Juniper's Richard Bayliss
-
Upload
grahame-lynch -
Category
Technology
-
view
2.489 -
download
0
description
Transcript of Juniper's Richard Bayliss
CONFIDENTIAL - Copyright © 2013 Juniper Networks, Inc. www.juniper.net
ENABLING THE NEXT WAVE OF NETWORK BASED INNOVATION
CHIEF ARCHITECT, EDGE, ADVANCED TECHNOLOGIES (WW)
Rich Bayliss
Commsday Sydney. April 2013
@rbbayliss
CONFIDENTIAL - Copyright © 2013 Juniper Networks, Inc. www.juniper.net
WHO ARE JUNIPER?
Our Strategy
Innovate to change the economics and experience of networking
CONFIDENTIAL - Copyright © 2013 Juniper Networks, Inc. www.juniper.net
TELSTRA – MULTISERVICE EDGE
"With data on Telstra's fixed network doubling approximately every 17 months we need a network that is scalable, resilient and integrated. The Juniper Edge Services Router assists Telstra to manage content delivery, is highly scalable and integrates our networks. Using this equipment in our network assists us to manage the ever increasing volumes of traffic on the Telstra network."Mike Wright, Executive Director, Networks and Access Technologies, Telstra
MX-Series
Source: http://newsroom.juniper.net/press-releases/juniper-launches-world-s-most-powerful-edge-servic-nyse-jnpr-0940496
CONFIDENTIAL - Copyright © 2013 Juniper Networks, Inc. www.juniper.net
OPTUS - NEXT-GEN CORE
"We carefully chose a core platform to support the organization's growth aspiration. We selected Juniper Networks PTX Series Packet Transport Switch as it provides the density required to support our growth plans. The optimized nature of the PTX platform will also help us manage our cost base as we grow our network, while the power efficiency of the platform will help us support growth within a manageable power environment.”
Karim Nejaim, Vice President, Converged Services Engineering, Optus
Source: http://newsroom.juniper.net/press-releases/optus-to-build-next-generation-core-to-accommodate-nyse-jnpr-978768
PTX5000
CONFIDENTIAL - Copyright © 2013 Juniper Networks, Inc. www.juniper.net
DRAGONS
CONFIDENTIAL - Copyright © 2013 Juniper Networks, Inc. www.juniper.net
DRAGONS
CONFIDENTIAL - Copyright © 2013 Juniper Networks, Inc. www.juniper.net
WHAT DO DRAGONS HAVE TO DO WITH NETWORKS?
CONFIDENTIAL - Copyright © 2013 Juniper Networks, Inc. www.juniper.net
‘THE GOLDEN AGE OF PREMIUM TELEVISION’
CONFIDENTIAL - Copyright © 2013 Juniper Networks, Inc. www.juniper.net
THE LONG TAILA
GG
RE
GA
TE
R
EV
EN
UE
SERVICES
THE MIDDLE GROUND
Vo
ice
SM
S
Da
ta
Vid
eo THE LONG TAIL
CONFIDENTIAL - Copyright © 2013 Juniper Networks, Inc. www.juniper.net
TECHNOLOGY CONTINUES TO BREAK DOWN BARRIERS
Source: Big Ideas - The Ingredients Of Successful TV: David Petrarca – Perth Writers Festival
“The quality and the amount of digital effects per episode could never have been done 10 years ago [..]
“You can say 'let's see would it would look like if these dragons move from from here to there' and before that it would have cost you millions of dollars”
David Petrarca – Director, Game of Thrones.
CONFIDENTIAL - Copyright © 2013 Juniper Networks, Inc. www.juniper.net
WHEN IS 10 X $10M NOT $100M?
“Give me $100M and I'll make you ten 10M movies. I guarantee 3 or 4 of them will be great, and they'll make your money back. Why don't you do that?”
‘We can't do that because we have to feed the machine... we have to be able to build a ride out of that movie.’
David Petrarca – Director, Game of Thrones.
CONFIDENTIAL - Copyright © 2013 Juniper Networks, Inc. www.juniper.net
AUSTRALIAN STATISTICS
Source: MPAA, ABS, Census.gov, DBCDE, Torrent Freak
Population
23M Aus 2012 Box Office
0.3% Worldwide population 3.5% Ranked 9th
Worldwide
1.2B Aus 2012 Box Office
Cinema Television
29% Households with PayTV
10% Of WW GOT Piracy
CONFIDENTIAL - Copyright © 2013 Juniper Networks, Inc. www.juniper.net
FINDING THE RIGHT ANCHOR
PEER or CACHE? COMPETE or PARTNER?
CONFIDENTIAL - Copyright © 2013 Juniper Networks, Inc. www.juniper.net
SO WHY ARE WE STUCK BUILDING BLOCKBUSTERS?
Voice Video Data Mobility
10101010101010101010101010101010101010101010101010
CONFIDENTIAL - Copyright © 2013 Juniper Networks, Inc. www.juniper.net
OPERATING IN A CAPITAL CONSTRAINED WORLD
Source: Asymco, Ovum, Juniper Estimates from 2012 Reports
GOOGLE $3.2B
FACEBOOK $1.6B
APPLE $10B
SAMSUNG $20B
AMAZON $3.8B
TELSTRA* $3.8B
NBN $1.4B
NETFLIX $0.041B
= $5B
CONFIDENTIAL - Copyright © 2013 Juniper Networks, Inc. www.juniper.net
HOW TO DEAL WITH UNCERTAINTY?
20%
31%
18%
8%
8%
6%
2%2%
6%
Browser (31)Games (50)Facebook (28)Entertainment (12)Utility (12)Social Networking (9)News (3)Productivity (3)Other (9)
158 Minutes Per Day
Source: Flurry
CONFIDENTIAL - Copyright © 2013 Juniper Networks, Inc. www.juniper.net
...WITH HIGH PERFORMANCE
SCALABILITY: Support new high bandwidth applications and business growth without platform re-architecture
PERFORMANCE & RELIABILITY: optimized for highly virtualized workloads and mobility. Robustness to support mission critical environments
REDUCE COMPLEXITY: Reduce man hours to deploy, configure and maintain, reduce end-to-end costs, simplify legacy architectures wherever possible
INTEROPERABILITY & INVESTMENT PROTECTION: Leverage existing assets with flexible architecture to seamless and rapidly support changing business needs
CONFIDENTIAL - Copyright © 2013 Juniper Networks, Inc. www.juniper.net
VIRTUALISE NETWORK FUNCTIONS
NETWORK EDGE SERVICES
CARRIER GRADE NAT FIREWALL
CACHING & VIDEO
WAN OPTIMIZATION
LOAD BALANCING TRAFFIC
DETECTION/DPI
NETWORK ADRESSING
Appliance
LOAD BALANCING
Appliance
FIREWALLAppliance
IPS & IPSec Appliance
PARENTAL CONTROLAppliance
DPIAppliance
APP & SUB AWARENESS
Appliance
LOAD BALANCING
Appliance
AD INSERTIONAppliance
Router CONTENT MANAGEMENT
Appliance
LEGACY APPROACH
Point vertical solution vendors
Not scalable
Difficult to monetize
Expensive operations
No granular segmentation
Single-tenant architecture
Complex management
Capital-intensive expansions
CONFIDENTIAL - Copyright © 2013 Juniper Networks, Inc. www.juniper.net
SOFTWARE DEFINED NETWORKING
NETWORK EDGE SERVICES
CARRIER GRADE NAT FIREWALL
CACHING & VIDEO
WAN OPTIMIZATION
LOAD BALANCING TRAFFIC
DETECTION/DPI
SERVICE CHAINING APPROACH Virtual
Edge Router
Network Addressing
Security Services
Content & Caching
Traffic/Subscriber Detection
Load Balancing
CONFIDENTIAL - Copyright © 2013 Juniper Networks, Inc. www.juniper.net
DECOUPLE SERVICES FROM THE NETWORK
On Box Remote Shelf On Cloud
WHERE BEST TO SCALE SERVICE DEPLOYMENT?
CONFIDENTIAL - Copyright © 2013 Juniper Networks, Inc. www.juniper.net
EXAMPLE: VIRTUAL CPE
Virtual CPE
Virtualization of CPE simplifies management and enables new services to
be deployed quickly in an ‘as-a-service’ model without forklift upgrades.
VIRTUAL CPEVPN / Internet
CONFIDENTIAL - Copyright © 2013 Juniper Networks, Inc. www.juniper.net
EXAMPLE: CLOUD NETWORKING
An end-to-end approach to cloud services combining the QoS/traffic-engineering
within the network to deliver a seamless experience regardless of device or location.
CLOUD NETWORKING
3G/GSMLTE
Enterprise Hosted Cloud
SP Datacenter
VPN
CONFIDENTIAL - Copyright © 2013 Juniper Networks, Inc. www.juniper.net
CONCLUSION
Fragmentation of users and services is inevitable. Innovation requires service flexibility and agility.
The network platform is continuing to reshape our digital lives, behaviours and marketplaces.
Let’s Build The Best Together.
Juniper has a clear framework for SDN with defined architectural principles and migration strategy.
CONFIDENTIAL - Copyright © 2013 Juniper Networks, Inc. www.juniper.net
CONFIDENTIAL - Copyright © 2013 Juniper Networks, Inc. www.juniper.net