility 3. Resiliency• Low density virtualization • High density virtualization• Static • Dynamic• Single security zone • Multiple security zones• Non critical apps • Critical apps13 Copyright © 2010 Juniper Networks, Inc.
  14. 14. SERVER AND VM DEVELOPMENTS The latest CPU and memory technology is driving the increased density of VMs per server which in turn delivers the highest ROI on consolidation projects Number of cores per DRAM per socket core VMs per socket 80 >1000I/O VM densityrequired 40 restricted by I/OGbps 32 128GB capacity 20 16 42GB VMs per socket 8 64 10 8GB 1 4 2 4GB 8 64 8 14 Copyright © 2010 Juniper Networks, Inc.
  15. 15. CONVERGENCE Phase 1 - Simplification Phase 2 - Integration15 Copyright © 2010 Juniper Networks, Inc.
  16. 16. CONVERGENCE A STEP TO FULL VIRTUALIZATIONA wire once infrastructure • Only 2 cables easy upgrade to higher speed networks • An evergreen environment where servers can maintain identical I/O capabilities • I/O mobility makes servers changeable in seconds16 Copyright © 2010 Juniper Networks, Inc.
  17. 17. THE DATA CENTER HAS ADVANCED DRAMATICALLYIN RECENT YEARS WHILE THE NETWORK HAS NOT From To On-Premise Applications Applications Apps Software Services Flexible, virtualized model Rigid, legacy model of I.T. Servers/ Dedicated Servers/ Servers Compute Virtualized Workloads Compute Dedicated Storage Storage Storage Shared Storage Layers of Network Complexity17 Copyright © 2010 Juniper Networks, Inc.
  18. 18. SIMPLIFYING THE NETWORK Fabric Multiple switches acting as a single, logical device simplifies management Simplicity at scale builds bigger resource pools Switching, Storage and IP Routing on every port builds flexibility18 Copyright © 2010 Juniper Networks, Inc.
  19. 19. DATA CENTER SECURITY REQUIREMENTS Security at scale for consolidation Integrated solution for secure virtualization Maintain Control of VM Deployment 19 Copyright © © 2010 Juniper Networks,Inc. Copyright 2011 Juniper Networks, Inc.
  20. 20. VIRTUALIZATION-SPECIFIC REQUIREMENTSSecure VMotion/Live-Migration  VMs may migrate to a unsecured or lower trust-level zone  Security should enable both migration and enforcementHypervisor Protection  New operating system means new attack surface  Hypervisor connection attempts should be monitoredRegulatory Compliance  Isolating VMs, Access Control, Audit, etc.  Segregating administrative duties inside the virtual network  Tracking VM security profiles20 Copyright © 2010 Juniper Networks, Inc.
  21. 21. INTEGRATED SECURITY PROFILE Integrated Solution Faster Policy Deployment Maintain Control21 Copyright © 2010 Juniper Networks, Inc.
  22. 22. JUNIPER’S SOLUTIONS Scalable Faster Reliable Secure Simple Reduce Magnitude Carrier Integrated Reduce layers and improvement class, no and managed flatten data in single point virtualized devices and center performance of failure, security single Junos networks and latency reduce services downtime22 Copyright © 2010 Juniper Networks, Inc.
  23. 23. QUESTIONSThank you for listening
  24. 24. YOUR YEAR-ROUND IT RESOURCE – access to everything you’ll need to know
  25. 25. THE WHOLETECHNOLOGY STACKfrom start to finish
  26. 26. COMMENT & ANALYSISInsights, interviews and the latest thinking on technology solutions
  27. 27. VIDEOYour source of live information – all the presentations from our live events
  28. 28. TECHNOLOGY LIBRARY Over 3,000 whitepapers,case studies, product overviews and press releases from all the leading IT vendors
  29. 29. EVENTS, WEBINARS & PRESENTATIONS Missed the event? Download the presentations thatinterest you. Catch up with convenient webinars. Plan your next visit.
  30. 30. DirectoryA comprehensive A-Z listing providing in-depth company overviews
  31. 31. ALL FREE TO ACCESS 24/7
  32. 32.