SlideShare a Scribd company logo
1 of 61
Y OUR B USINESS F UTURE
T ODAY
   Business Session 11:00am – 12:30pm
A GENDA          Activity Based Working
                 Unified Communications
                     Demo
                 Windows 8 Devices
                 Cloud Services
                     Office 365
                     IaaS


             Technical Session 1:00pm – 2:30pm
                 BYOD
                 Network infrastructure
                     Wireless
                     Secure Remote Access
                     Policy and Control
H OW, W HEN , AND W HERE WE
                                 W ORK

•   Work Life Balance has become Work Life Integration
•   Work from home
•   Mobile work force
•   Collaborative environments and technologies
A CTIVITY B ASED
       W ORKING
               Microsoft - Sydney
A CTIVITY B ASED
       W ORKING
               Microsoft - Brisbane
A CTIVITY B ASED   Macquarie Group - Sydney

       W ORKING
A CTIVITY B ASED
       W ORKING
               CBA – Darling Harbour
A CTIVITY B ASED
       W ORKING
                   “Everyone uses a laptop, and the
                   space has no fixed phones at all,
                   with Microsoft’s Enterprise Voice
                   solution providing converged
                   telephony and messaging that is
                   delivered to a person, not a desk.”
A CTIVITY B ASED   “Activity Based Working is about
       W ORKING
                   People, Place, and Technology”

                   Technology Enablers

                      Unified Communications & Collaboration
                      Client devices
                      Wireless
                      Internet & WAN services
                      Secure remote access
                      Cloud Services
                      Location Services
L OCATION B ASED S ERVICES
A CTIVITY B ASED   The Benefits

       W ORKING
                    Customer Satisfaction and
                      Responsiveness
                    Mobility and flexibility
                    Sustainability and carbon reduction
                    Competitive advantage
                    Disaster recovery
                    Staff retention
                    Cost Savings in real estate and staff churn
Future of Communications
Communications Today
   Instant                             Video                                       Web                  E-mail and          Audio
Messaging (IM)      Voice Mail      Conferencing           Telephony            Conferencing            Calendaring      Conferencing




                                      Telephony                                        Instant
                                                                       Unified        Messaging
                                         and
                                      Voice Mail      E-mail and    Conferencing:
                                                      Calendaring   Audio, Video,
                                                                        Web




                                     Authentication                                 Authentication
  Authentication                                                                                                          Authentication
                                     Administration                                 Administration
  Administration                                                                                                          Administration
                                        Storage                                        Storage
     Storage                                                                                                                 Storage



                   Authentication                         Authentication
                                                                                                        Authentication
                                                       Authentication
                   Administration                         Administration
                                                                                                        Administration
                      Storage                          Administration
                                                           Storage
                                                                                                           Storage
                                                            Storage
                                                         Compliance


                   On-Premises                              Hybrid                                   In the Cloud
M ICROSOFT U NIFIED
                                             C OMMUNICATIONS

    Messaging           Voicemail            Telephony           IM & Presence           Collaboration
Achieve higher      Consolidate email    VoIP solution that    Contact based on        Switch seamlessly
reliability and     and voicemail onto   allows users to       presence via phone,     between audio,
performance and     one inbox.           communicate via PC,   video or application.   video and web
enhance your                             desk phone or                                 conferencing.
communications at                        mobile.
lower cost.
                                         On-Premise Solution




                                            Cloud Solution
T HE M ODERN W ORK
             P LACE
                 Demo
W INDOWS 8 D EVICES
O FFICE 365
O FFICE 365


  E4 Plan with Voice: $36.85
I AA S
H OW CAN A CTIVITY B ASED W ORKING
CONCEPTS DRIVE POSITIVE CHANGE
FOR YOUR BUSINESS ?
Free Business Productivity Analysis
S PECIAL O FFER
                  Generation-e’s MBA qualified business expert will
                  spend one day onsite with you, helping you
                  understand your IT infrastructure capabilities and
                  building a roadmap with an actionable plan for
                  embracing the technologies we’ve spoken about
                  today to evolve your business and build your
                  competitive advantage.
                     Normally valued at $3,000 – Free for attendees

                  Don’t Forget:
                  You will be emailed a feedback
                  survey after this event. Please
                  complete it to be registered to win
                  a Microsoft Surface.
B REAK
BYOD

• Scope
• Budget
• Device Support
• Security
• Application
  accessibility
• Network Access
SIMPLY CONNECTED FOR UC&C
WITH MICROSOFT LYNC
October 2012
UC&C MARKET TRENDS AND ISSUES
Legacy IT environment is based on control                                       Available Applications



                                                                                Available Applications


      Office Employee                                           HIGH
     Any time/ location                                     PERFORMANCE
                                                                HIGH
                                                              NETWORK
                                                            PERFORMANCE
                                                                                    POS, ERP, PBX
                                                                                  Email, CRM, ERP, HR
                                                               NETWORK
                                                              USER DRIVEN
                                                              (purpose built)
                                                                                      IT App
                                                                INTERNET
                                                               (best effort)
                                                                                       3rd Party

          BYOD                                                                      POS, ERP, PBX

                                                                                      IT App
      Paradigm shift – occurring on both ends, devices and applications
                                                                                        Social
      Network’s role needs to step up significantly to meet new challenges


24              Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
JUNIPER’S SIMPLY CONNECTED FOR UC&C




                        UC&C Infrastructure and Applications


                            High Performance, Resilient, Open



      Data                                                                         Remote
                           Campus                                 WAN     Branch
     Center                                                                         User

25            Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
THE GOAL IS TO BE SIMPLY CONNECTED
                                                 Simplified switching                     Wired-like experience on
                                                  architecture, now a                     wireless – resiliency and
                                             complete, feature-rich portfolio                   performance
      Simple for users
        Simple for IT

                                                                             EX Series    WL Series

        Superb QoE
      Highly economic



  Integrated security                                                        SRX Series
 Always on resiliency
   High performance
Simplified architecture
      Automation                                  Security follows user, and              Device-agnostic secure
                                                   application intelligence                    connectivity



 26              Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
Agenda

     Reference Architecture For UC&C



     Network Resiliency (Wireless & Wired)



     Wireless Network Congestion & CAC



     Network Access and Policy Control



     Secure Remote Access and Integration

27        Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
REFERENCE ARCHITECTURE – UC&C
28      Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
NETWORK REFERENCE ARCHITECTURE FOR UC&C




29    Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
KEY REQUIREMENTS OF A UC&C NETWORK


                                                           Open


                                                       Reliable


                                                        Secure


                                                      Scalable

30    Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
UNIFIED COMMUNICATIONS INTEROPERABILITY
    FORUM
   Non profit vendor alliance formed in April 2010
   Open to all UC hardware, software vendors, service providers
    and network operators
   Mission - To enable interoperability of UC scenarios based on
    existing standards




    31         Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
NETWORK RESILIENCY & RELIABILITY
32       Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
COMPONENTS OF A JUNIPER WIRELESS LAN (WLAN)

     Access Point                                         WLAN Controller                    WLAN Management


                                                                 Wireless LAN
                                                                 CONTROLLER
                                                                    (WLC)



                                                                                                  WLAN
                                                                                                Management
                                                                     Campus
                                                                      Core       Firewall
                                         MAG
        Encrypted

                                                Access
                                                                                (Location)
                                                                                WLM1200
         802.1x
     Authentication

            Trusted
             Client



33              Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
SINGLE POINT OF MANAGEMENT FOR ALL
CONTROLLERS




                                                                    Primary Seed




                                                                   Secondary Seed



                                       Member                         Member        Member




34     Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
HOW THE CLUSTER ADDS A NEW CONTROLLER
                                                                            The seed pushes the     2
 1                                                                          configuration to the
         The primary controller                                                new member
      pushes configurations to the
     secondary seed and members



                                                                             Primary Seed




                                                                            Secondary Seed



                                                Member                         Member              Member


                                                                                 
 3                                                                             Member
     When a member is removed
       and replaced the same
          process is used


35              Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
HOW THE CLUSTER ADDS A NEW AP                                                                                                2
                                                                                                The Primary Seed sends AP
 1                                                                                            config to the Primary controller
     A new AP is introduced and                                                               and the AP sets up a connection
     contacts the Primary Seed.




                                                                              Primary Seed




                                                                             Secondary Seed



                                                 Member                         Member           Member




          3                                                                     Member
              The Primary Seed sends AP config
              to the Secondary controller and the
                    AP sets up a connection


36               Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
HOW CLIENTS ARE ASSIGNED PRIMARY AND
SECONDARY CONTROLLERS
                                                                            2
                              Primary controller
                                authenticates/                                                 3
                               authorizes client
                                                                                                    Primary propagates
                                                                                                     session details to
                                                                                                     backup controller
                                                                                                   for use during failure
                                                                                Primary Seed


                      Client
                     Session
                      State
                                                                            Secondary Seed



                                                Member                            Member              Member
                                                                                   Client
                                                                                  Session
                                                                                   State
1
     A new client associates
         to the system



37              Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
SELF-REPAIRING CONTROL ARCHITECTURE
 1
        Should the Primary be
       taken out of service, the
       Secondary immediately
              takes over


                                                                               Primary Seed




                                                                              Secondary Seed


                                                      
                                                  Member                         Member        Member




38                Copyright © 2012 Juniper Networks, Inc.   www.juniper.net

     • AP Re-homes to backup Member Controller..
NONSTOP OPERATION
                                                                                                    HITLESS
                                                                                                   FAILOVER



                                                                                 2
                                                                                        A new Secondary is
                                                                                     designated and is given the
                                                                                        AP configuration and
                                                                  Primary Seed
                                                                                         client session state



                                                                 Secondary Seed



                                                                     Member               Member




39
     • Primary-Seed identifies & updates 3www.juniper.net
                  Copyright © 2012 Juniper Networks, Inc. rd controller (WLC)

       as new Backup Member for AP/Client Session State.
IN-SERVICE SOFTWARE UPGRADE
                                                                                                               HITLESS
                                                                                     1                        UPGRADE
                    Primary Controller initiates upgrade
                        sequence; passes control to
                         Secondary and upgrades
                                                                                               2
                                                                                                   Secondary passes control
                                                                                                     back to Primary and
                                                                                                          upgrades
                                                                               Primary Seed




                                                                              Secondary Seed



                                                  Member                         Member              Member




                                                                                 3
4                                                                                   Primary Seed coordinates individual
     AP moves associated stations                                                 member upgrades; Member moves APs to
     to alternate AP then upgrades                                                    backup controller and upgrades


40                Copyright © 2012 Juniper Networks, Inc.   www.juniper.net

      • Leverage Hitless Failover Functionality to provide ISSU..
LOCAL SWITCHING IMPROVED PERFORMANCE

         Anchored Mobility – Basic Roaming                                              Smart Mobile - Seamless Mobility

                                                                                                       Mobility
     Controller A                                        Controller B               Controller A       Domain                   Controller B



                   Subnet 1                  Subnet 2                                                               Subnet 2
                                                                                            Subnet 1




                                           Client A on                                                            Client A on
                                            Subnet 1                                                               Subnet 1

     Client A on                                            Client B on             Client A on                                  Client B on
      Subnet 1                                               Subnet 1                Subnet 1                                     Subnet 1




41                      Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
VIRTUAL CHASSIS
SIMPLIFYING THE NETWORK


                                                                          Virtual Chassis


                                                                   Multiple switches acting as
                                                                   a single, logical device


                                                                   One switch to configure,
                                                                   one switch to manage


                                                                   Improved resiliency
                                                                   and performance

                                                                   • No Single Points of Failure.

42     Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
DISTRIBUTED SWITCHING



                                                                         Master
                                                                         Backup


                                                                             A
     VCP                                                                          Local Switching
     Links
                                                                             B



                                                                             C    Inter-Module
                                                                                  Switching
                                                                             D


43           Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
L2 and L3 STATEFUL FAILOVER
                                                              EX4500VC
       FAIL OVER
        IN SUB-50                                                                                 Internet/Data
                                                                                                   EX-SW3 immediately
     MILLISECONDS!                                                                                switches to backup path
                                                                                                      Center

     WLC2                                                                                                        WLC1

                                  0                                                           5
                     Line card – EX4200                                                 Line card – EX4200
                                                                  All traffic is re-routed
                                  1
                    Master RE – EX4200
                                                                                             4
                                                                                    Backup RE – EX4200            AP1
                                  2                                                           3
                     Line card – EX4200                                              Line card – EX4200


                                                                                                   Normal traffic flow
         EX-SW4 fails and EX-SW5
          and EX-SW3 detect VC
          port to EX-SW4 is down



44                Copyright © 2012 Juniper Networks, Inc.   www.juniper.net

     • Switch Failure & Re-Routing via Backup VCP-Path.                           New BackUp RE chosen.
WIRELESS NETWORK CONGESTION
     AND CALL ADMISSION CONTROL
45      Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
WIFI MULTIMEDIA ACCESS CATEGORIES




                                                     Packet prioritization
                                                     applied to tunneled
                                                            traffic



               AP and controllers                                              Wired priority is
             classify and mark user                                          mapped to 4 X WMM
                      traffic                                                access categories for
                                                                               over-the-air QoS




46     Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
DYNAMIC CALL ADMISSION CONTROL

                                                                     8 voice devices
                                                                   associated but idle




                                                                                   2 active calls




                                                                                   New client
                                                                               session accepted!

                                                                     Roaming user
                                                                   session accepted!

                     Roam accepted
                     call preserved!


47     Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
AUTOMATIC CLIENT LOAD BALANCING

      Automatic Load
     Balancing per RF
          Band




      Band Steering                                                      5 GHz capable
                                                                         client
                                                                         ‘encouraged’ to
                                                                         connect at 5 GHz


                                                                         2.4 GHz only client
                                                                         connects at 2.4 GHz


48           Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
NETWORK ACCESS & POLICY CONTROL
49      Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
OVERVIEW – COORDINATED THREAT CONTROL

                                                                           Wireless LAN
                                                                            Controller
                                                                                                       Active Directory/
                                                                                                            LDAP




                                                                                                             Data


  Junos                                                                            Router
Pulse Client                                                                           IPS
                                                                                    Firewall
                                                                                        SRX
                                                                                 Router/Firewall/IPS
                                                                                                            Finance
           Wireless AP’s

                                                                                                             Video
                                 Ethernet access                           Ethernet core
                                     switches                                 Universal
                                                                             switches
                                                                              Access                        Apps
                                                                              Control
                                                                             RADIUS
                                                                             SSLVPN             Corporate Data Center


                                                                               MAG                        Internet


50             Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
ESTABLISHING A WIRELESS CONNECTION

                                                                                                                        3
     1                                                                               5                                  WLC sends information
        Smartphone start                                                         WLC sends user policy                    to Radius Server
      802.1x authentication            2                                           information to AP
              to AP                                                               VLAN, ACLs, QoS
                                     AP sends Authorization
                                         request to WLC
                                                                                                                                  SRX with
                                                                                                                  WLC          IDP/AppSecure



                                                                                                                                       Corporate
                                                                                                                                          Data
                                                                                                                                         Center
       Wireless User                 AP            EX Series                                                                EX Series
     Tablet/smartphone
                                                                      6
                            7                AP sets User policies
                                                                                         4
          Smartphone                          VLAN, QoS, ACL’s
                                                Wireless Data                             Radius Server sends
       devices on WLAN                                                                                                       MAG with
                                                  Encrypted                                 username/pass to
     IP addresses received                                                                                                Radius, SSLVPN
                                                                                         Active Directory/LDAP
           via DHCP                                                                                                      and UAC modules
                                                                                           for validation. Then
                                                                                          sends user policy to
                                                                                                   WLC


51                       Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
NETWORK ACCESS AND POLICY CONTROL

                                                               SRX AppTrack feature


     1                                     2
                                                                 combined with MAG
                                                                data collects per user
                                                               application information
                                                                                                                                
                                                                                                                  Active Directory
                                              DHCP Server         providing detailed                                   /LDAP


                                                                                                                                
     Device authenticated               communicates User and      reports in STRM
     on wireless network                 IP information to MAG
                                               via IF-MAP
                                                                                               WLC
                                                                                                                       Data


                                                                                                     SRX
                                                                                                                               
                                                                                                                      Finance




  Wireless User            AP                  EX Series
                                                                                                                                
                                                                                                                       Video
Tablet/smartphone

                                                                                               DHCP and
                                                                                                IF-MAP                          
                                                                                                                       Apps
                    5             4                                    3                       MAG         Corporate Data Center
    SRX AppSecure                 SRX enforces user
Polices block non-work          policies allowing user                MAG pushes role based
                                                                                                                 
                                                                                                                                
 related applications             basic access to all                 ACL and FW policies to
 like Hulu and Netflix          servers except finance                     EX and SRX                               Internet


52                  Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
ENFORCING NETWORK ACCESS POLICIES


1                     2                             3
Pulse detects         During 802.1x
                      authentication.
                                                     Compliance check
                                                     fails. Antivirus
                                                                                                                                         
                                                                                                                          Active Directory
device is on                                         signatures are out                                                        /LDAP
corporate             MAG verifies                   of date and user
                                                                                                                                         
                      PC meets                                                    SRX AppTrack feature
network and                                          is quarantined to
                      company                                                     combined with MAG
per user policy                                      remediation VLAN.
                      software and                   Patch server                 data collects per user                       Data
disables any
                      security policy                updates signatures.          application information
active VPN
sessions
              Virus
                      requirements                   User is now in
                                                     compliance and
                                                                                  providing detailed
                                                                                  reports in STRM
                                                                                                    WLCs
                                                                                                                                         
             SW too                                  granted network                                                         Finance
               old                                   access                                                       SRX

                                                                                                                                         
            
                                                EX4200 VC                                                                    Patch
                                                                                                                           Remediation



      PC user
                                                                                                      EX4500 VC and
                                                                                                        EX4200 VC              Video
                                                                                                                                         
6                            5                                     4
SRX AppSecure
                              SRX enforces user
                              policies allowing                    MAG pushes role                                             Apps
                                                                                                                                         
Polices block non-                                                                                          MAG
                              user basic access                    based FW policies                                    Corporate Data Center
work related
                              to all servers                       to EX and SRX
applications
                              except finance                                                                             
                                                                                                                             Internet
                                                                                                                                         
 53                   Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
SECURE REMOTE ACCESS AND
     INTEGRATION
54      Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
MOBILE DEVICE REMOTE NETWORK ACCESS
POLICY AND ACCESS CONTROL
                                                                               SRX AppTrack feature
      1            2                             3
                                                                                                                                            
                                                                               combined with MAG
                                                                               data collects per user
      User needs toUser starts                                                 application information                       Active Directory
                                                                               providing detailed                                 /LDAP
      access        Junos Pulse                   MAG verifies user
      company                                     login, establishes           reports in STRM
                    and initiates a
      intranet over secure VPN
      non-corporate
      network
                    session with
                                                  VPN and the
                                                  device is allowed
                                                  on the network.
                                                                                                                                  Data
                                                                                                                                            
                    MAG appliance
      using iPad                                                                                WLCs

                                                                                                          SRX with IDP/
                                                                                                           AppSecure                        
                                                                                                                                Finance

6                         5                                     4
SRX AppSecure
polices block
                           SRX enforces user
                           policies allowing                    MAG pushes role
                                                                based ACL and FW
                                                                                                                                            
                           user access to all                                                      EX4500 VC and                  Video
non-work related                                                policies to the SRX                 EX4200 VCs
                           servers except
applications                                                    and EX
                                                                                                                                            
                           finance

                                                                                                  MAG with Radius,                Apps
                                                                                                  SSLVPN and UAC          Corporate Data Center
                                                                                                     modules

                                                                                                                            Internet
                                             Wireless User
                                           Tablet/smartphone
                                                                                                                                            
55                 Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
BYOD: ONBOARDING GUEST USERS
     DEMO
56      Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
ONBOARDING GUEST USERS
GUEST SELF PROVISIONING & APPLICATION RESTRICTION

                                                                                          Hospital Network




                                                                                                 WLA532
                                                                            Google
                                                                       www.youtube.com

                                                                               !
                                                                      Can’t access!!!           WLC2800
                                                                         Hospital Guest
                                                                            Login
                                                                        This Hospital
                                                                          is keeping         with Smartpass
                                                                            GUEST ID
                                                                        bandwidth for
                                                                         (408) 569-9863
                                                                      what matters most
                                                                                                 SRX 550




                                                                                             MAG Series (UAC)




57        Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
ONBOARDING GUEST USERS
GUEST SELF PROVISIONING
                4
                                          SmartPass sends                                                             3
                                          temporary credential                                                        User selects SmartPass
                                          to end user via                       Clickatell SMS
                                                                                                                      self-registration and
     1                                    Clickatell SMS                        Gateway service
                                                                                                                      creates a temporary
                                          service                                                                     user credential
     Unknown device
     connects to open
     captive portal SSID

                                                                                2
                                                                             User session is                    WLC



               
                                                                             captured and redirected
                                                                             to SmartPass
                                                                                                                                      SmartPass



                                                       EX Series                                                          EX Series
       Wireless User                 AP
     Tablet/smartphone                                                               5
                                                                                         User uses temporary
                           6                                                             credentials to
     User is connected to                                                                authenticate against
     the network using                                                                   SmartPass
     mobile phone number
     and temporary
     password




58                       Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
ROLE BASED NETWORK SEGREGATION


     1                                     2                                                                                    
                                                                                                                  Active Directory
                                               Smartpass                                                               /LDAP


                                                                                                                                
     Device authenticates               communicates User and
     on wireless network                 IP information to UAC
                                               via IF-MAP
                                                                                               WLC
                                                                                                                       Data


                                                                                                     SRX
                                                                                                                               
                                                                                                                      Finance




  Wireless User            AP                  EX Series
                                                                                                                                
                                                                                                                       Video
Tablet/smartphone

                                                                                               SmartPass
                                                                                                                                
                                                                                                                       Apps
                                  4                                    3                       UAC         Corporate Data Center
                                  SRX enforces user
                                policies allowing user                UAC pushes role based
                                  basic access to all                 ACL and FW policies to
                                servers except finance                  EX, WL and SRX


59                  Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
ONBOARDING GUEST USERS
GUEST SELF PROVISIONING
Step 1: connect device to SSID
‘Juniper_Guest_Access’
Step 2: open web browser and browse to
www.juniper.net (or use bookmark)
     Acmegizmo captive portal page should come up

Step 3: click on the ‘Create New User’ button to
self-provision temporary user credentials
Step 4: enter a valid mobile number, name,
email and company; click ‘send SMS’
     Phone number must be able to receive SMS messages,
     other data can be bogus (except email must be well-
     formed)
     Within a minute or two phone should receive welcome
     message

Step 5: enter the temporary credentials into the
captive portal login page to access the guest
network
60                Copyright © 2012 Juniper Networks, Inc.   www.juniper.net
Free Business Productivity Analysis
S PECIAL O FFER
                  Generation-e’s MBA qualified business expert will
                  spend one day onsite with you, helping you
                  understand your IT infrastructure capabilities and
                  building a roadmap with an actionable plan for
                  embracing the technologies we’ve spoken about
                  today to evolve your business and build your
                  competitive advantage.
                     Normally valued at $3,000 – Free for attendees

                  Don’t Forget:
                  You will be emailed a feedback
                  survey after this event. Please
                  complete it to be registered to win
                  a Microsoft Surface.

More Related Content

Recently uploaded

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Recently uploaded (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Featured

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellSaba Software
 

Featured (20)

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 

Your Business' Future - Today

  • 1. Y OUR B USINESS F UTURE T ODAY
  • 2. Business Session 11:00am – 12:30pm A GENDA  Activity Based Working  Unified Communications  Demo  Windows 8 Devices  Cloud Services  Office 365  IaaS  Technical Session 1:00pm – 2:30pm  BYOD  Network infrastructure  Wireless  Secure Remote Access  Policy and Control
  • 3. H OW, W HEN , AND W HERE WE W ORK • Work Life Balance has become Work Life Integration • Work from home • Mobile work force • Collaborative environments and technologies
  • 4. A CTIVITY B ASED W ORKING Microsoft - Sydney
  • 5. A CTIVITY B ASED W ORKING Microsoft - Brisbane
  • 6. A CTIVITY B ASED Macquarie Group - Sydney W ORKING
  • 7. A CTIVITY B ASED W ORKING CBA – Darling Harbour
  • 8. A CTIVITY B ASED W ORKING “Everyone uses a laptop, and the space has no fixed phones at all, with Microsoft’s Enterprise Voice solution providing converged telephony and messaging that is delivered to a person, not a desk.”
  • 9. A CTIVITY B ASED “Activity Based Working is about W ORKING People, Place, and Technology” Technology Enablers  Unified Communications & Collaboration  Client devices  Wireless  Internet & WAN services  Secure remote access  Cloud Services  Location Services
  • 10. L OCATION B ASED S ERVICES
  • 11. A CTIVITY B ASED The Benefits W ORKING  Customer Satisfaction and Responsiveness  Mobility and flexibility  Sustainability and carbon reduction  Competitive advantage  Disaster recovery  Staff retention  Cost Savings in real estate and staff churn
  • 12. Future of Communications Communications Today Instant Video Web E-mail and Audio Messaging (IM) Voice Mail Conferencing Telephony Conferencing Calendaring Conferencing Telephony Instant Unified Messaging and Voice Mail E-mail and Conferencing: Calendaring Audio, Video, Web Authentication Authentication Authentication Authentication Administration Administration Administration Administration Storage Storage Storage Storage Authentication Authentication Authentication Authentication Administration Administration Administration Storage Administration Storage Storage Storage Compliance On-Premises Hybrid In the Cloud
  • 13. M ICROSOFT U NIFIED C OMMUNICATIONS Messaging Voicemail Telephony IM & Presence Collaboration Achieve higher Consolidate email VoIP solution that Contact based on Switch seamlessly reliability and and voicemail onto allows users to presence via phone, between audio, performance and one inbox. communicate via PC, video or application. video and web enhance your desk phone or conferencing. communications at mobile. lower cost. On-Premise Solution Cloud Solution
  • 14. T HE M ODERN W ORK P LACE Demo
  • 15. W INDOWS 8 D EVICES
  • 17. O FFICE 365 E4 Plan with Voice: $36.85
  • 19. H OW CAN A CTIVITY B ASED W ORKING CONCEPTS DRIVE POSITIVE CHANGE FOR YOUR BUSINESS ?
  • 20. Free Business Productivity Analysis S PECIAL O FFER Generation-e’s MBA qualified business expert will spend one day onsite with you, helping you understand your IT infrastructure capabilities and building a roadmap with an actionable plan for embracing the technologies we’ve spoken about today to evolve your business and build your competitive advantage.  Normally valued at $3,000 – Free for attendees Don’t Forget: You will be emailed a feedback survey after this event. Please complete it to be registered to win a Microsoft Surface.
  • 22. BYOD • Scope • Budget • Device Support • Security • Application accessibility • Network Access
  • 23. SIMPLY CONNECTED FOR UC&C WITH MICROSOFT LYNC October 2012
  • 24. UC&C MARKET TRENDS AND ISSUES Legacy IT environment is based on control Available Applications Available Applications Office Employee HIGH Any time/ location PERFORMANCE HIGH NETWORK PERFORMANCE POS, ERP, PBX Email, CRM, ERP, HR NETWORK USER DRIVEN (purpose built) IT App INTERNET (best effort) 3rd Party BYOD POS, ERP, PBX IT App Paradigm shift – occurring on both ends, devices and applications Social Network’s role needs to step up significantly to meet new challenges 24 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 25. JUNIPER’S SIMPLY CONNECTED FOR UC&C UC&C Infrastructure and Applications High Performance, Resilient, Open Data Remote Campus WAN Branch Center User 25 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 26. THE GOAL IS TO BE SIMPLY CONNECTED Simplified switching Wired-like experience on architecture, now a wireless – resiliency and complete, feature-rich portfolio performance Simple for users Simple for IT EX Series WL Series Superb QoE Highly economic Integrated security SRX Series Always on resiliency High performance Simplified architecture Automation Security follows user, and Device-agnostic secure application intelligence connectivity 26 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 27. Agenda Reference Architecture For UC&C Network Resiliency (Wireless & Wired) Wireless Network Congestion & CAC Network Access and Policy Control Secure Remote Access and Integration 27 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 28. REFERENCE ARCHITECTURE – UC&C 28 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 29. NETWORK REFERENCE ARCHITECTURE FOR UC&C 29 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 30. KEY REQUIREMENTS OF A UC&C NETWORK Open Reliable Secure Scalable 30 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 31. UNIFIED COMMUNICATIONS INTEROPERABILITY FORUM  Non profit vendor alliance formed in April 2010  Open to all UC hardware, software vendors, service providers and network operators  Mission - To enable interoperability of UC scenarios based on existing standards 31 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 32. NETWORK RESILIENCY & RELIABILITY 32 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 33. COMPONENTS OF A JUNIPER WIRELESS LAN (WLAN) Access Point WLAN Controller WLAN Management Wireless LAN CONTROLLER (WLC) WLAN Management Campus Core Firewall MAG Encrypted Access (Location) WLM1200 802.1x Authentication Trusted Client 33 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 34. SINGLE POINT OF MANAGEMENT FOR ALL CONTROLLERS Primary Seed Secondary Seed Member Member Member 34 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 35. HOW THE CLUSTER ADDS A NEW CONTROLLER The seed pushes the 2 1 configuration to the The primary controller new member pushes configurations to the secondary seed and members Primary Seed Secondary Seed Member Member Member  3 Member When a member is removed and replaced the same process is used 35 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 36. HOW THE CLUSTER ADDS A NEW AP 2 The Primary Seed sends AP 1 config to the Primary controller A new AP is introduced and and the AP sets up a connection contacts the Primary Seed. Primary Seed Secondary Seed Member Member Member 3 Member The Primary Seed sends AP config to the Secondary controller and the AP sets up a connection 36 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 37. HOW CLIENTS ARE ASSIGNED PRIMARY AND SECONDARY CONTROLLERS 2 Primary controller authenticates/ 3 authorizes client Primary propagates session details to backup controller for use during failure Primary Seed Client Session State Secondary Seed Member Member Member Client Session State 1 A new client associates to the system 37 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 38. SELF-REPAIRING CONTROL ARCHITECTURE 1 Should the Primary be taken out of service, the Secondary immediately takes over Primary Seed Secondary Seed  Member Member Member 38 Copyright © 2012 Juniper Networks, Inc. www.juniper.net • AP Re-homes to backup Member Controller..
  • 39. NONSTOP OPERATION HITLESS FAILOVER 2 A new Secondary is designated and is given the AP configuration and Primary Seed client session state Secondary Seed Member Member 39 • Primary-Seed identifies & updates 3www.juniper.net Copyright © 2012 Juniper Networks, Inc. rd controller (WLC) as new Backup Member for AP/Client Session State.
  • 40. IN-SERVICE SOFTWARE UPGRADE HITLESS 1 UPGRADE Primary Controller initiates upgrade sequence; passes control to Secondary and upgrades 2 Secondary passes control back to Primary and upgrades Primary Seed Secondary Seed Member Member Member 3 4 Primary Seed coordinates individual AP moves associated stations member upgrades; Member moves APs to to alternate AP then upgrades backup controller and upgrades 40 Copyright © 2012 Juniper Networks, Inc. www.juniper.net • Leverage Hitless Failover Functionality to provide ISSU..
  • 41. LOCAL SWITCHING IMPROVED PERFORMANCE Anchored Mobility – Basic Roaming Smart Mobile - Seamless Mobility Mobility Controller A Controller B Controller A Domain Controller B Subnet 1 Subnet 2 Subnet 2 Subnet 1 Client A on Client A on Subnet 1 Subnet 1 Client A on Client B on Client A on Client B on Subnet 1 Subnet 1 Subnet 1 Subnet 1 41 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 42. VIRTUAL CHASSIS SIMPLIFYING THE NETWORK Virtual Chassis Multiple switches acting as a single, logical device One switch to configure, one switch to manage Improved resiliency and performance • No Single Points of Failure. 42 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 43. DISTRIBUTED SWITCHING Master Backup A VCP Local Switching Links B C Inter-Module Switching D 43 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 44. L2 and L3 STATEFUL FAILOVER EX4500VC FAIL OVER IN SUB-50 Internet/Data EX-SW3 immediately MILLISECONDS! switches to backup path Center WLC2 WLC1 0 5 Line card – EX4200 Line card – EX4200 All traffic is re-routed 1 Master RE – EX4200  4 Backup RE – EX4200 AP1 2 3 Line card – EX4200 Line card – EX4200 Normal traffic flow EX-SW4 fails and EX-SW5 and EX-SW3 detect VC port to EX-SW4 is down 44 Copyright © 2012 Juniper Networks, Inc. www.juniper.net • Switch Failure & Re-Routing via Backup VCP-Path. New BackUp RE chosen.
  • 45. WIRELESS NETWORK CONGESTION AND CALL ADMISSION CONTROL 45 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 46. WIFI MULTIMEDIA ACCESS CATEGORIES Packet prioritization applied to tunneled traffic AP and controllers Wired priority is classify and mark user mapped to 4 X WMM traffic access categories for over-the-air QoS 46 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 47. DYNAMIC CALL ADMISSION CONTROL 8 voice devices associated but idle 2 active calls New client session accepted! Roaming user session accepted! Roam accepted call preserved! 47 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 48. AUTOMATIC CLIENT LOAD BALANCING Automatic Load Balancing per RF Band Band Steering 5 GHz capable client ‘encouraged’ to connect at 5 GHz 2.4 GHz only client connects at 2.4 GHz 48 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 49. NETWORK ACCESS & POLICY CONTROL 49 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 50. OVERVIEW – COORDINATED THREAT CONTROL Wireless LAN Controller Active Directory/ LDAP Data Junos Router Pulse Client IPS Firewall SRX Router/Firewall/IPS Finance Wireless AP’s Video Ethernet access Ethernet core switches Universal switches Access Apps Control RADIUS SSLVPN Corporate Data Center MAG Internet 50 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 51. ESTABLISHING A WIRELESS CONNECTION 3 1 5 WLC sends information Smartphone start WLC sends user policy to Radius Server 802.1x authentication 2 information to AP to AP VLAN, ACLs, QoS AP sends Authorization request to WLC SRX with WLC IDP/AppSecure  Corporate Data Center Wireless User AP EX Series EX Series Tablet/smartphone 6 7 AP sets User policies 4 Smartphone VLAN, QoS, ACL’s Wireless Data Radius Server sends devices on WLAN MAG with Encrypted username/pass to IP addresses received Radius, SSLVPN Active Directory/LDAP via DHCP and UAC modules for validation. Then sends user policy to WLC 51 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 52. NETWORK ACCESS AND POLICY CONTROL SRX AppTrack feature 1 2 combined with MAG data collects per user application information  Active Directory DHCP Server providing detailed /LDAP  Device authenticated communicates User and reports in STRM on wireless network IP information to MAG via IF-MAP WLC Data SRX  Finance Wireless User AP EX Series  Video Tablet/smartphone DHCP and IF-MAP  Apps 5 4 3 MAG Corporate Data Center SRX AppSecure SRX enforces user Polices block non-work policies allowing user MAG pushes role based   related applications basic access to all ACL and FW policies to like Hulu and Netflix servers except finance EX and SRX Internet 52 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 53. ENFORCING NETWORK ACCESS POLICIES 1 2 3 Pulse detects During 802.1x authentication. Compliance check fails. Antivirus  Active Directory device is on signatures are out /LDAP corporate MAG verifies of date and user  PC meets SRX AppTrack feature network and is quarantined to company combined with MAG per user policy remediation VLAN. software and Patch server data collects per user Data disables any security policy updates signatures. application information active VPN sessions Virus requirements User is now in compliance and providing detailed reports in STRM WLCs  SW too granted network Finance old access SRX   EX4200 VC Patch Remediation PC user EX4500 VC and EX4200 VC Video  6 5 4 SRX AppSecure SRX enforces user policies allowing MAG pushes role Apps  Polices block non- MAG user basic access based FW policies Corporate Data Center work related to all servers to EX and SRX applications except finance  Internet  53 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 54. SECURE REMOTE ACCESS AND INTEGRATION 54 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 55. MOBILE DEVICE REMOTE NETWORK ACCESS POLICY AND ACCESS CONTROL SRX AppTrack feature 1 2 3  combined with MAG data collects per user User needs toUser starts application information Active Directory providing detailed /LDAP access Junos Pulse MAG verifies user company login, establishes reports in STRM and initiates a intranet over secure VPN non-corporate network session with VPN and the device is allowed on the network. Data  MAG appliance using iPad WLCs SRX with IDP/ AppSecure  Finance 6 5 4 SRX AppSecure polices block SRX enforces user policies allowing MAG pushes role based ACL and FW  user access to all EX4500 VC and Video non-work related policies to the SRX EX4200 VCs servers except applications and EX  finance MAG with Radius, Apps SSLVPN and UAC Corporate Data Center modules  Internet Wireless User Tablet/smartphone  55 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 56. BYOD: ONBOARDING GUEST USERS DEMO 56 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 57. ONBOARDING GUEST USERS GUEST SELF PROVISIONING & APPLICATION RESTRICTION Hospital Network WLA532 Google www.youtube.com ! Can’t access!!! WLC2800 Hospital Guest Login This Hospital is keeping with Smartpass GUEST ID bandwidth for (408) 569-9863 what matters most SRX 550 MAG Series (UAC) 57 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 58. ONBOARDING GUEST USERS GUEST SELF PROVISIONING 4 SmartPass sends 3 temporary credential User selects SmartPass to end user via Clickatell SMS self-registration and 1 Clickatell SMS Gateway service creates a temporary service user credential Unknown device connects to open captive portal SSID 2 User session is WLC  captured and redirected to SmartPass SmartPass EX Series EX Series Wireless User AP Tablet/smartphone 5 User uses temporary 6 credentials to User is connected to authenticate against the network using SmartPass mobile phone number and temporary password 58 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 59. ROLE BASED NETWORK SEGREGATION 1 2  Active Directory Smartpass /LDAP  Device authenticates communicates User and on wireless network IP information to UAC via IF-MAP WLC Data SRX  Finance Wireless User AP EX Series  Video Tablet/smartphone SmartPass  Apps 4 3 UAC Corporate Data Center SRX enforces user policies allowing user UAC pushes role based basic access to all ACL and FW policies to servers except finance EX, WL and SRX 59 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 60. ONBOARDING GUEST USERS GUEST SELF PROVISIONING Step 1: connect device to SSID ‘Juniper_Guest_Access’ Step 2: open web browser and browse to www.juniper.net (or use bookmark) Acmegizmo captive portal page should come up Step 3: click on the ‘Create New User’ button to self-provision temporary user credentials Step 4: enter a valid mobile number, name, email and company; click ‘send SMS’ Phone number must be able to receive SMS messages, other data can be bogus (except email must be well- formed) Within a minute or two phone should receive welcome message Step 5: enter the temporary credentials into the captive portal login page to access the guest network 60 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
  • 61. Free Business Productivity Analysis S PECIAL O FFER Generation-e’s MBA qualified business expert will spend one day onsite with you, helping you understand your IT infrastructure capabilities and building a roadmap with an actionable plan for embracing the technologies we’ve spoken about today to evolve your business and build your competitive advantage.  Normally valued at $3,000 – Free for attendees Don’t Forget: You will be emailed a feedback survey after this event. Please complete it to be registered to win a Microsoft Surface.

Editor's Notes

  1. Each System has a different directory and different identity – Single identity is the key to ease of useProvisioned separatelyDifferent administrators and skills requiredHigh Costs
  2. Microsoft has been in the UC space for 11 yearsVoice capabilities added in 2007
  3. The legacy UC environment (from competition) are based on controls and are purpose built for Telephony deploymentsand are showing several scalability and other limitations in handling bandwidth hungry video conferencing and communication-enabled applications from Oracle, SAP, PeopleSoft that requires more than 10 times the bandwidth of their LAN-based versions. This poses a serious implications on the network; hence requiring high-performance, reliability, and availability demands from the network. Plus in the distributed enterprise model, many of the OTT UC applications such SKYPE, Facebook, WebEX can be sources from multiple places in the cloud..creating a new challenge for IT to provide a consistent QoE for all managed, cloud or OTT UC&C applications.Other trend in the industry is employees bringing their own devices into the workplace. Even though this provides them flexibility and improves their productivity …it creates a new set of scalability, security and management challenges for IT departments that includes bandwidth pressures, insider security issues, demand for high-resiliency and wired-like experience on wireless infrastructure…thus creating a unique opportunity for juniper with it’s simplified and UC optimized simply connected architecture for branch and campus deployments.
  4. Now let’s look at the Juniper framework for the UC&C solution…this shows a good representation of how we separate UC infra & application layer from the network infrastructure layer. Here we have UC&C apps on the top with all key hardware vendors. Juniper provides the networking infrastructure pillars that is high performance, resilient and open. Our juniper simply connected branch and campus designs are optimized for latency and jitter that are key requirement for the real-time media traffic. Plus, juniper offers several resilient and scalable pay-as-you-grow features such as VC, virtual WLC cluster in wireless, redundant devices & links capabilities, load balancing ,etc…that are required to keep pace with fast changing UC application developments
  5. That’s what it means to be Simply Connected.1) Simple for users2) Simple for IT 3) Providing superb QoE at high level of economics. 4) How do we do that? 5) We are offering a portfolio of products working together, solving the problems we discussed. We will talk today about integrated security, always on resiliency, high performance, simplified architecture and automation, all means for delivering on the promise.Transition: I’m not here to tell you to take my word for it, so let’s take a look at how it actually works.
  6. Like we mentioned earlier, Juniper’s new UC strategy for Unified Communication and collaboration, is to provide resilient, secure, always available and UC optimized end to end IP-based services for both wired and wireless access. Here is the reference architecture that provides a complete overview of what we have to offer over layed with the UC components. You have a Campus HQ, three branch locations of various types and a data centerThis simplified architecture reduces the number of managed devices while providing VC enabled 10GE aggregation for wiring closets in the campus. The call server and messaging servers sits in the DC and are connected to the VoIP end points in the branch and campus domains via internet VPN and/or MPLS WAN along with WAN redundancy options for WAN survivability for both voice and data traffic. Wireless deployment in the branch and campus domains are built with high resiliency. WLC cluster capability enables medium and small branches use HQ WLC for redundancy in case of local WLC failure.Similarly, EX VC and SRX clustering offers LAN resiliency and easier to manager architecture design.
  7.  The UCIF is a nonprofit vendor alliance that was created in April 2010 to enable interoperability of UC scenarios based on existing standards. It is not another standards body and the ultimate goal is to improve interoperability and protect the investments of customers. The alliance is a platform agnostic alliance. The main mission of UCIF is to define test plans, advance testing protocols, and facilitate verification testing for member’s UC solutions and scenarios, interfacing with other standards groups, and liaising with regulatory bodies that are involved in UC. The forum is open to anyone who wants to join and further the goal. Microsoft is one of the founding members along with HP, Juniper Networks, Logitech, and Polycom. Unique to the UCIF, a certification mark will be developed for use by member vendors, as a signal to customers that a scenario or solution meets the UCIF interoperability requirements.
  8. Key differentiated technologies for Juniper WLAN1.  Clustering – 32 controllers and 4096 AP’s can be managed as 1 IP address.  ADVANTAGE – management simplicity2. Auto-distribution of AP’s – AP’s are assigned to controllers without network manager intervention.  ADVANTAGE – management simplicityTransition: Let’s have a quick look at the product family that delivers this architecture.Components of a Wireless LAN-the WL solution is a controller-led architecture, no standalone AP-solution consists of indoor/outdoor AP, controllers and managementAccess Point1) Access PointConnection point for wireless clients to get on networkSingle/Dual RadioHouses transceivers (radio component)Converts 802.11 to Ethernet trafficACL and QoS enforcementPowered by PoE2) WLAN ControllerKeeps network configurationMobility Domain mgmtAggregation point for WLAN traffic from AP’sSwitches traffic between wireless clients and wired networkAP management (Images, client load)Seamless roamingRF Mgmt (Channel and Power Tuning)Security (WIDS/WIPS, ID based networking) 3) WLAN ManagementNetwork & RF planning and configurationWLAN Network MonitoringAlerts/EventsNetwork MapTroubleshootingCustomized Reports
  9. There are three main reasons why Virtual Chassis is a tremendous network simplification tool:This technology allows to aggregate multiple switches (up to 10) into one single logical device.Switches that are virtualized together can now be managed as one single elements, simplifying the number of switches to manage by a factor of up to 10.Once switches are virtualized together using Virtual Chassis, the network is more resilient with no single point of failure in the Virtual Chassis.
  10. Let’s now look at two examples of how packet switching works on a virtual chassis.Consider this 10 member mixed virtual chassis with two EX4500s and eight EX4200s.The links in orange are the high speed 64Gbps Virtual Chassis Interconnects that we call as VCP LinksFirst, Local Switching – is used when the traffic needs to be forwarded across destinations reachable via the same member VC switch port. It doesn’t need to traverse across the RE. And A to B in this case.And Secondly, Inter-module switching – if the traffic needs to flow between two destinations that are connected across two different member Virtual Chassis member switches. The traffic flows across the VCP link between the VC Member switches. With 128 Gbps backplane capacity on each member switch, we are able to achieve forwarding with No HOLB. C to D in this case.
  11. VCCPd configures each VC ringed port with a backup ring port which is facing opposite direction, so there is a known failover path for each switch. Under normal condition, the traffic flow from AP1 to Internet is load balanced via SW3-SW4-SW5 and SW3-SW4-SW5-SW0. In the event of ring port failure(SW4 HW failure) all the packets queued in for failed port is internally looped back and unconditionally forwarded to backup ring port with <Packet is Looped> DSA tag field set. When EX-SW4 loses Power unexpectedly due to HW FailureEX-SW3 detects VC port to EX-SW4 is downEX-SW3 fails over traffic from EX-SW2 back to EX-SW2 but with a special tag saying “that optimal path is broken, engage backup path”EX-SW2 engages its backup path and sends all traffic via EX-SW1.
  12. Client Load Balancing1) AP’s maintain awareness of "rf neighborhood" based on neighboring APs and client location, AP determines a target load the system uses various techniques to "coax" clients to less loaded AP’s. If devices are persistent the system will allow them on. [CLICK] The Juniper WLAN system uses various patented techniques to “coax” clients on to more lightly loaded APs, and therefore distribute the load more evenly. [CLICK] 2) In addition, if an AP detects a client on both 2.4Ghz and 5Ghz bands, the same techniques are used to "coax" a client to less loaded band. This gives these users a better QoE as the 5GHz band has more bandwidth and less overlapping channels causing interference. It also means that the devices left on the 2.4GHz band are also getting a better experience as there are less clients to share the available bandwidth.Transition: In summary then… The purpose of bandwidth control is to allow the setting of bandwidth limits to ensure reliable accessThere are three methods for controlling bandwidth:Maximum bandwidth per SSIDConfigured limit is full duplex in units of KbpsMaximum bandwidth per UserFull-duplex rate limit for aggregate of all packets through a clientWeighted fair queuing per Radio ProfileService-profiles compete for transmit opportunities based on the configured weightsBandwidth limits are defined in a QoS profileA VSA allows QoS profiles to be dynamically assigned
  13. In order for A.J. to get access to the corporate network, he will have to have both sessions authenticated via the wireless network. Let’s take a look at the functional blocks involved. 1) Both his phone and iPad authenticate to the AP using 802.1x. 2) The AP then passes this information about A.J. to the wireless LAN controller. 3) The WLC, acting as the RADIUS Client, sends the request to the UAC/MAG for Radius authentication. 4) The UAC will then pass on this information to a LDAP or Active Directory server for user validation and authentication. Assuming a valid user is found, the authorisation information is passed back to the WLC and based on the user role, VLANs, access list, QoS profiles, etc. will be assigned.5) The WLC notes the new policy and sends appropriate user role based information back to the AP. 6) The AP sets the policies determined for A.J. 7) The end device can now initiate a DHCP request to obtain an IP address.Step one is complete. A.J. is authenticated for access on the company network.Transition: Now that AJ is connected to the wireless network, what happens next?
  14. [CLICK]1) So the device is connected to the network. A DHCP request will be made in order to obtain an IP address.2) The DHCP server assigns an address to the device and then utilising the IF-MAP standard, shares this information with the UAC. This is a unique feature of the Juniper Networks solution which now allows the UAC to have full visibility of the user and match that to the username. 3) The UAC can now provision dynamic user role based policies on the Juniper SRX firewall and EX Switches.4) These policies will define what resources on the network the user will have access to. In this case, access is permitted to the internet and all corporate servers, except the Finance server.5) In addition, the AppSecure implementation on the Juniper SRX provides application based firewall capability to limit access to specific applications on the network, whether they are hosted in the corporate data centre or Over The Top services on the Internet. In this case, access has been blocked to Netflix and Hulu.6) All logging, including AppSecure data, is sent to the Juniper Networks Security Threat Response Manager (STRM) for correlation and reporting capabilities. The STRM can also take SNMP traps and syslog from other devices in the network.Key points – Juniper provides a complete set of wireless, Ethernet and security products to easily manage multiple devices per user. The same access policy is applied irrespective of the number of devices and it is specific to A.J.Transition: This completes the first use case scenario in AJ’s day. Before we move on, I just want to provide you with a bit more information about what AppSecure is as well as STRM.
  15. 1) AJ needs access to the corporate network and all he has is his iPad. Of course.2) AJ fires up the Junos Pulse application on his iPad and initiates a connection to the corporate network using the public WiFi at the cafe. The session terminates on the MAG/SSL VPN gateway.3) The MAG will authenticate AJ against the AD server in the same way as he is authenticated when he connects via the corporate WiFi or switched network. Upon successful authentication, a secure tunnel is established between the MAG and AJ’s iPad.4) At the same time, the MAG will push dynamic policy to the EX switches and SRX firewalls that prevent him from accessing resources that he is not allowed to. Sound familiar??5) The policies are enforced by the SRX allowing AJ access to everything except the finance server.6) As always, AppSecure on the SRX device is implementing application based policies to prevent AJ from using prohibited applications [CLICK] and all activity is tracked and logged on the STRM.AJ can now perform the tasks that he needed to do prior to his 1pm meeting.Transition: In summary…