SlideShare a Scribd company logo
1 of 23
Download to read offline
TOP TEN IMPERATIVES FOR SERVICE
    PROVIDERS
    Manoj Leelanivas
    Executive Vice President, Juniper Networks




1                    Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
OUTLINE


    1   Market Trends Forcing Mobility Rethink

    2   Ten Architectural Imperatives

    3   Key Takeaways

    4   Customer Testimonials
        Q&A




2                Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
CONVERGENCE OF MOBILITY, VIDEO AND CLOUD
CREATING MARKET DISRUPTION




                          Mobility                                                                Cloud Computing


                                                                             Smartphone
    181%               Tablet
                       Growth                    76%                         Annual Growth            62%             Cloud Server
                                                                                                                      Revenue Increase

    Gartner predicted that tablet sales          According to Synergy 110M Smart                      According to IDC’s cloud computing
    will grow 181% in 2011 to 54.8M,             phones shipped in Q2-2011.                           survey, server revenue in the private
    many of which are built to take                                                                   cloud category will grow from $7.3
    advantage of mobile 3G and                                                                        billion in 2009 to $11.8 billion in 2014,
    4G networks.                                                                                      or about 62 percent.


3                                         Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
GIGABYTE LIFESTYLE: REAL-TIME & INTERACTIVE …

       > 50% penetration of SmartPhones, Mobile compute devices


       >50% of all mobile traffic is video


       >50% of cell sites support 200+Mpbs


       >50% revenue comes from non-traditional services


       >50% subscribers use location based services and 3+ devices


       >50% of the services are delivered via the cloud…

4                   Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
BOUNDARYLESS ENTERPRISE
SECURE MOBILITY DETERMINES COMPETITIVE ADVANTAGE
                       Employees                       Devices                  Security   Data
      Empowered
         Mobile
       Employee




                                                                    Cloud
       Ubiquitous
        Content                             Internet Information
                                            Services

    Through Secure
         Cloud
                                               ERP

      Connecting                                            Machine-2-machine
      Everything,
        Not just
    Everyone, to the
       Corporate
        Network
5                             Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
MASSIVE DATA GROWTH STRETCHING NETWORKS
AND STRAINING BUDGETS
                                                                                                    It is more dynamic and unpredictable
     1                          Traffic is growing                                       2                        than ever
PB/Month
180,000
                                                                                       Mobility
                                                   +27%
100,000
                                 17x               2008-2020

                                 Growth
                                                     CAGR
                                                                                       IP Apps
                                2008-2020


    20,000
                                                                                       Cloud
1999         2002      2005       2008      2011      2014     2017       2021
Source: Juniper, Cisco, MINTS

                 The combination challenges service                                                Because today’s fragmented network
     3                  provider economics                                               4             architecture doesn‘t scale
                                                                                                      App Servers

                                                                                                     Web App Servers
                                                                                                         Svcs                         Application
                                                                                                         Web Svcs                     Manager(s)

                                                                                                                    IP Network

                                                                                                                Mobile Network
                                                                                                   2G                            4G   Gateway
                                                                                                                       3G


6                                                    Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
TOP TEN ARCHITECTURAL IMPERATIVES




7         Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
1
MONETIZATION IS AN ARCHITECTURAL IMPERATIVE

                                                                                          Two-Sided
       Service Control                                                                  Business Models
       Tiered Subscriptions                                                           Targeted Advertising    $
       Guaranteed Delivery                                                          Guaranteed Service with
     Location Based Services                                                       Revenue Share with Content
       Turbo Performance                                                                   Providers


                                           The New
                                         Mobile Network
    Long-Tail Applications                                                              Internet of Things
          Online RPG                                                                    Secure Mobile Banking
       Words with Friends                                                                 Smart-Grid, M2M
         Virtual Reality
          Dog Collar
      Glow Cap (medicine)




8                           Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
EMBRACE THE LONG TAIL:
INFINITE APPS, INFINITE POSSIBILITIES
At 50% penetration, aggregate $1 a month maps to…

                                                    Annual Revenue for 50M Subs


                                                             Annual Revenue for 10M Subs
 MOBILE
SECURITY
  SUITE


             TURBO BIZ
           PERFORMANCE
                          TARGETED
                             AD
                                                 DOG COLLAR,
                                                  GLOW CAP                           SECURE    GUARANTEED
                                                                         SMARTGRID
                                                                           APPS       MOBILE    MULTIMEDIA
                                                                                     BANKING     DELIVERY




9   $3        $2              $2                        $3
                         Copyright © 2011 Juniper Networks, Inc.              $1
                                                                   www.juniper.net    $1          $1
2
     THINK SUBSCRIPTIONS, NOT JUST SUBSCRIBERS
                       Fleet
                Management                                                                 Transportation &
                 & Logistics                                                               Shipping Companies



   Automotive
                                                                                                     Auto Care /
   Telematics
                                                                                                     Aftermarket




Smart Grid
                                      The New Network                                                   Utility &
Automation                                                                                              Power




  Remote                                      Security                                                   Healthcare
   Health                                                                                                Providers
Monitoring                                Activation Rates
                                             Scalability
                                                IPv6
                                      Gateways, Proxy Services
         Surveillance                                                                          Security Services
                                          Interoperability

    10                         Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
3
DELIVER DYNAMIC END-USER EXPERIENCES




     HD Internet    Multi-screen                               Video hosting      Connected car




       Viral TV     Cloud STB                                  TeleMedicine       Family media




                                                                Broadcast
     DIY director       4D TV                                    gaming            Crowdcast


11                   Copyright © 2011 Juniper Networks, Inc.    www.juniper.net
CONTEXT-AWARE SERVICES…
BANKABLE OPERATOR ASSETS



          Customer/Machine Intelligence
                                                                                                 Network Intelligence
             Service Personalization
                                                                                                   Real-Time Data




                                                                                                                           Policy: Billing
                                                                  Bandwidth                                                Performance

 Device                                   Location
  Type                                      App
                                                                                          Content               Latency

                    Roaming

                                                                                                                          Session Info,
                                                                    Security                                                Roaming

      Cloud                     Time of Day
                                                                                                         QoS
     Services                      Service




                          Delivering an Integrated User Experience

12                                   Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
4
      CENTRALIZE AND DISTRIBUTE. THE POWER OF 'AND'

Customers, Partners                                                                       Data Centers
     (billions)                                                                            (hundreds)
                         Distribution to manage traffic explosion




                      Consolidation to reduce infrastructure costs and opex


 13                           Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
BUILD YOUR BUSINESS ON MOBILE CLOUD                                                                                                                        5
FOUNDATION


                                            From                                                               To

                               On-Premise                                                                       Software
                                  Apps                        Performance




                                                                                                                             Flexible, virtualized model
                                                                                                                             Flexible, virtualized model
                                                                                                                Services
 Rigid, legacy model of I.T.




                               Dedicated                                                                       Virtualized
                                Servers                           Scalability                                  Workloads


                               Dedicated                                                                        Shared
                                Storage                      Manageability                                      Storage


                                Layers of
                               Complexity                        Economics
                                                                                                                QFabric
                                                                                                                Network
14                                                 Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
DESIGN MOBILE BACKHAUL BEYOND TRANSPORT
                                                                                                                 6
SMALL CELLS, “HETNETS” RESHAPING MPLS ARCHITECTURE




                          8                                                                                  1
                        Small
                        Cell
                        RAN

                        7
                     Macro                                  Cell Site
                     RAN                                                                                 2
                            6
                        Optical                  5                              4                    3
                                           Site                         SLA                       Security
                                         Monitoring                  Assurance



15   Source: Dell ‘Oro & Infonetics   Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
7
CELEBRATE WI-FI IN OVERALL CAPACITY PLANNING
                                                      Must Support a Wide Variety of
                                                      Wi-Fi Access Mechanisms
     MUTUAL ACCESS NETWORK                                        Home/Residence
         AUTHENTICATION                                           Owned Hotspots
                                                                  SP Owned Hotspots
        ACCESS CONTROL &                                          Partner Hotspots
          CONFIDENTIALITY                                         (supporting a variety of
              • Over-the-Air                                      authentication mechanisms)
        • To the Home Network
                                                                  Partner SP Owned Hotspots
             POLICY BASED                             Secure/Private User Plane
      • Access Network Selection                                  Air interface
          • Application Routing                                   Backhaul
                                                      Seamless User Experience
      APPLICATION / SERVICE
          CONTINUITY &
                                                                  Network Selection & Access
       INTER-RELATIONSHIP                                         Access to Applications
                                                                  Service Continuity

16                      Copyright © 2011 Juniper Networks, Inc.    www.juniper.net
INNOVATE THROUGH FEDERATED SERVICES                                                                                 8
AND OPEN APIs




       Differentiation               Rapid                                Customer            Experience and
         Emphasis                  Innovation                            Relationships          Economics




                                  Enable
                               Experience On
                                 Demand                                    Federate
       Leverage the                                                                              Monetize
                               Adopt a platform for                       Experiences
          Edge                                                                                  Experiences
                                   innovation to                         Support inter- and
     Deliver scalability and                                                                  Drive revenue where
                                     accelerate                            intra-footprint
         differentiation                                                                          there is cost
                                future services for                         relationships
                                 consumers and
                                    enterprises



17                             Copyright © 2011 Juniper Networks, Inc.     www.juniper.net
9
DEVELOP VISION FOR POLICY-BASED OPTIMIZATION

                                                                       Analytics             PCRF

                                                                  Analyze/
Extend 3GPP                                                      Recommend
  SON from            Network
the RAN into         state data                                                                     Policy-based
 the Network                                                                                         response
     Core

                                                                     SGW / PGW / Optimization



                                                                            Mobile Network             Internet
                                     RAN

                                                 Policy Enforcement

Class/Subscriber profile-specific optimization of user and signaling planes.
Integrate network, subscriber, class and application policies.
Response: Load/state-aware parameter adjustments, traffic shaping/routing, …
Additional standards/forum work ongoing (3GPP, ATIS, etc.).

18                               Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
IMPLEMENT SECURITY WITHOUT BOUNDARIES!
                                                                               10
NO DEFINED PERIMETER

                         Incremental Revenue from
                           Enterprise Customers
      ANTIVIRUS



                     … and avoids costs associated
                         with malware attacks
      PERSONAL
      FIREWALL




      ANTI-SPAM




     LOSS/THEFT
     PROTECTION




      DEVICE MON
     and CONTROL

19                 Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
CONCLUSIONS
20           Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
TOP TEN ARCHITECTURAL IMPERATIVES
 1 Monetization is an Architectural Imperative

 2 Think subscriptions not just subscribers. Internet of Things

 3 Deliver dynamic end-user experiences

 4 Centralize and distribute. The power of ‘AND’

 5 Build your business on Mobile Cloud Foundation

 6 Design mobile backhaul beyond transport by extending MPLS

 7 Celebrate Wi-Fi in overall capacity planning

 8 Innovate through federated services and Open APIs

 9 Develop vision for policy-based automation

10 Implement security without boundaries
21                  Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
KEY TAKEAWAYS
 Mobile networks are at massive inflection points; traditional
 networks are inadequate
 Business dynamics must be architected, can’t be just bolted on
 Celebrate innovation from all corners of the world
 Deliver compelling user experience to establish win/win
 relationships with over-the-top providers
 Shift orchestration towards cloud and “Internet” type profitable
 services
 Internalize and apply the ten key architectural principles to drive
 next generation mobile networks



22                   Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
Thank You

     Q&A




23               Copyright © 2011 Juniper Networks, Inc.   www.juniper.net

More Related Content

What's hot

offload
 offload offload
offloadxingbei
 
WiTech Wi-Fi cloud - managed services forum 2011 - lisbon
WiTech Wi-Fi cloud - managed services forum 2011 - lisbon WiTech Wi-Fi cloud - managed services forum 2011 - lisbon
WiTech Wi-Fi cloud - managed services forum 2011 - lisbon Claudio Adriani
 
Managing Data Offloading Securely Over WLan Access Networks With I-WLan
Managing Data Offloading Securely Over WLan Access Networks With I-WLanManaging Data Offloading Securely Over WLan Access Networks With I-WLan
Managing Data Offloading Securely Over WLan Access Networks With I-WLanGreen Packet
 
Magpie Smart Grid Software Engineering Offering
Magpie Smart Grid Software Engineering OfferingMagpie Smart Grid Software Engineering Offering
Magpie Smart Grid Software Engineering Offeringimpodgirl
 
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01Newlink
 
Deploying Access for 3G and 4G Mobile Networks
Deploying Access for 3G and 4G Mobile NetworksDeploying Access for 3G and 4G Mobile Networks
Deploying Access for 3G and 4G Mobile NetworksCisco Canada
 
Bull Open Source Feedback OW2con11, Nov 24-25, Paris
Bull Open Source Feedback OW2con11, Nov 24-25, ParisBull Open Source Feedback OW2con11, Nov 24-25, Paris
Bull Open Source Feedback OW2con11, Nov 24-25, ParisOW2
 
Wireless Broadband Delivers The 21st Century
Wireless Broadband Delivers The 21st CenturyWireless Broadband Delivers The 21st Century
Wireless Broadband Delivers The 21st Centuryandrescarvallo
 
Machines are doing most of the talking
Machines are doing most of the talkingMachines are doing most of the talking
Machines are doing most of the talkingRSComponentsTCC
 
Explanation of voip
Explanation of voipExplanation of voip
Explanation of voiphuntysen
 
Mobile Developer 101 (mHealth Edition)
Mobile Developer 101 (mHealth Edition)Mobile Developer 101 (mHealth Edition)
Mobile Developer 101 (mHealth Edition)Caroline Lewko
 
Hadoop World 2011: Large Scale Log Data Analysis for Marketing in NTT Communi...
Hadoop World 2011: Large Scale Log Data Analysis for Marketing in NTT Communi...Hadoop World 2011: Large Scale Log Data Analysis for Marketing in NTT Communi...
Hadoop World 2011: Large Scale Log Data Analysis for Marketing in NTT Communi...Kenji Hara
 
Managing data offload over wlan access networks with iwlan
Managing data offload over wlan access networks with iwlanManaging data offload over wlan access networks with iwlan
Managing data offload over wlan access networks with iwlanJustus @GreenPacket
 
OpenStack on Intel
OpenStack on IntelOpenStack on Intel
OpenStack on IntelOpen Stack
 
Embedding LTE into Netbooks & Consumer Electronics
Embedding LTE into Netbooks & Consumer ElectronicsEmbedding LTE into Netbooks & Consumer Electronics
Embedding LTE into Netbooks & Consumer ElectronicsContinuous Computing
 

What's hot (16)

offload
 offload offload
offload
 
WiTech Wi-Fi cloud - managed services forum 2011 - lisbon
WiTech Wi-Fi cloud - managed services forum 2011 - lisbon WiTech Wi-Fi cloud - managed services forum 2011 - lisbon
WiTech Wi-Fi cloud - managed services forum 2011 - lisbon
 
Managing Data Offloading Securely Over WLan Access Networks With I-WLan
Managing Data Offloading Securely Over WLan Access Networks With I-WLanManaging Data Offloading Securely Over WLan Access Networks With I-WLan
Managing Data Offloading Securely Over WLan Access Networks With I-WLan
 
Magpie Smart Grid Software Engineering Offering
Magpie Smart Grid Software Engineering OfferingMagpie Smart Grid Software Engineering Offering
Magpie Smart Grid Software Engineering Offering
 
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01
Ciscounifiedservicedeliverylaunchmay2009final 090512004229-phpapp01
 
Deploying Access for 3G and 4G Mobile Networks
Deploying Access for 3G and 4G Mobile NetworksDeploying Access for 3G and 4G Mobile Networks
Deploying Access for 3G and 4G Mobile Networks
 
Bull Open Source Feedback OW2con11, Nov 24-25, Paris
Bull Open Source Feedback OW2con11, Nov 24-25, ParisBull Open Source Feedback OW2con11, Nov 24-25, Paris
Bull Open Source Feedback OW2con11, Nov 24-25, Paris
 
Wireless Broadband Delivers The 21st Century
Wireless Broadband Delivers The 21st CenturyWireless Broadband Delivers The 21st Century
Wireless Broadband Delivers The 21st Century
 
Machines are doing most of the talking
Machines are doing most of the talkingMachines are doing most of the talking
Machines are doing most of the talking
 
Explanation of voip
Explanation of voipExplanation of voip
Explanation of voip
 
Mobile Developer 101 (mHealth Edition)
Mobile Developer 101 (mHealth Edition)Mobile Developer 101 (mHealth Edition)
Mobile Developer 101 (mHealth Edition)
 
Hadoop World 2011: Large Scale Log Data Analysis for Marketing in NTT Communi...
Hadoop World 2011: Large Scale Log Data Analysis for Marketing in NTT Communi...Hadoop World 2011: Large Scale Log Data Analysis for Marketing in NTT Communi...
Hadoop World 2011: Large Scale Log Data Analysis for Marketing in NTT Communi...
 
Managing data offload over wlan access networks with iwlan
Managing data offload over wlan access networks with iwlanManaging data offload over wlan access networks with iwlan
Managing data offload over wlan access networks with iwlan
 
OpenStack on Intel
OpenStack on IntelOpenStack on Intel
OpenStack on Intel
 
Embedding LTE into Netbooks & Consumer Electronics
Embedding LTE into Netbooks & Consumer ElectronicsEmbedding LTE into Netbooks & Consumer Electronics
Embedding LTE into Netbooks & Consumer Electronics
 
Programmable WAN Networking is SFW
Programmable WAN Networking is SFWProgrammable WAN Networking is SFW
Programmable WAN Networking is SFW
 

Viewers also liked

Junos pulse-secure-access-service-dmi-solution-guide
Junos pulse-secure-access-service-dmi-solution-guideJunos pulse-secure-access-service-dmi-solution-guide
Junos pulse-secure-access-service-dmi-solution-guidescottjohanson
 
Junos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite LaunchJunos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite LaunchJuniper Networks
 
Juniper Enterprise Guest Access
Juniper Enterprise Guest AccessJuniper Enterprise Guest Access
Juniper Enterprise Guest AccessAltaware, Inc.
 
Implementing Secure Access & Mobile Identity
Implementing Secure Access & Mobile IdentityImplementing Secure Access & Mobile Identity
Implementing Secure Access & Mobile IdentityJeff Green
 
Building excellence in support
Building excellence in supportBuilding excellence in support
Building excellence in supportJeff Green
 
Next gen insight networkshop44
Next gen insight   networkshop44Next gen insight   networkshop44
Next gen insight networkshop44Jisc
 
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44Jisc
 

Viewers also liked (9)

Junos pulse-secure-access-service-dmi-solution-guide
Junos pulse-secure-access-service-dmi-solution-guideJunos pulse-secure-access-service-dmi-solution-guide
Junos pulse-secure-access-service-dmi-solution-guide
 
Junos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite LaunchJunos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite Launch
 
Juniper Enterprise Guest Access
Juniper Enterprise Guest AccessJuniper Enterprise Guest Access
Juniper Enterprise Guest Access
 
Implementing Secure Access & Mobile Identity
Implementing Secure Access & Mobile IdentityImplementing Secure Access & Mobile Identity
Implementing Secure Access & Mobile Identity
 
Building excellence in support
Building excellence in supportBuilding excellence in support
Building excellence in support
 
Access Management with Aruba ClearPass
Access Management with Aruba ClearPassAccess Management with Aruba ClearPass
Access Management with Aruba ClearPass
 
Large scale, distributed access management deployment with aruba clear pass
Large scale, distributed access management deployment with aruba clear passLarge scale, distributed access management deployment with aruba clear pass
Large scale, distributed access management deployment with aruba clear pass
 
Next gen insight networkshop44
Next gen insight   networkshop44Next gen insight   networkshop44
Next gen insight networkshop44
 
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
 

Similar to Top Ten Imperatives for Service Providers

Radisys Optimizing VAS for Greater Revenue Generation
Radisys Optimizing VAS for Greater Revenue GenerationRadisys Optimizing VAS for Greater Revenue Generation
Radisys Optimizing VAS for Greater Revenue GenerationRadisys Corporation
 
EMC Forum Track Introductions
EMC Forum Track IntroductionsEMC Forum Track Introductions
EMC Forum Track IntroductionsEMC Forum India
 
Application-Aware Network Performance Management
Application-Aware Network Performance ManagementApplication-Aware Network Performance Management
Application-Aware Network Performance ManagementRiverbed Technology
 
Cisco tec surya panditi - service provider
Cisco tec   surya panditi - service providerCisco tec   surya panditi - service provider
Cisco tec surya panditi - service providerCisco Public Relations
 
Machine-to-Machine Services - E2E Architecture and A View to the Trillion End...
Machine-to-Machine Services - E2E Architecture and A View to the Trillion End...Machine-to-Machine Services - E2E Architecture and A View to the Trillion End...
Machine-to-Machine Services - E2E Architecture and A View to the Trillion End...Mahbubul Alam
 
T1 05 emc forum track introductions manoj chugh final
T1 05 emc forum track introductions manoj chugh finalT1 05 emc forum track introductions manoj chugh final
T1 05 emc forum track introductions manoj chugh finalEMC Forum India
 
Cccc net app_wallacefung
Cccc net app_wallacefungCccc net app_wallacefung
Cccc net app_wallacefungCloud Congress
 
CCCC NetApp Wallace Fung
CCCC NetApp Wallace FungCCCC NetApp Wallace Fung
CCCC NetApp Wallace FungCloud Congress
 
Mavenir: Network Transformation for 5G Services
Mavenir: Network Transformation for 5G ServicesMavenir: Network Transformation for 5G Services
Mavenir: Network Transformation for 5G ServicesMavenir
 
Cloud Computing Overview
Cloud Computing OverviewCloud Computing Overview
Cloud Computing OverviewMarcelo Sávio
 
A Fresh Look at the Future of Long Term Evolution (LTE)
A Fresh Look at the Future of Long Term Evolution (LTE)A Fresh Look at the Future of Long Term Evolution (LTE)
A Fresh Look at the Future of Long Term Evolution (LTE)HitReach
 
Harnessing the Power of the Mobile Cloud
Harnessing the Power of the Mobile CloudHarnessing the Power of the Mobile Cloud
Harnessing the Power of the Mobile CloudAntenna Software
 
SeGW Whitepaper from Radisys
SeGW Whitepaper from RadisysSeGW Whitepaper from Radisys
SeGW Whitepaper from RadisysShah Sheikh
 
2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud Deployment2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud DeploymentOpen Data Center Alliance
 
Cloud Clf 2011 12 Big Things To Know Idc Analysts 2011
Cloud Clf 2011 12 Big Things To Know Idc Analysts 2011Cloud Clf 2011 12 Big Things To Know Idc Analysts 2011
Cloud Clf 2011 12 Big Things To Know Idc Analysts 2011Job Voorhoeve
 
Building and Managing Cloud Applications and Infrastructure
Building and Managing Cloud Applications and InfrastructureBuilding and Managing Cloud Applications and Infrastructure
Building and Managing Cloud Applications and InfrastructureDarren Cunningham
 
Evaluating Monetization Strategies in an All IP World
Evaluating Monetization Strategies in an All IP WorldEvaluating Monetization Strategies in an All IP World
Evaluating Monetization Strategies in an All IP WorldGENBANDcorporate
 

Similar to Top Ten Imperatives for Service Providers (20)

Radisys Optimizing VAS for Greater Revenue Generation
Radisys Optimizing VAS for Greater Revenue GenerationRadisys Optimizing VAS for Greater Revenue Generation
Radisys Optimizing VAS for Greater Revenue Generation
 
EMC Forum Track Introductions
EMC Forum Track IntroductionsEMC Forum Track Introductions
EMC Forum Track Introductions
 
Application-Aware Network Performance Management
Application-Aware Network Performance ManagementApplication-Aware Network Performance Management
Application-Aware Network Performance Management
 
Cisco tec surya panditi - service provider
Cisco tec   surya panditi - service providerCisco tec   surya panditi - service provider
Cisco tec surya panditi - service provider
 
Machine-to-Machine Services - E2E Architecture and A View to the Trillion End...
Machine-to-Machine Services - E2E Architecture and A View to the Trillion End...Machine-to-Machine Services - E2E Architecture and A View to the Trillion End...
Machine-to-Machine Services - E2E Architecture and A View to the Trillion End...
 
T1 05 emc forum track introductions manoj chugh final
T1 05 emc forum track introductions manoj chugh finalT1 05 emc forum track introductions manoj chugh final
T1 05 emc forum track introductions manoj chugh final
 
Cccc net app_wallacefung
Cccc net app_wallacefungCccc net app_wallacefung
Cccc net app_wallacefung
 
CCCC NetApp Wallace Fung
CCCC NetApp Wallace FungCCCC NetApp Wallace Fung
CCCC NetApp Wallace Fung
 
Clouds: Beyond Compute and Storage
Clouds: Beyond Compute and StorageClouds: Beyond Compute and Storage
Clouds: Beyond Compute and Storage
 
Mavenir: Network Transformation for 5G Services
Mavenir: Network Transformation for 5G ServicesMavenir: Network Transformation for 5G Services
Mavenir: Network Transformation for 5G Services
 
Cloud Computing Overview
Cloud Computing OverviewCloud Computing Overview
Cloud Computing Overview
 
A Fresh Look at the Future of Long Term Evolution (LTE)
A Fresh Look at the Future of Long Term Evolution (LTE)A Fresh Look at the Future of Long Term Evolution (LTE)
A Fresh Look at the Future of Long Term Evolution (LTE)
 
Harnessing the Power of the Mobile Cloud
Harnessing the Power of the Mobile CloudHarnessing the Power of the Mobile Cloud
Harnessing the Power of the Mobile Cloud
 
Lam Chee Keong
Lam Chee KeongLam Chee Keong
Lam Chee Keong
 
VISIT2008 Cloud Computing
VISIT2008 Cloud ComputingVISIT2008 Cloud Computing
VISIT2008 Cloud Computing
 
SeGW Whitepaper from Radisys
SeGW Whitepaper from RadisysSeGW Whitepaper from Radisys
SeGW Whitepaper from Radisys
 
2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud Deployment2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud Deployment
 
Cloud Clf 2011 12 Big Things To Know Idc Analysts 2011
Cloud Clf 2011 12 Big Things To Know Idc Analysts 2011Cloud Clf 2011 12 Big Things To Know Idc Analysts 2011
Cloud Clf 2011 12 Big Things To Know Idc Analysts 2011
 
Building and Managing Cloud Applications and Infrastructure
Building and Managing Cloud Applications and InfrastructureBuilding and Managing Cloud Applications and Infrastructure
Building and Managing Cloud Applications and Infrastructure
 
Evaluating Monetization Strategies in an All IP World
Evaluating Monetization Strategies in an All IP WorldEvaluating Monetization Strategies in an All IP World
Evaluating Monetization Strategies in an All IP World
 

More from Juniper Networks

Why Juniper, Driven by Mist AI, Leads the Market
 Why Juniper, Driven by Mist AI, Leads the Market Why Juniper, Driven by Mist AI, Leads the Market
Why Juniper, Driven by Mist AI, Leads the MarketJuniper Networks
 
Experience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseExperience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseJuniper Networks
 
How AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANHow AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANJuniper Networks
 
Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.Juniper Networks
 
Are you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesAre you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesJuniper Networks
 
Stop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WANStop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WANJuniper Networks
 
Securing IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachSecuring IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachJuniper Networks
 
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?Juniper Networks
 
Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?Juniper Networks
 
Juniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper Networks
 
SDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider OrganizationSDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider OrganizationJuniper Networks
 
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveNavigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveJuniper Networks
 
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks Juniper Networks
 
NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud Juniper Networks
 
Juniper SRX5800 Infographic
Juniper SRX5800 InfographicJuniper SRX5800 Infographic
Juniper SRX5800 InfographicJuniper Networks
 
Infographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionInfographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionJuniper Networks
 
Infographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastInfographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastJuniper Networks
 
High performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingHigh performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingJuniper Networks
 

More from Juniper Networks (20)

Why Juniper, Driven by Mist AI, Leads the Market
 Why Juniper, Driven by Mist AI, Leads the Market Why Juniper, Driven by Mist AI, Leads the Market
Why Juniper, Driven by Mist AI, Leads the Market
 
Experience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseExperience the AI-Driven Enterprise
Experience the AI-Driven Enterprise
 
How AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANHow AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WAN
 
Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.
 
SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.
 
Are you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesAre you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devices
 
Stop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WANStop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WAN
 
Securing IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachSecuring IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic Approach
 
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
 
What's Your IT Alter Ego?
What's Your IT Alter Ego?What's Your IT Alter Ego?
What's Your IT Alter Ego?
 
Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?
 
Juniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCO
 
SDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider OrganizationSDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider Organization
 
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveNavigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
 
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks
 
NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud
 
Juniper SRX5800 Infographic
Juniper SRX5800 InfographicJuniper SRX5800 Infographic
Juniper SRX5800 Infographic
 
Infographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionInfographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer Satisfaction
 
Infographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastInfographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning Fast
 
High performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingHigh performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computing
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Top Ten Imperatives for Service Providers

  • 1. TOP TEN IMPERATIVES FOR SERVICE PROVIDERS Manoj Leelanivas Executive Vice President, Juniper Networks 1 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 2. OUTLINE 1 Market Trends Forcing Mobility Rethink 2 Ten Architectural Imperatives 3 Key Takeaways 4 Customer Testimonials Q&A 2 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 3. CONVERGENCE OF MOBILITY, VIDEO AND CLOUD CREATING MARKET DISRUPTION Mobility Cloud Computing Smartphone 181% Tablet Growth 76% Annual Growth 62% Cloud Server Revenue Increase Gartner predicted that tablet sales According to Synergy 110M Smart According to IDC’s cloud computing will grow 181% in 2011 to 54.8M, phones shipped in Q2-2011. survey, server revenue in the private many of which are built to take cloud category will grow from $7.3 advantage of mobile 3G and billion in 2009 to $11.8 billion in 2014, 4G networks. or about 62 percent. 3 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 4. GIGABYTE LIFESTYLE: REAL-TIME & INTERACTIVE … > 50% penetration of SmartPhones, Mobile compute devices >50% of all mobile traffic is video >50% of cell sites support 200+Mpbs >50% revenue comes from non-traditional services >50% subscribers use location based services and 3+ devices >50% of the services are delivered via the cloud… 4 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 5. BOUNDARYLESS ENTERPRISE SECURE MOBILITY DETERMINES COMPETITIVE ADVANTAGE Employees Devices Security Data Empowered Mobile Employee Cloud Ubiquitous Content Internet Information Services Through Secure Cloud ERP Connecting Machine-2-machine Everything, Not just Everyone, to the Corporate Network 5 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 6. MASSIVE DATA GROWTH STRETCHING NETWORKS AND STRAINING BUDGETS It is more dynamic and unpredictable 1 Traffic is growing 2 than ever PB/Month 180,000 Mobility +27% 100,000 17x 2008-2020 Growth CAGR IP Apps 2008-2020 20,000 Cloud 1999 2002 2005 2008 2011 2014 2017 2021 Source: Juniper, Cisco, MINTS The combination challenges service Because today’s fragmented network 3 provider economics 4 architecture doesn‘t scale App Servers Web App Servers Svcs Application Web Svcs Manager(s) IP Network Mobile Network 2G 4G Gateway 3G 6 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 7. TOP TEN ARCHITECTURAL IMPERATIVES 7 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 8. 1 MONETIZATION IS AN ARCHITECTURAL IMPERATIVE Two-Sided Service Control Business Models Tiered Subscriptions Targeted Advertising $ Guaranteed Delivery Guaranteed Service with Location Based Services Revenue Share with Content Turbo Performance Providers The New Mobile Network Long-Tail Applications Internet of Things Online RPG Secure Mobile Banking Words with Friends Smart-Grid, M2M Virtual Reality Dog Collar Glow Cap (medicine) 8 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 9. EMBRACE THE LONG TAIL: INFINITE APPS, INFINITE POSSIBILITIES At 50% penetration, aggregate $1 a month maps to… Annual Revenue for 50M Subs Annual Revenue for 10M Subs MOBILE SECURITY SUITE TURBO BIZ PERFORMANCE TARGETED AD DOG COLLAR, GLOW CAP SECURE GUARANTEED SMARTGRID APPS MOBILE MULTIMEDIA BANKING DELIVERY 9 $3 $2 $2 $3 Copyright © 2011 Juniper Networks, Inc. $1 www.juniper.net $1 $1
  • 10. 2 THINK SUBSCRIPTIONS, NOT JUST SUBSCRIBERS Fleet Management Transportation & & Logistics Shipping Companies Automotive Auto Care / Telematics Aftermarket Smart Grid The New Network Utility & Automation Power Remote Security Healthcare Health Providers Monitoring Activation Rates Scalability IPv6 Gateways, Proxy Services Surveillance Security Services Interoperability 10 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 11. 3 DELIVER DYNAMIC END-USER EXPERIENCES HD Internet Multi-screen Video hosting Connected car Viral TV Cloud STB TeleMedicine Family media Broadcast DIY director 4D TV gaming Crowdcast 11 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 12. CONTEXT-AWARE SERVICES… BANKABLE OPERATOR ASSETS Customer/Machine Intelligence Network Intelligence Service Personalization Real-Time Data Policy: Billing Bandwidth Performance Device Location Type App Content Latency Roaming Session Info, Security Roaming Cloud Time of Day QoS Services Service Delivering an Integrated User Experience 12 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 13. 4 CENTRALIZE AND DISTRIBUTE. THE POWER OF 'AND' Customers, Partners Data Centers (billions) (hundreds) Distribution to manage traffic explosion Consolidation to reduce infrastructure costs and opex 13 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 14. BUILD YOUR BUSINESS ON MOBILE CLOUD 5 FOUNDATION From To On-Premise Software Apps Performance Flexible, virtualized model Flexible, virtualized model Services Rigid, legacy model of I.T. Dedicated Virtualized Servers Scalability Workloads Dedicated Shared Storage Manageability Storage Layers of Complexity Economics QFabric Network 14 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 15. DESIGN MOBILE BACKHAUL BEYOND TRANSPORT 6 SMALL CELLS, “HETNETS” RESHAPING MPLS ARCHITECTURE 8 1 Small Cell RAN 7 Macro Cell Site RAN 2 6 Optical 5 4 3 Site SLA Security Monitoring Assurance 15 Source: Dell ‘Oro & Infonetics Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 16. 7 CELEBRATE WI-FI IN OVERALL CAPACITY PLANNING Must Support a Wide Variety of Wi-Fi Access Mechanisms MUTUAL ACCESS NETWORK Home/Residence AUTHENTICATION Owned Hotspots SP Owned Hotspots ACCESS CONTROL & Partner Hotspots CONFIDENTIALITY (supporting a variety of • Over-the-Air authentication mechanisms) • To the Home Network Partner SP Owned Hotspots POLICY BASED Secure/Private User Plane • Access Network Selection Air interface • Application Routing Backhaul Seamless User Experience APPLICATION / SERVICE CONTINUITY & Network Selection & Access INTER-RELATIONSHIP Access to Applications Service Continuity 16 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 17. INNOVATE THROUGH FEDERATED SERVICES 8 AND OPEN APIs Differentiation Rapid Customer Experience and Emphasis Innovation Relationships Economics Enable Experience On Demand Federate Leverage the Monetize Adopt a platform for Experiences Edge Experiences innovation to Support inter- and Deliver scalability and Drive revenue where accelerate intra-footprint differentiation there is cost future services for relationships consumers and enterprises 17 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 18. 9 DEVELOP VISION FOR POLICY-BASED OPTIMIZATION Analytics PCRF Analyze/ Extend 3GPP Recommend SON from Network the RAN into state data Policy-based the Network response Core SGW / PGW / Optimization Mobile Network Internet RAN Policy Enforcement Class/Subscriber profile-specific optimization of user and signaling planes. Integrate network, subscriber, class and application policies. Response: Load/state-aware parameter adjustments, traffic shaping/routing, … Additional standards/forum work ongoing (3GPP, ATIS, etc.). 18 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 19. IMPLEMENT SECURITY WITHOUT BOUNDARIES! 10 NO DEFINED PERIMETER Incremental Revenue from Enterprise Customers ANTIVIRUS … and avoids costs associated with malware attacks PERSONAL FIREWALL ANTI-SPAM LOSS/THEFT PROTECTION DEVICE MON and CONTROL 19 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 20. CONCLUSIONS 20 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 21. TOP TEN ARCHITECTURAL IMPERATIVES 1 Monetization is an Architectural Imperative 2 Think subscriptions not just subscribers. Internet of Things 3 Deliver dynamic end-user experiences 4 Centralize and distribute. The power of ‘AND’ 5 Build your business on Mobile Cloud Foundation 6 Design mobile backhaul beyond transport by extending MPLS 7 Celebrate Wi-Fi in overall capacity planning 8 Innovate through federated services and Open APIs 9 Develop vision for policy-based automation 10 Implement security without boundaries 21 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 22. KEY TAKEAWAYS Mobile networks are at massive inflection points; traditional networks are inadequate Business dynamics must be architected, can’t be just bolted on Celebrate innovation from all corners of the world Deliver compelling user experience to establish win/win relationships with over-the-top providers Shift orchestration towards cloud and “Internet” type profitable services Internalize and apply the ten key architectural principles to drive next generation mobile networks 22 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 23. Thank You Q&A 23 Copyright © 2011 Juniper Networks, Inc. www.juniper.net