Juniper Networks introduced its SDN strategy during its 2013 Global Partner Conference. Executive Vice President of the Software Solutions Division, Bob Muglia, introduced the company's vision, strategy and licensing model for the SDN transition.
We are excited to announce the release of MetaFabric, a new end-to-end architecture that encompasses Juniper Network’s switching, routing, software and security portfolios. It provides the freedom and flexibility to use any technology, any protocol, any orchestration platform, any SDN controller, for any data center application with the assurance of interoperability and minimal disruption.
Why Juniper, Driven by Mist AI, Leads the MarketJuniper Networks
While the rest of the industry has started to copy our AIOps Client to Cloud message recently, we understand that others are nowhere close to delivering on the promise of the AI-Driven Enterprise, both in terms of depth of features and breadth of portfolio. Take a look at this SlideShare to truly understand why Juniper, driven by Mist AI, leads the market.
Experiences are everything and Juniper knows this. From when a user engages with an app on their smartphone to when a workload is generated in the cloud to pick up the request, we know that every point of contact along the way impacts the user’s experience, from client to cloud. Learn more about what Juniper has recently announced in this SlideShare!
Real AI. Real Results. Mist AI Customer Testimonials.Juniper Networks
See what Juniper customers have to say about how Mist AI has statistically improved the way they run their business. For more information on how Mist AI can improve your network, join us for Transformation Thursdays at: https://www.juniper.net/us/en/forms/ai-driven-demo/
It's time to scale way back on those support tickets from your branch users. Security shouldn’t come at the cost of performance. Register now to attend a live demo. You may be eligible to receive a free SRX!
https://www.juniper.net/sdwan-thursdays
As much the workforce continues to work remotely, The COVID-19 Pandemic has taught us that the WAN is more important than ever, and troubleshooting it couldn’t be more difficult. Learn how MARVIS & Mist AI simplify the burdensome process of troubleshooting the WAN.
We are excited to announce the release of MetaFabric, a new end-to-end architecture that encompasses Juniper Network’s switching, routing, software and security portfolios. It provides the freedom and flexibility to use any technology, any protocol, any orchestration platform, any SDN controller, for any data center application with the assurance of interoperability and minimal disruption.
Why Juniper, Driven by Mist AI, Leads the MarketJuniper Networks
While the rest of the industry has started to copy our AIOps Client to Cloud message recently, we understand that others are nowhere close to delivering on the promise of the AI-Driven Enterprise, both in terms of depth of features and breadth of portfolio. Take a look at this SlideShare to truly understand why Juniper, driven by Mist AI, leads the market.
Experiences are everything and Juniper knows this. From when a user engages with an app on their smartphone to when a workload is generated in the cloud to pick up the request, we know that every point of contact along the way impacts the user’s experience, from client to cloud. Learn more about what Juniper has recently announced in this SlideShare!
Real AI. Real Results. Mist AI Customer Testimonials.Juniper Networks
See what Juniper customers have to say about how Mist AI has statistically improved the way they run their business. For more information on how Mist AI can improve your network, join us for Transformation Thursdays at: https://www.juniper.net/us/en/forms/ai-driven-demo/
It's time to scale way back on those support tickets from your branch users. Security shouldn’t come at the cost of performance. Register now to attend a live demo. You may be eligible to receive a free SRX!
https://www.juniper.net/sdwan-thursdays
As much the workforce continues to work remotely, The COVID-19 Pandemic has taught us that the WAN is more important than ever, and troubleshooting it couldn’t be more difficult. Learn how MARVIS & Mist AI simplify the burdensome process of troubleshooting the WAN.
Juniper Networks is introducing the fourth expansion of the AI-driven enterprise to bring artificial intelligence to the LAN, WLAN and now WAN for end-to-end optimization of user experiences and proactive troubleshooting driven by Mist AI.
With the new Juniper Mist WAN Assurance service, customers will receive even better automation and insight in branch locations with AI-driven service level expectations, client-to-cloud event correlation for rapid fault resolution, anomaly detection, and proactive support.
Meeting the business and technical challenges of today's organizations requires an architectural approach. The Cisco Borderless Network Architecture is the technical architecture that allows organizations to connect anyone, anywhere, anytime, and on any device - securely, reliably, and seamlessly. It is built on an infrastructure of scalable and resilient hardware and software. Components of the architecture come together to build network systems that span your organization from network access to the cloud. Intelligent network, endpoint, and user services provide the flexibility, speed, and scale to support new devices, applications, and deployment models.
The impact of the consumerization of IT and mobility cannot be understated. The impact that these two key business elements have on the evolution of Enterprise Architecture and for Service Provider's ability to offer services to Enterprises, Governments, and Consumers will be addressed in this webinar. We will talk about the importance of the shift and movement of the secure network edge leads to a very close examination of the changing threat vectors and vulnerabilities impacting your businesses today. We will also detail service delivery and consumption on the three 'service horizons,' (Mobile Endpoint and CPE, Virtualized Network Edge/Data Center Edge, and the Cloud).
A generalized description and overview of SD-WAN technology without delving into vendor-specific implementations. Covers the motivation, history, software architecture of SD-WAN systems, day-in-the-life packet path, and various useful features.
This paper explains the capabilities, considerations and questions individuals should ask their network vendors when evaluating hardware for their SDN journey.
Here's a look at some of the highlights of the Cato Management Application, a self-service console that provides a single view into the entire global network built across the Cato Cloud. Cato Cloud is a converged, cloud-based networking and security SD-WAN platform connecting all corporate locations, cloud assets, and mobile users.
Security and Virtualization in the Data CenterCisco Canada
This presentation will discuss, effectively integrating security, core Data Center fabric technologies and features, secutiry as part of the core design, designs to enforce micro segmentation in the data center, enforce separation of duties in virtualized and cloud environments and security to enforce continuous compliance.
Juniper Networks is introducing the fourth expansion of the AI-driven enterprise to bring artificial intelligence to the LAN, WLAN and now WAN for end-to-end optimization of user experiences and proactive troubleshooting driven by Mist AI.
With the new Juniper Mist WAN Assurance service, customers will receive even better automation and insight in branch locations with AI-driven service level expectations, client-to-cloud event correlation for rapid fault resolution, anomaly detection, and proactive support.
Meeting the business and technical challenges of today's organizations requires an architectural approach. The Cisco Borderless Network Architecture is the technical architecture that allows organizations to connect anyone, anywhere, anytime, and on any device - securely, reliably, and seamlessly. It is built on an infrastructure of scalable and resilient hardware and software. Components of the architecture come together to build network systems that span your organization from network access to the cloud. Intelligent network, endpoint, and user services provide the flexibility, speed, and scale to support new devices, applications, and deployment models.
The impact of the consumerization of IT and mobility cannot be understated. The impact that these two key business elements have on the evolution of Enterprise Architecture and for Service Provider's ability to offer services to Enterprises, Governments, and Consumers will be addressed in this webinar. We will talk about the importance of the shift and movement of the secure network edge leads to a very close examination of the changing threat vectors and vulnerabilities impacting your businesses today. We will also detail service delivery and consumption on the three 'service horizons,' (Mobile Endpoint and CPE, Virtualized Network Edge/Data Center Edge, and the Cloud).
A generalized description and overview of SD-WAN technology without delving into vendor-specific implementations. Covers the motivation, history, software architecture of SD-WAN systems, day-in-the-life packet path, and various useful features.
This paper explains the capabilities, considerations and questions individuals should ask their network vendors when evaluating hardware for their SDN journey.
Here's a look at some of the highlights of the Cato Management Application, a self-service console that provides a single view into the entire global network built across the Cato Cloud. Cato Cloud is a converged, cloud-based networking and security SD-WAN platform connecting all corporate locations, cloud assets, and mobile users.
Security and Virtualization in the Data CenterCisco Canada
This presentation will discuss, effectively integrating security, core Data Center fabric technologies and features, secutiry as part of the core design, designs to enforce micro segmentation in the data center, enforce separation of duties in virtualized and cloud environments and security to enforce continuous compliance.
Nagios Conference 2012 - Andreas Ericsson - MerlinNagios
Andreas Ericsson's presentation on using Nagios with Merlin.
The presentation was given during the Nagios World Conference North America held Sept 25-28th, 2012 in Saint Paul, MN. For more information on the conference (including photos and videos), visit: http://go.nagios.com/nwcna
Not all SOA Gateways are created equal. Each one behaves differently, which can affect your total cost of ownership, and more importantly, the success of your project.
Alcatel-Lucent Cloud: Network Functions Virtualization - The New Virtual Real...Alcatel-Lucent Cloud
Companies are facing cloud challenges; capacity expansion, commoditization, network and data center merging, network becoming a programmable platform, transformation at web speed. The answer is parallel scaling and the creation of the NFV Industry Group. NFV will greatly enhance the ability of "network applications" to elastically scale to meet changing demand patterns. Alcatel-Lucent is leading the way in this new reality.
A Practical Approach to Delivering Cloud Platforms Using Novell Solutions: Ho...Novell
n this session, you will see how Affiliated Computer Services (ACS) provides a client-directed cloud solution focused on what customers want to do today. ACS has created a private cloud-based service that offers many of the benefits of a public cloud computing environment. The difference is that in a private cloud-based service, data and processes are managed within an ACS trusted environment without the security exposures and legal requirements that come with using public cloud services across open, public networks. Additionally, private cloud services can offer the enterprise greater control, thus improving security and resiliency as user access and the networks are restricted and designated.
Novell and ACS teamed together to build the ACS Management Platform, which enables you to fully manage the cloud service offerings, from the core management services to distributed multiple clouds running in multiple data centers. Learn how the ACS Management Platform provides streamlined service provisioning of application tiers and performance levels in a multi-tenant, virtualized, cross-cloud computing platforms. Additionally, it provides ITIL 3.0, Pharma and SOX compliance to ensure you have high levels of services at a much lower price than traditional service providers.
Learn how Novell and ACS are working together to help customers with the creation of various business models, which include the integration of services from different providers (public and private) to support and drive business innovation and optimization. This session will demonstrate a multi-phase delivery engagement model to define, integrate, and implement the technologies and processes necessary to deliver cloud-based services.
Are you able to deliver reliable experiences for connected devicesJuniper Networks
Here are 5 things you can do with Mist Wired Assurance. With Wired Assurance, you can leverage Juniper EX switch telemetry to enable simpler operations, shorter mean time to repair, and better visibility into end-user experiences for your connected devices, including access points, servers, and IoT endpoints.
Securing IoT at Scale Requires a Holistic ApproachJuniper Networks
Enterprises are moving from small IoT pilots to large-scale
implementations. What are the biggest security
concerns, and how can you overcome them?
Juniper partnered with the IoT Institute to find out. We surveyed 176 technology decision makers and
influencers who have been personally involved in their IoT security strategy and implementations. Here's what the survey found:
We recently conducted a 16-country survey to gauge the appetite for Digital Cohesion. The results suggest business and consumer users see Digital Cohesion as an inevitable, positive societal development.
SDN and NFV: Transforming the Service Provider OrganizationJuniper Networks
As competition increases, service providers must be able to respond quickly to competitive pressures and rapidly evolving customer demands. Learn how NFV and SDN allows service providers to embrace a holistic approach to their business transformation and maximize existing capabilities: http://juni.pr/1JQZYOl
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveJuniper Networks
Service providers are facing more and more pressure as customers demand immediacy. Learn how adopting a carrier-grade, open network platform closes the innovation gap to create value for your network. http://juni.pr/1JQZYOl
Network service providers—those with access networks like DSL, cable, or mobile—continue
to face a dual threat: rising operating expenses associated with explosive bandwidth growth
and declining revenues driven by commoditization. A true Telco cloud, featuring automation
and dynamic scalability, becomes a comprehensive delivery platform enabling network service
providers to offer differentiated services that solve their customer’s business demands.
With mobile subscriptions expected to reach 8.5 billion users by the end of 2016, mobile attack surfaces are growing at an alarming rate. Juniper’s SRX5800 is primed for this increase - with speeds up to 2 Tbps the SRX5800 enables customers to inspect more traffic faster. Mobile has met its match. http://juni.pr/1MKBQDu
High performance data center computing using manageable distributed computingJuniper Networks
Terrapin Trading Show Chicago, Thursday, June 4
Andy Bach, FSI Architect, Juniper Networks
Distributed computing concepts (QFX5100-AA)
Scale and performance enhancements (QFX10000 Series)
Automation capabilities (tie in QFX-PFA)
Larry Van Deusen, Director of the Network Integration Business Unit, Dimension Data
Automation
Value Added Partner Services
What Are Virtual Chassis and Virtual Chassis Fabric?Juniper Networks
This Day One book poster explains the differences between Virtual Chassis and Virtual Chassis Fabric.
For additional technical resources, please visit: www.juniper.net/documentation/
As clouds become increasingly important to businesses and individuals, really there is no predicting how fast or how much your data center or cloud network will need to scale. Enter the QFX10000 line of switches.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
2. 7 MYTHS OF SDN
Myth: Myth: Myth: Myth: Myth: Myth: Myth:
It’s only about It’s only about It’s only It’s only about It’s only It’s going It’s going to
datacenter reducing about centralization about to happen take forever
networking CAPEX software OpenFlow immediately
Truth: Truth: Truth: Truth: Truth: Truth: Truth:
It applies to Opex It will fuel Considerable OpenFlow is It will happen We will begin
all networking reduction hardware intelligence just a protocol step-by-step to see the
and is more innovation stays and probably impact in
networking significant decentralized not the most 2013
services important one
for SDN
3. NETWORKING
BUSINESS CHALLENGES
Configuration Features Software Packaging Reliability
Overly complex, Slow to respond Too hard to Inflexible, Below
manual, to business deploy difficult to scale expectations
operationally requests
expensive.
4. WHY DO WE NEED SDN?
Static Networks Manual Policies Monolithic Network Essential
Services Applications
Must respond Must be automated to Must dynamically scale Must be developed
dynamically based on reduce personnel cost independent of within the network to
Business Policy network devices deliver business
results
5. SDN PRINCIPLES
Separate Centralize Use the cloud Common Standard Broadly apply
networking Mgmt, Services for elastic scale Platform for protocols for to Network &
software into and Control and flexible network and interoperability Network
4 layers – layers deployment Security across vendors Security
Forwarding, enabling usage- applications Enterprise &
Control, based pricing and Service
Services and management Providers
Mgmt integration Mobile and
Wireline
Optimize each Simplifies Reduce time Enables new Provides Flexibility
network network to service and business choice and new
element design and correlate cost solutions and lowers business
lowers OPEX based on cost opportunities
value
7. SECURITY &
NETWORKING DEVICES
2012
SOFTWARE HARDWARE
Management Services
CONTROL PROCESSOR
FORWARDING BLADES
SERVER BLADES
OR
CLI
OSS/BSS
8. CENTRALIZATION
CENTRALIZED FUNCTIONS DISTRIBUTED DEVICES
Network Network Network
Centralized Management Element 1 Element 2 Element… n
Configuration Configuration Configuration
copy copy copy
Centralized Services
Local Control Local Control Local Control
layer layer layer
Forwarding Forwarding Forwarding
Centralized Controller Layer Layer Layer
9. STEP 1
Centralize Management
Published Protocols
Open standard where possible
SOFTWARE HARDWARE
Option A
FORWARDING
Custom Applications
PROCESSOR
Orchestration
Orchestration
X86 SERVER
Data Center
CONTROL
OSS/BSS
BLADES
BLADES
Management VMs
Analytics VMs
Option B
FORWARDING
PROCESSOR
CONTROL
BLADES
X86
SERVER
RACK
10. STEP 2
Extract Services
SOFTWARE HARDWARE
Option A
FORWARDING
Custom Applications
PROCESSOR
Orchestration
X86 SERVER
Data Center
CONTROL
BLADES
BLADES
Mgmt & Analytics VMs
TETHERED
Services VMs
SERVICES
Option B
FORWARDING
PROCESSOR
CONTROL
BLADES
X86
SERVER
RACK
11. JUNIPER
In 2013
JUNOS SOFTWARE MX HARDWARE
Option A
FORWARDING
X86 ROUTING
Custom Applications
Orchestration
SERVICES
X86 APPS
BLADES
ENGINE
CARDS
JunosV
Junos Space
TETHERED
SGSN/MME, Media Cache
SERVICES
JUNOSV APP ENGINE Option B
FORWARDING
X86 ROUTING
BLADES
ENGINE
X86
SERVER
RACK
12. STEP 3
Centralize the Controller
SOFTWARE HARDWARE
Custom Applications
Orchestration
Data Center
Mgmt & Analytics VMs
FORWARDING
PROCESSOR
SERVICE Services VMs
CONTROL
BLADES
CHAINING Central Controller VMs
X86 CLOUD
13. EXAMPLE SDN SERVICE CHAIN
Datacenter Cloud Application Internet to Web Server
Runs as a VM
Application
Internet Stateful Hypervisor Web
Delivery
Router Firewall vSwitch Server
Controller
14. EXAMPLE SDN SERVICE CHAIN
Data Center Cloud Web Server VM to Mid-tier VM
Runs as a VM
Application
Hypervisor Hypervisor Mid-Tier
Web Server Delivery
vSwitch vSwitch Application
Controller
Physical Network
15. EXAMPLE SDN SERVICE CHAIN
Mobile Service Provider Edge
Runs as a VM
Carrier
Policy &
Evolved Deep Grade
Edge Stateful Charging Edge
Packet Packet Network
Router Firewall Enforcement Router
Core Inspection Address
Function
Translation
16. JUNIPER
In 2014/2015
JUNOS SOFTWARE MX & SRX HARDWARE
Custom Applications
OpenStack
VMware or
Junos Space
FORWARDING
X86 ROUTING
SERVICE Juniper Linux Service VMs
BLADES
ENGINE
CHAINING Contrail Controller VMs
JUNOSV APP ENGINE
X86 CLOUD
17. STEP 4
Optimize the Hardware
SOFTWARE HARDWARE
Option A Option C
Custom Applications
Orchestration
Data Center
FORWARDING
FORWARDING
PROCESSOR
PROCESSOR
X86 SERVER
Mgmt & Analytics VMs
CONTROL
CONTROL
BLADES
BLADES
BLADES
SERVICE Services VMs
X86 CLOUD
CHAINING Central Controller VMs
Option B Option D
CONFIGURATION COPY
FORWARDING
PROCESSOR
CONTROL
BLADES
LOCAL CONTROL
OPTIMIZED FORWARDING X86 X86 CLOUD
SERVER
RACK
18. FLEXIBLE LICENSING FOR SDN
NETWORK APPLIANCE LICENSING LICENSING FOR SDN
Application Deep Carrier
Security Policy &
Evolved Deep Grade
Delivery Packet Stateful Charging
Firewall Router Packet
Firewall
Packet
Enforcement
Network
Controller Inspection Core Inspection Address
Appliance Function
Appliance Appliance Translation
LICENSING FOR APPLIANCES JUNIPER SOFTWARE ADVANTAGE
Appliance Software
Restricted/ Non
Centric Full Use/Elastic Transferable Lifetime
Embedded Transferable
Software Assurance