Вы находитесь на странице: 1из 22

Building the Thin Branch

Trevor Dearing

Copyright 2004 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

Current deployment trends


Home

2005 62% of companies have mobile workers


IDC

Application deployment

2003 85% of employees in Branch 2005 91% of employees in Branch


Nemertes Research Branch or remote office

Copyright 2004 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

Current deployment trends


Home

2005 62% of companies have mobile workers


IDC

Resources Software Clients E-mail Storage

2003 85% of employees in Branch 2005 91% of employees in Branch


Nemertes Research Branch or remote office

Copyright 2004 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

Branch Variation
Micro Branch

Thin Branch

Managed network

Regional branch

Private MPLS network

Copyright 2004 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

Traditional islands of voice


Micro Branch
PSTN

Thin Branch
Centrex

Managed network

Regional branch
Key system

Private MPLS network

HQ PBX

Copyright 2004 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

Corporate wide IP Telephony


Micro Branch

Thin Branch

Managed network

Regional branch

Private MPLS network

Copyright 2004 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

The Traditional Branch


Support costs Support costs Facilities costs

ATM

Support costs

Support costs

Copyright 2004 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

Building the Thin Branch


Reduced equipment costs Reduced support costs Reduced power consumption Extra flexibility

Branch Offices

Implement web based applications Deploy centralised IP Telephony Consolidate e-mail servers

Datacentre

Copyright 2004 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

If it were only that simple!


Adding extra protocols
Branch Offices

HTTP web traffic generates 10x traffic of client server E-mail and server centralisation generate latency issues IP Telephony signalling creates extra traffic Voice requires low latency New security challenges

Datacentre

Copyright 2004 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

Recent Breach

New User Constituencies

Changing attitude to risk

Regulation/Compliance

Consolidation

Demanding Applications

Pain
Application Rollout
Fixing What Was Broken Last time Budgetary Pressure

Project

Portfolio
Product

Copyright 2004 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

10

Agents of Catastrophe
Bad People Careless People

Copyright 2004 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

11

Attitudes to Risk and the Good-Enough Gap

Good-enough Gap

Level of Security

Actually Inadequate

Investment in Security

Copyright 2004 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

12

Its All About Applications


Bandwidth App performance
Web-enabled = 10x bandwidth

Branch 1 New apps Server consolidation VoIP QoS

HQ Data replication

Branch 2

Data Center

Copyright 2004 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

13

The WAN Impacts Applications

Impact on applications
More rich content

Lower-priority applications slow down critical ones


Inability to understand application and WAN performance

Protocol chattiness

Copyright 2004 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

14

Bandwidth

Copyright 2004 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

15

Latency

Copyright 2004 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

16

File Services The Challenge


CIFS transfers files in small data chunks, needs an ACK for each

Creates the ping-pong effect

WAN
Windows Clients
ack ack ack ack Windows ack

Server

Copyright 2004 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

17

Solution

WAN

Copyright 2004 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

18

File Services with application acceleration


Devices pipeline files across the WAN Files are then served to the client at LAN speeds

WAN
Windows Clients Windows Server

Copyright 2004 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

19

Visibility & Reporting


Application Manager Business Executive Capacity Planner

Network Manager

Customer View into Service Levels

Network Operations Center/ Customer Care/Help Desk

Copyright 2004 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

20

Branch traffic processing


Speed response time & reduce Latency 5x to 10x average 50x peak (Exchange, file services) Provide full visibility Reporting on apps, WAN, FW

Ensure application delivery MPLS, QoS, bandwidth allocation, Multipath

Increase WAN bandwidth 2x to 4x average compression 20x peak compression

2004 Juniper Networks, Inc. Copyright 2005

Proprietary and Confidential

www.juniper.net

21