Contrail Networking: Evolve your cloud with Containers
|
|
- Marlene Howard
- 6 years ago
- Views:
Transcription
1 Contrail Networking: Evolve your cloud with Containers INSIDE Containers and Microservices Transformation of the Cloud Building a Network for Containers Juniper Networks Contrail Solution BUILD MORE THAN A NETWORK
2 Preface Large enterprises are exploring the possibilities enabled by emerging container technologies such as Docker. At Juniper, we see this trend as a milestone in data center innovation, offering significant gains in efficiency, productivity, and agility for large enterprises that offer cloud as a service. Containers and Microservices The primary purpose of containerized applications is to improve the effectiveness of software teams, making it easier for people to work together while lowering the communications overhead. In large enterprises, applications such as ERP or CRM software suites often begin as simple projects, but as time passes, they quickly become clunky and inefficient, with a monolithic code base that slows progress for development teams. Containers free developers to focus on their core competency, while operations staff benefit from flexibility, a smaller footprint in the data center, and lower overhead. To get beyond this inefficiency, a new approach breaks down the application into smaller, bitesize components known as microservices. Adopting a microservices architecture gives development teams agility and operational efficiency by virtue of the smaller code base in each application component. As the software goes through its various stages of development, it may move from the developer s PC to a lab or test environment; it may move from a physical to a virtual environment, and ultimately, to a production environment. In each of these, the app must perform consistently. Containers address the problem of how to make software work in different computing environments. They enable software developers to encapsulate an application component in a single, lightweight package. Inherently Linux-based, containers offer the promise of running consistently from one computing environment to another, virtual or physical. 1
3 Contrail Networking: Inside the Linux Container Ecosystem Adopting a microservices architecture gives development teams agility and operational efficiency by virtue of the smaller code base in each application component. Transformation of the Cloud With containers inherently lightweight nature, a single host can support many more container instances than traditional virtual machines (VMs). Typically short lived, containers can be created and moved more efficiently than VMs, and they can also be managed as groups of logically related elements. These container characteristics impact the requirements for container networking solutions: the network must be agile and scalable. The transition from VMs to containers will not happen overnight, so VMs, containers, and baremetal servers will need to coexist in the same cloud environment. The container network, therefore, must be seamless across diverse environments. It also must be agnostic to work with whatever compute vehicle is in use to deploy applications. Building a Network for Containers The network plays a vital role in containerization. In multitenant environments, one essential need is the ability to provide access control and auditing capabilities for network flows. The access controls provided by the network complement application-based authentication and authorization mechanisms. Together, they provide a common layer across heterogeneous authentication methods. This function addresses a frequent requirement in environments where thirdparty software such as virtualized firewalls is in use, or when multiple generations of software technologies are running simultaneously. Network access-control, combined with security at Layers 3 7, should encompass the clusters that are executing containerized workloads, as well as external environments such as existing OpenStack or bare-metal servers. In these heterogeneous environments, the network is the glue that holds together the diverse elements. 2
4 Juniper Networks Contrail Solution Juniper Networks Contrail is a simple, open, and agile Cloud Network Automation platform that can provide microsegmentation for a container ecosystem, securely isolating networks within a multi-tenant environment. It enables the cluster management tool to connect different virtual networks between applications running on containers and VMs, and also connect elements outside the cluster management tool, such as legacy infrastructure or databases running on bare-metal servers in private, public, and hybrid clouds. The Contrail solution is composed of two products: Contrail Networking and Contrail Cloud Platform. Contrail Networking: An open SDN solution that consists of Contrail Controller, Contrail vrouter, an analytics engine, and published northbound APIs for cloud and NFV. Contrail Networking improves business agility by delivering unique security, availability, performance, automation, and elasticity capabilities Contrail Cloud Platform: A turnkey cloud orchestration and automation platform that consists of Contrail Networking, Juniper s OpenStack Distribution, Server Manager, and Ceph-Based Distributed Storage. K8s Components Kubernetes Master kube-network-manager REST kube-network-manager New OC daemon for kuberbetes to listen to k8s API and automate the creation of virtual networks and policy Controller BGP Federation Controller Configuration Analytics Control BGP Clustering Controller XMPP BGP + Netconf XMPP Minion IP Fabric (Underlay Network) Minion Container s Docker & Kubelet Docker & Kubelet vrouter (L2 & L3) on replaces docker0 MPLS over GRE/UDP or VXLAN kube-minion-plugin and vrouter Kuberbetes proxy is removed Attaches containers veth-pair bridge between the container and pod s VRF in the vrouter (replacing the docker0 interface) 3
5 Benefits and Features Provides the ability to weave virtual overlay networks with heterogeneous environments that straddle private and public clouds, orchestration tools, and compute workload vehicles. Allows tenants to specify traffic selection criteria and the network function sequences to which selected traffic will be subjected a capability referred to as Service Function Chaining. Implements secure multitenancy for tenants utilizing containers and/or groups of containers, ensuring clear segmentation between tenants sharing the pooled infrastructure. Enforces security policies at every server host where containers are running by implementing a fully distributed firewall in the vrouter. Additional Information Product URL: sdn/contrail Contrail Sandbox: Contrail Package: downloads/?p=contrail About Juniper Networks Juniper Networks challenges the status quo with products, solutions and services that transform the economics of networking. Our team co-innovates with customers and partners to deliver automated, scalable and secure networks with agility, performance and value. Additional information can be found at Juniper Networks or connect with Juniper on Twitter and Facebook. Corporate and Sales Headquarters Juniper Networks, Inc Innovation Way Sunnyvale, CA USA Phone: 888.JUNIPER ( ) or Fax: APAC and EMEA Headquarters Juniper Networks International B.V. Boeing Avenue PZ Schiphol-Rijk Amsterdam, The Netherlands Phone: Fax: EXPLORE JUNIPER Get the App. Copyright 2016 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos and QFabric are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice EN May 2016
CONTAINERS AND MICROSERVICES WITH CONTRAIL
CONTAINERS AND MICROSERVICES WITH CONTRAIL Scott Sneddon Sree Sarva DP Ayyadevara Sr. Director Sr. Director Director Cloud and SDN Contrail Solutions Product Line Management This statement of direction
More informationService Automation Made Easy
Service Automation Made Easy Networks that know how to customize the network experience for every subscriber Challenge Service providers want to quickly develop and deliver personalized services their
More informationContrail Networking. Product Description. Data Sheet. Product Overview
Networking Product Overview Networking is a simple, open, and agile cloud network automation product that implements an SDN architecture. With its scale-out microservices architecture, orchestrate virtual
More informationJuniper Solutions for Turnkey, Managed Cloud Services
Juniper Solutions for Turnkey, Managed Cloud Services Three use cases for hosting and colocation service providers looking to deliver massively scalable, highly differentiated cloud services. Challenge
More informationInstant evolution in the age of digitization. Turn technology into your competitive advantage
Instant evolution in the age of digitization Turn technology into your competitive advantage It s easy to underestimate how far we ve come in such a relatively short space of time, and how much the world
More informationCONTRAIL NETWORKING. Product Description. Product Overview
Data Sheet CONTRAIL NETWORKING Product Description Enterprise IT is under increasing pressure to become agile and accelerate value to the business by adopting hybrid cloud architectures and delivering
More informationJUNIPER NETWORKS PRODUCT BULLETIN
PRODUCT BULLETIN JUNIPER NETWORKS PRODUCT BULLETIN Junos Pulse Mobile Security Suite 4.2 What s New for Enterprises and Service Providers Bulletin Date January 24, 2013 Bulletin Number 8000022 Applicable
More informationDeploying Data Center Switching Solutions
Deploying Data Center Switching Solutions Choose the Best Fit for Your Use Case 1 Table of Contents Executive Summary... 3 Introduction... 3 Multivector Scaling... 3 Low On-Chip Memory ASIC Platforms...4
More informationSoftware-Defined Secure Networks in Action
Software-Defined Secure Networks in Action Enabling automated threat remediation without impacting business continuity Challenge Businesses need to continuously evolve to fight the increasingly sophisticated
More informationContrail Cloud Platform Architecture
Contrail Cloud Platform Architecture Release 13.0 Modified: 2018-08-23 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, the Juniper
More informationTransit VPC Deployment Using AWS CloudFormation Templates. White Paper
Transit VPC Deployment Using AWS CloudFormation Templates White Paper Introduction Amazon Web Services(AWS) customers with globally distributed networks commonly need to securely exchange data between
More informationContrail Cloud Platform Architecture
Contrail Cloud Platform Architecture Release 10.0 Modified: 2018-04-04 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, the Juniper
More informationTopology-Independent In-Service Software Upgrades on the QFX5100
Topology-Independent In-Service Software Upgrades on the QFX5100 Juniper Innovation Brings ISSU to Data Center Top-of-Rack Switches 1 Table of Contents Executive Summary... 3 Introduction... 3 Leveraging
More informationJuniper Care Plus Advanced Services Credits
Juniper Care Plus Advanced Services Credits Service Overview Today s organizations are under constant pressure to meet dynamic market demands while increasing their return on investment. IT departments
More informationPolicy Enforcer. Product Description. Data Sheet. Product Overview
Policy Enforcer Product Overview Juniper s Software-Defined Secure Network (SDSN) platform leverages the entire network, not just perimeter firewalls, as a threat detection and security enforcement domain.
More informationExtending Enterprise Security to Public and Hybrid Clouds
Extending Enterprise Security to Public and Hybrid Clouds Juniper Security for an Ever-Evolving Market Challenge Enterprises are migrating toward public or hybrid clouds much faster than expected, creating
More informationJuniper Sky Enterprise
Juniper Sky Enterprise Product Overview Network complexity is growing exponentially. Traffic levels continue to rise thanks to the proliferation of mobile and Internet of Things (IoT) devices being connected
More informationOptimizing CloudEnabled Branch with. Juniper Services and Support. Protect and Ensure the Operational Success of Your Juniper Cloud-Enabled Branch
Optimizing CloudEnabled Branch with Juniper Services and Support Protect and Ensure the Operational Success of Your Juniper Cloud-Enabled Branch Cloud-Enabled Branch Solution Services Overview We live
More informationAutomated Control and Orchestration within the Juniper Networks Mobile Cloud Architecture. White Paper
Automated Control and Orchestration within the Juniper Networks Mobile Cloud Architecture White Paper October 2017 Juniper Networks Mobile Cloud Architecture Automated Control and Orchrestration Juniper
More informationCONFIGURING WEBAPP SECURE TO PROTECT AGAINST CREDENTIAL ATTACKS
APPLICATION NOTE CONFIGURING WEBAPP SECURE TO PROTECT AGAINST CREDENTIAL ATTACKS Protect your Web Applications from Brute Force Credential Attacks Using WebApp Secure and Intrusion Deception Technology
More informationSDSN: Dynamic, Adaptive Multicloud Security
SDSN: Dynamic, Adaptive Multicloud Security Evolving from firewall to user-intent for flexible in the cloud Challenge Legacy, which do not dynamically adapt to different workflows, must be individually
More informationCisco Cloud Application Centric Infrastructure
Cisco Cloud Application Centric Infrastructure About Cisco cloud application centric infrastructure Cisco Cloud Application Centric Infrastructure (Cisco Cloud ACI) is a comprehensive solution for simplified
More informationCluster Upgrade. SRX Series Services Gateways for the Branch Upgrade Junos OS with Minimal Traffic Disruption and a Single Command APPLICATION NOTE
APPLICATION NOTE Simple Chassis Cluster Upgrade SRX Series Services Gateways for the Branch Upgrade Junos OS with Minimal Traffic Disruption and a Single Command Copyright 2013, Juniper Networks, Inc.
More informationDisaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture. White Paper
Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
More informationOPEN CONTRAIL ARCHITECTURE GEORGIA TECH SDN EVENT
OPEN CONTRAIL ARCHITECTURE GEORGIA TECH SDN EVENT sdn-and-nfv-technical---georgia-tech---sep-2013---v2 Bruno Rijsman, Distinguished Engineer 24 September 2013 Use Cases 2 Copyright 2013 Juniper Networks,
More informationCisco Container Platform
Cisco Container Platform Pradnesh Patil Suhail Syed Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click
More informationEASILY DEPLOY AND SCALE KUBERNETES WITH RANCHER
EASILY DEPLOY AND SCALE KUBERNETES WITH RANCHER 2 WHY KUBERNETES? Kubernetes is an open-source container orchestrator for deploying and managing containerized applications. Building on 15 years of experience
More informationCloud-Enable the Enterprise with Junos Fusion
Cloud-Enable the Enterprise with Junos Fusion Simple, smart, flexible solution for managing the corporate network as a single, logical device 1 Table of Contents Executive Summary... 3 Introduction...
More informationNetwork Automation using Contrail Cloud (NACC)
Network Automation using Contrail Cloud (NACC) COURSE OVERVIEW: This five-day course is designed to provide students with the knowledge required to work with the Juniper Contrail software-defined networking
More informationOpenStack Networking: Where to Next?
WHITE PAPER OpenStack Networking: Where to Next? WHAT IS STRIKING IS THE PERVASIVE USE OF OPEN VSWITCH (OVS), AND AMONG NEUTRON FEATURES, THE STRONG INTEREST IN SOFTWARE- BASED NETWORKING ON THE SERVER,
More informationExploring Cloud Security, Operational Visibility & Elastic Datacenters. Kiran Mohandas Consulting Engineer
Exploring Cloud Security, Operational Visibility & Elastic Datacenters Kiran Mohandas Consulting Engineer The Ideal Goal of Network Access Policies People (Developers, Net Ops, CISO, ) V I S I O N Provide
More informationDEPLOY MODERN APPS WITH KUBERNETES AS A SERVICE
SOLUTION OVERVIEW DEPLOY MODERN APPS WITH KUBERNETES AS A SERVICE Cut Costs and Control Access with VMware Cloud PKS Digital transformation, the Internet of things, the growing popularity of public clouds,
More informationExtending Enterprise Security to Public and Hybrid Clouds
Extending Enterprise Security to Public and Hybrid Clouds Juniper Security for an Ever-Evolving Market Challenge Enterprises are increasingly migrating to public or hybrid deployments, creating an immediate
More informationDEPLOY MODERN APPS WITH KUBERNETES AS A SERVICE
SOLUTION OVERVIEW DEPLOY MODERN APPS WITH KUBERNETES AS A SERVICE Cut Costs and Control Access with VMware Kubernetes Engine Digital transformation, the Internet of things, the growing popularity of public
More informationJuniper Networks Live-Live Technology
Juniper Networks Live-Live Technology Increasing Resiliency 1 Table of Contents Executive Summary... 3 Introduction... 3 Resiliency Challenges... 3 Juniper s Live-Live Solution...4 Live-Live...4 How MoFRR
More informationSecuring Microservice Interactions in Openstack and Kubernetes
Securing Microservice Interactions in Openstack and Kubernetes Yoshio Turner & Jayanth Gummaraju Co- Founders @ Banyan https://www.banyanops.com Banyan Founded in the middle of 2015 In San Francisco, CA
More informationOpen Cloud Interconnect: Use Cases for the QFX10000 Coherent DWDM Line Card
Open Cloud Interconnect: Use Cases for the QFX10000 DWDM Delivering Scale, Security, and Resiliency to Metro, Regional, and Long-Haul Data Center Interconnect 1 Open Cloud Interconnect: Use Cases for the
More informationWELCOME. Chicago Juniper Users Group SEPT 18TH, 2013
WELCOME Chicago Juniper Users Group SEPT 18TH, 2013 THE SDN OPPORTUNITY James Kelly SDN PORTFOLIO & PARTNER MANAGEMENT SSD STRATEGY & MARKETING WHY SDN NOW? SOFTWARE TRENDS AND TECHNOLOGY DAMANDS + + Software
More informationJuniper JN0-410 Exam. Volume: 65 Questions. Question No: 1 What are two valid service VMs in a service chain? (Choose two.) A.
Volume: 65 Questions Question No: 1 What are two valid service VMs in a service chain? (Choose two.) A. gateway B. load balancer C. orchestrator D. firewall Answer: B,D Question No: 2 Which role does OpenStack
More informationMETAFABRIC ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER
METAFABRIC ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER APPLICATIONS ARE DRIVING IT TRANSFORMATION Virtualization Clouds SDN 2 Copyright 2013 Juniper Networks, Inc. TWO PROBLEMS WITH
More informationSDN TO BE OR NOT TO BE. Uwe Richter SE Director Russia/CIS, East and South East Europe
SDN TO BE OR NOT TO BE Uwe Richter SE Director Russia/CIS, East and South East Europe uwe@juniper.net FUNDAMENTAL PROBLEMS TO SOLVE Want more innovation in networking Want it more quickly too Want more
More informationJuniper Sky Advanced Threat Prevention
Juniper Sky Advanced Threat Prevention Product Overview Juniper Sky Advanced Threat Prevention is a cloud-based service that provides complete advanced malware protection. Integrated with SRX Series Services
More informationJuniper Networks Champion Program
Juniper Networks Champion Program (FAQs) Table of Contents General Requirements Benefits Getting Started Learning Academy Policies, Progressions, Rewards Juniper Partner Advantage Customer Support General
More informationJUNIPER OPTIMUM CARE SERVICE
SERVICE DESCRIPTION JUNIPER OPTIMUM CARE SERVICE Contents 1. Introduction...1 2. Eligibility and Purchasing....1 3. Service Features and Deliverable Description...1 4. End User Responsibilities...3 5.
More informationProduct Description. Architecture and Key Components OSS/BSS. VNF Element Management Systems VNF1 NFVI. Virtual Computing Red Hat.
Cloud Product Overview Since the inception of NFV, service providers have been trying to reap its business and operational benefits. However, the road to telco cloud is fraught with challenges, including
More informationWHITE PAPER. RedHat OpenShift Container Platform. Benefits: Abstract. 1.1 Introduction
WHITE PAPER RedHat OpenShift Container Platform Abstract Benefits: Applications are designed around smaller independent components called microservices. Elastic resources: Scale up or down quickly and
More informationJunos Genius FAQs. What is Junos Genius? How can I access the Junos Genius platform? What learning assets are available on Junos Genius?
What is Junos Genius? How can I access the Junos Genius platform? How do I download the Junos Genius app? What learning assets are available on Junos Genius? What are the Junos Genius subscription options?
More informationProject Calico v3.2. Overview. Architecture and Key Components. Project Calico provides network security for containers and virtual machine workloads.
Project Calico v3.2 Overview Benefits Simplicity. Traditional Software Defined Networks (SDNs) are complex, making them hard to deploy and troubleshoot. Calico removes that complexity, with a simplified
More informationCisco Cloud Services Router 1000V and Amazon Web Services CASE STUDY
Cisco Cloud Services Router 1000V and Amazon Web Services CASE STUDY CASE STUDY ADOBE 2 About Adobe Adobe Systems provides digital media and marketing solutions to customers around the world including
More informationANIKET DAPTARI & RANJINI RAJENDRAN CONTRAIL TEAM
ROLE OF NETWORK VIRTUALIZATION AND SOFTWARE DEFINED SECURITY IN MULTICLOUD ANIKET DAPTARI & RANJINI RAJENDRAN CONTRAIL TEAM This statement of direction sets forth Juniper Networks current intention and
More informationSoftware Defined. All The Way with OpenStack. T. R. Bosworth Senior Product Manager SUSE OpenStack Cloud
Software Defined All The Way with OpenStack T. R. Bosworth Senior Product Manager SUSE OpenStack Cloud Mark Darnell Senior Product Manager SUSE OpenStack Cloud Why Bother with Software Defined Infrastructure?
More informationSimplify Hybrid Cloud
Simplify Hybrid Cloud Innovate With Cloud Agility and Economics BEST PRACTICES GUIDE Organizations Are Looking To Embrace Hybrid IT for Improved Business Agility and Lower TCO In this digital age, leaders
More informationJUNIPER SKY ADVANCED THREAT PREVENTION
Data Sheet JUNIPER SKY ADVANCED THREAT PREVENTION Product Overview Juniper Sky Advanced Threat Prevention is a cloud-based service that provides complete advanced malware protection. Integrated with SRX
More informationby Cisco Intercloud Fabric and the Cisco
Expand Your Data Search and Analysis Capability Across a Hybrid Cloud Solution Brief June 2015 Highlights Extend Your Data Center and Cloud Build a hybrid cloud from your IT resources and public and providerhosted
More informationCONTRAIL SECURITY. Contrail Cloud Networking & Security
CONTRAIL SECURITY Aniket Daptari Sr. Product Manager Contrail Cloud Networking & Security Scott Sneddon Senior Director Cloud and SDN This statement of direction sets forth Juniper Networks current intention
More informationK8s(Kubernetes) and SDN for Multi-access Edge Computing deployment
K8s(Kubernetes) and SDN for Multi-access Edge Computing deployment Open Source Summit Japan 2017.06.02 Red Hat Hyde SUGIYAMA Senior Principal Technologist NFV SDN ICT Red Hat APAC Office of Technology
More informationJN0-210.juniper. Number: JN0-210 Passing Score: 800 Time Limit: 120 min.
JN0-210.juniper Number: JN0-210 Passing Score: 800 Time Limit: 120 min Exam A QUESTION 1 Which protocol does Juniper Networks recommend to provide real-time updates of the network topology to the NorthStar
More informationEnabling Network Automation with Junos OS
Enabling Network Automation with Junos OS Product Overview The Junos operating system is a secure, open, and programmable network OS that enables network automation at scale. As the core component of Juniper
More informationJuniper Unite Cloud-Enabled Enterprise Reference Architecture
Juniper Unite Cloud-Enabled Enterprise Reference Architecture Achieving agility by simplifying and securing the enterprise network Challenge The enterprise network is no longer just a business necessity.
More informationJUNIPER NETWORKS VIRTUAL CHASSIS FABRIC TECHNOLOGY
White Paper JUNIPER NETWORKS VIRTUAL CHASSIS FABRIC TECHNOLOGY A Fast, Flat Network for Medium-Sized and Large Data Centers Copyright 2014, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3
More informationSTRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
More informationTEN LAYERS OF CONTAINER SECURITY
TEN LAYERS OF CONTAINER SECURITY Tim Hunt Kirsten Newcomer May 2017 ABOUT YOU Are you using containers? What s your role? Security professionals Developers / Architects Infrastructure / Ops Who considers
More informationAccelerating Contrail vrouter
WHITE PAPER Accelerating Contrail vrouter WHEN DEPLOYED WITH THE JUNIPER NETWORKS CONTRAIL CLOUD NETWORKING PLATFORM, THE NETRONOME AGILIO VROUTER SOLUTION DELIVERS ACCELERATED PERFORMANCE THAT ENABLES
More informationCasa Systems Axyom Software Platform
Solution Brief Casa Systems Axyom Software Platform Over the last few years and continuing through the next decade, all broadband networks will be transformed by Network Functions Virtualization (NFV)
More informationUse Case Brief BUILDING A PRIVATE CLOUD PROVIDING PUBLIC CLOUD FUNCTIONALITY WITHIN THE SAFETY OF YOUR ORGANIZATION
Use Case Brief BUILDING A PRIVATE CLOUD PROVIDING PUBLIC CLOUD FUNCTIONALITY WITHIN THE SAFETY OF YOUR ORGANIZATION At many enterprises today, end users are demanding a powerful yet easy-to-use Private
More informationTRANSFORM YOUR NETWORK
TRANSFORM YOUR NETWORK SIMPLIFY MODERNIZATION WITH AN INNOVATIVE ECOSYSTEM OF CERTIFIED SOLUTIONS AND PARTNERS TELECOMMUNICATIONS ECOSYSTEM E-BOOK TABLE OF CONTENTS Adapt to growing network demand...3
More informationNuage Networks Product Architecture. White Paper
Nuage Networks Product Architecture White Paper Table of Contents Abstract... 3 Networking from the Application s Perspective... 4 Design Principles... 4 Architecture... 4 Integrating Bare Metal Resources...
More informationProject Calico v3.1. Overview. Architecture and Key Components
Project Calico v3.1 Overview Benefits Simplicity. Traditional Software Defined Networks (SDNs) are complex, making them hard to deploy and troubleshoot. Calico removes that complexity, with a simplified
More informationOpendaylight: Enabling 5G through Cloud Native Telco Architecture Edgar Lombara Lumina Networks Inc.
Bay Area Opendaylight: Enabling 5G through Cloud Native Telco Architecture Edgar Lombara Lumina Networks Inc. Agenda Key drivers for 5G 5G and Cloud native Edge Cloud Core Cloud Microservices building
More informationWhite Paper. Why Remake Storage For Modern Data Centers
White Paper Why Remake Storage For Modern Data Centers Executive Summary Managing data growth and supporting business demands of provisioning storage have been the top concern of IT operations for the
More informationBROCADE CLOUD-OPTIMIZED NETWORKING: THE BLUEPRINT FOR THE SOFTWARE-DEFINED NETWORK
BROCADE CLOUD-OPTIMIZED NETWORKING: THE BLUEPRINT FOR THE SOFTWARE-DEFINED NETWORK Ken Cheng VP, Service Provider and Application Delivery Products September 12, 2012 Brocade Cloud-Optimized Networking
More informationFROM SDN TO CLOUD NETWORKING. Bob Muglia EXECUTIVE VICE PRESIDENT, SOFTWARE SOLUTIONS DIVISION
FROM SDN TO CLOUD NETWORKING Bob Muglia EXECUTIVE VICE PRESIDENT, SOFTWARE SOLUTIONS DIVISION TODAY S REALITY Instability & Constant Change 10 % of CEOs feel confident in their ability to plan for growth
More informationSolution Overview Cisco Tetration Analytics and AlgoSec: Business Application Connectivity Visibility, Policy Enforcement, and Business-Based Risk and
Solution Overview Cisco Tetration Analytics and AlgoSec: Business Application Connectivity Visibility, Policy Enforcement, and Business-Based Risk and Compliance Management Through the integration of AlgoSec
More informationDELL EMC TECHNICAL SOLUTION BRIEF
DELL EMC TECHAL SOLUTION BRIEF ARCHITECTING A CLOUD FABRIC WHEN DEPLOING VIRTUALIZATION OVERLAS Version 2.0 Author: VICTOR LAMA Dell EMC Networking SE May 2017 Architecting a Data Center Cloud Fabric:
More informationFROM CLOUD TO MULTICLOUD
White Paper FROM CLOUD TO MULTICLOUD A Guide to Battling Complexity in Enterprise Network Design and Operation TABLE OF CONTENTS Introduction...3 Cloud Becomes Multicloud...3 Agility, Not Cost...3 Agility
More informationK8s(Kubernetes) and SDN for Multi-access Edge Computing deployment
K8s(Kubernetes) and SDN for Multi-access Edge Computing deployment Open Source Summit 2017.06.02 Red Hat Hyde SUGIYAMA Senior Principal Technologist NFV SDN ICT Red Hat APAC Office of Technology AGENDA Multi-access
More informationOverview of the Juniper Networks Mobile Cloud Architecture
Overview of the Juniper Networks Mobile Cloud Architecture Laying the Foundation for a Next-Generation Secure Distributed Telco Cloud White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale,
More informationJuniper Care Plus Services
Juniper Care Plus Services Service Overview In today s dynamic marketplace, organizations are under constant pressure to meet market demand while maintaining or increasing return on investment. IT departments
More informationCisco Application Centric Infrastructure
Data Sheet Cisco Application Centric Infrastructure What s Inside At a glance: Cisco ACI solution Main benefits Cisco ACI building blocks Main features Fabric Management and Automation Network Security
More informationWeiterentwicklung von OpenStack Netzen 25G/50G/100G, FW-Integration, umfassende Einbindung. Alexei Agueev, Systems Engineer
Weiterentwicklung von OpenStack Netzen 25G/50G/100G, FW-Integration, umfassende Einbindung Alexei Agueev, Systems Engineer ETHERNET MIGRATION 10G/40G à 25G/50G/100G Interface Parallelism Parallelism increases
More information2018 Cisco and/or its affiliates. All rights reserved.
Beyond Data Center A Journey to self-driving Data Center with Analytics, Intelligent and Assurance Mohamad Imaduddin Systems Engineer Cisco Oct 2018 App is the new Business Developer is the new Customer
More informationKubernetes made easy with Docker EE. Patrick van der Bleek Sr. Solutions Engineer NEMEA
Kubernetes made easy with Docker EE Patrick van der Bleek Sr. Solutions Engineer NEMEA Docker Enterprise Edition is More than Containers + Orchestration... DOCKER ENTERPRISE EDITION Kubernetes integration
More informationVirtualization to Transform Service Provider Business and Operational Economics
Virtualization to Transform Service Provider Business and Operational Economics Enabling Agile Service Innovation 1 Table of Contents Executive Summary... 3 Introduction: The Challenge at the Network Edge...
More informationRed Hat OpenStack Platform 10 Red Hat OpenDaylight Product Guide
Red Hat OpenStack Platform 10 Red Hat OpenDaylight Product Guide Overview of Red Hat OpenDaylight OpenStack Team Red Hat OpenStack Platform 10 Red Hat OpenDaylight Product Guide Overview of Red Hat OpenDaylight
More informationFROM A RIGID ECOSYSTEM TO A LOGICAL AND FLEXIBLE ENTITY: THE SOFTWARE- DEFINED DATA CENTRE
FROM A RIGID ECOSYSTEM TO A LOGICAL AND FLEXIBLE ENTITY: THE SOFTWARE- DEFINED DATA CENTRE The demand for cloud infrastructure is rapidly increasing, the world of information is becoming application and
More informationCisco ACI vpod. One intent: Any workload, Any location, Any cloud. Introduction
Cisco ACI vpod One intent: Any workload, Any location, Any cloud Organizations are increasingly adopting hybrid data center models to meet their infrastructure demands, to get flexibility and to optimize
More informationTitle DC Automation: It s a MARVEL!
Title DC Automation: It s a MARVEL! Name Nikos D. Anagnostatos Position Network Consultant, Network Solutions Division Classification ISO 27001: Public Data Center Evolution 2 Space Hellas - All Rights
More informationIntroduction. Delivering Management as Agile as the Cloud: Enabling New Architectures with CA Technologies Virtual Network Assurance Solution
Delivering Management as Agile as the Cloud: Enabling New Architectures with CA Technologies Virtual Network Assurance Solution Introduction Service providers and IT departments of every type are seeking
More informationMerging Enterprise Applications with Docker* Container Technology
Solution Brief NetApp Docker Volume Plugin* Intel Xeon Processors Intel Ethernet Converged Network Adapters Merging Enterprise Applications with Docker* Container Technology Enabling Scale-out Solutions
More informationWhite Paper. Juniper Networks Cloud Security
Juniper Networks Cloud Security 1 Table of Contents Executive Summary... 3 Introduction Cloud Computing Overview... 3 Private Cloud...4 Public Cloud...4 Hybrid Cloud...4 Evolution in Data Center Technologies
More informationArchitectural overview Turbonomic accesses Cisco Tetration Analytics data through Representational State Transfer (REST) APIs. It uses telemetry data
Solution Overview Cisco Tetration Analytics and Turbonomic Solution Deploy intent-based networking for distributed applications. Highlights Provide performance assurance for distributed applications. Real-time
More informationCisco CloudCenter Solution with Cisco ACI: Common Use Cases
Cisco CloudCenter Solution with Cisco ACI: Common Use Cases Cisco ACI increases network security, automates communication policies based on business-relevant application requirements, and decreases developer
More informationENHANCE APPLICATION SCALABILITY AND AVAILABILITY WITH NGINX PLUS AND THE DIAMANTI BARE-METAL KUBERNETES PLATFORM
JOINT SOLUTION BRIEF ENHANCE APPLICATION SCALABILITY AND AVAILABILITY WITH NGINX PLUS AND THE DIAMANTI BARE-METAL KUBERNETES PLATFORM DIAMANTI PLATFORM AT A GLANCE Modern load balancers which deploy as
More informationCloud Deployment Scenarios
Cloud Deployment Scenarios Preface List the four major cloud deployment types Describe the features of private, public, hybrid, and community clouds List some additional cloud deployment types Select the
More informationCloudVision Macro-Segmentation Service
CloudVision Macro-Segmentation Service Inside Address network-based security as a pool of resources, stitch security to applications and transactions, scale on-demand, automate deployment and mitigation,
More informationSeven Key Considerations Before Your Upcoming F5 or Citrix Load Balancer Refresh
Seven Key Considerations Before Your Upcoming F5 or Citrix Load Applications in your data center, and your IT operations, demand agile, cost-effective load balancing solutions. Traditional ADC (application
More informationPUBLIC AND HYBRID CLOUD: BREAKING DOWN BARRIERS
PUBLIC AND HYBRID CLOUD: BREAKING DOWN BARRIERS Jane R. Circle Manager, Red Hat Global Cloud Provider Program and Cloud Access Program June 28, 2016 WHAT WE'LL DISCUSS TODAY Hybrid clouds and multi-cloud
More informationJUNIPER NETWORKS AND AEROHIVE NETWORKS: CLOUD- ENABLED SOLUTIONS FOR THE ENTERPRISE
Solution Brief JUNIPER NETWORKS AND AEROHIVE NETWORKS: CLOUD- ENABLED SOLUTIONS FOR THE ENTERPRISE Cloud-managed wired and wireless solutions for today s multicloud enterprise Challenge Enterprises are
More informationFlip the Switch to Container-based Clouds
Flip the Switch to Container-based Clouds B I L L B O R S A R I D I R E C T O R, S Y S T E M S E N G I N E E R I N G 1 November 2017 1 2017 Datera Datera at a Glance Founded 2013 Smart storage for clouds
More informationWIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS
WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS Carrier networks are undergoing their biggest transformation since the beginning of the Internet. The ability to get to market quickly and to respond to
More information