You are on page 1of 22

Building the Thin Branch

Trevor Dearing

Copyright © 2004 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

1

Current deployment trends
Home

2005 62% of companies have mobile workers
IDC

Application deployment

2003 85% of employees in Branch 2005 91% of employees in Branch
Nemertes Research Branch or remote office

Copyright © 2004 Juniper Networks, Inc.

Proprietary and Confidential

www.juniper.net

2

Proprietary and Confidential www.net 3 . Inc.juniper.Current deployment trends Home 2005 62% of companies have mobile workers IDC Resources Software Clients E-mail Storage 2003 85% of employees in Branch 2005 91% of employees in Branch Nemertes Research Branch or remote office Copyright © 2004 Juniper Networks.

Inc.Branch Variation Micro Branch Thin Branch Managed network Regional branch Private MPLS network Copyright © 2004 Juniper Networks.net 4 . Proprietary and Confidential www.juniper.

Inc.net 5 .Traditional islands of voice Micro Branch PSTN Thin Branch Centrex Managed network Regional branch Key system Private MPLS network HQ PBX Copyright © 2004 Juniper Networks. Proprietary and Confidential www.juniper.

Inc.juniper. Proprietary and Confidential www.net 6 .Corporate wide IP Telephony Micro Branch Thin Branch Managed network Regional branch Private MPLS network Copyright © 2004 Juniper Networks.

Inc. Proprietary and Confidential www.net 7 .The Traditional Branch Support costs Support costs Facilities costs ATM Support costs Support costs Copyright © 2004 Juniper Networks.juniper.

Inc. Proprietary and Confidential www.Building the Thin Branch Reduced equipment costs Reduced support costs Reduced power consumption Extra flexibility Branch Offices  Implement web based applications  Deploy centralised IP Telephony  Consolidate e-mail servers Datacentre Copyright © 2004 Juniper Networks.net 8 .juniper.

Inc.net 9 .juniper. Proprietary and Confidential www.If it were only that simple! Adding extra protocols Branch Offices      HTTP web traffic generates 10x traffic of client server E-mail and server centralisation generate latency issues IP Telephony signalling creates extra traffic Voice requires low latency New security challenges Datacentre Copyright © 2004 Juniper Networks.

Recent Breach New User Constituencies Changing attitude to risk Regulation/Compliance Consolidation Demanding Applications Pain Application Rollout Fixing What Was Broken Last time Budgetary Pressure Project Portfolio Product Copyright © 2004 Juniper Networks.juniper.net 10 . Proprietary and Confidential www. Inc.

Proprietary and Confidential www. Inc.net 11 .juniper.Agents of Catastrophe Bad People Careless People Copyright © 2004 Juniper Networks.

Attitudes to Risk and the Good-Enough Gap Good-enough Gap Level of Security Actually Inadequate Investment in Security Copyright © 2004 Juniper Networks.juniper.net 12 . Inc. Proprietary and Confidential www.

net 13 . Inc. Proprietary and Confidential www.It’s All About Applications Bandwidth App performance Web-enabled = 10x bandwidth Branch 1 New apps Server consolidation VoIP QoS HQ Data replication Branch 2 Data Center Copyright © 2004 Juniper Networks.juniper.

Inc. Proprietary and Confidential www.The WAN Impacts Applications Impact on applications More rich content Lower-priority applications slow down critical ones Inability to understand application and WAN performance Protocol chattiness Copyright © 2004 Juniper Networks.juniper.net 14 .

Proprietary and Confidential www.net 15 .Bandwidth Copyright © 2004 Juniper Networks. Inc.juniper.

net 16 .Latency Copyright © 2004 Juniper Networks.juniper. Inc. Proprietary and Confidential www.

Proprietary and Confidential www.File Services — The Challenge  CIFS transfers files in small data chunks. Inc.net 17 . needs an ACK for each  Creates the “ping-pong” effect WAN Windows Clients ack ack ack ack Windows ack Server Copyright © 2004 Juniper Networks.juniper.

juniper. Proprietary and Confidential www. Inc.net 18 .Solution WAN Copyright © 2004 Juniper Networks.

juniper. Proprietary and Confidential www.File Services — with application acceleration  Devices pipeline files across the WAN  Files are then served to the client at LAN speeds WAN Windows Clients Windows Server Copyright © 2004 Juniper Networks.net 19 . Inc.

net 20 .juniper. Proprietary and Confidential www.Visibility & Reporting Application Manager Business Executive Capacity Planner Network Manager Customer View into Service Levels Network Operations Center/ Customer Care/Help Desk Copyright © 2004 Juniper Networks. Inc.

Copyright © 2005 Proprietary and Confidential www.Branch traffic processing Speed response time & reduce Latency • 5x to 10x average • 50x peak (Exchange. WAN. QoS. Inc. FW Ensure application delivery • MPLS.juniper. file services) Provide full visibility •Reporting on apps.net 21 . bandwidth allocation. Multipath Increase WAN bandwidth • 2x to 4x average compression • 20x peak compression 2004 Juniper Networks.