SlideShare uma empresa Scribd logo
1 de 29
The New Network is
      Programmable
                Hal Stern
Chief Architect, Developer Business Unit
            Juniper Networks
Legal Statement

This presentation sets forth Juniper Networks’ current intention
and is subject to change at any time without notice. No
purchases are contingent upon Juniper Networks delivering
any feature or functionality depicted.


   The information and analysis provided in any Juniper Business Analysis are prepared for
   illustrative purposes only and should not be relied upon by participants as representative of
   actual results. Actual results of implementation of any Juniper Networks product or solution
   may vary based upon factors beyond the scope of analysis and/or beyond the control of
   Juniper Networks. Juniper Business Analysis does not constitute an offer, warranty or
   representation by or on behalf of Juniper Networks, Inc. and/or its subsidiaries, partners or
   affiliates
The Un-informed State Today
THE HUMAN WORLD                   THE NETWORK WORLD


Applications blindly probe the     Networks spy on traffic to try
network to understand what it      to understand applications
can deliver



Network Aware Applications:        Application Aware Networking:
 Game ping-stats, Doppler,         Deep Packet Inspection,
  Geo-location, whois,               Deep Flow Inspection
  proprietary codecs,               Approximate application by
  proprietary control channels       fingerprinting
 Approximate topology/location     Service specific overlay
                                     topologies
A More Ideal State
Bringing together the important players…                … to enable interaction and influence the
                                                              experience of the end user




 Application:                 Content:                   End-User:                     Network:
 Knows what the end-user      Adjusts placement and      Knows what it wants and       Real-time interaction
 capabilities are. Informs    selection of content to    is directed there             between application,
 placement of content in      end-user, application                                    content and end-users.
 proximity of end-user.       desires and analytics.                                   Enables multiple
 Control of resources.                                                                 policy/profile points
What Is Possible?


    NETWORK                            APPLICATION       APPLICATION                       NETWORK



       Applications made better by                   Networks made better by information
        information from network                              from application
    Understanding of end-device capabilities            Bandwidth and resource optimization
    Real location / topology information                New service topologies
    Adjust behavior to real-time usage or               Protect network assets in real-time
     availability                                        Closed user security groups
    Regulatory compliance                               Security identification
    Analytics of in-home usage                          Disambiguate sessions
    Billing granularity                                 Disambiguate priorities




                                                             Control of Resources from
    Flexibility of Service Placement
                                                                    Applications
Why Do You Care?
• Developers love to tinker. --Cory Doctorow
• Every single bit of storage is accessed over a
  network.
• It’s time to start tinkering up and down the
  stack.
Tinkering With Storage
• Drivers
  – SCSI, FC….
  – Controller/general purpose system convergence
• Filesystems
  – Performance
  – Naming
  – Redundancy
Tinkering, Embedding Networks
Storage In The Large ==
              Networking In The Larger
•   Cost/Transit models for public/hybrid cloud
•   Security for data in motion
•   Congestion, latency and jitter are intentional
•   What does deep packet inspection show?
    – Popular storage buckets
    – Application access signatures
    – Latency sensitivity
Return of the Smart Network
                Voice Mostly   Internet    Converged Core
                1975-1995      1995-2010   2010-
Network is…     Smart          Dumb        Smarter

Clients are….   Really dumb    Smart       Smarter

Data Rate       2.4 kb/s       10 Mb/s     100 Gb/s

Defining        immediate      immediate   immediate
Factor          connection     access      experience
Time and Functional Domains

             Analysis          Modeling            Action
                security
Design          posture

                                                   QoS
                      service level
Real-Time             enforcement         cloud
                                          placement
                 threat,
Historical       failure              cloud cost
                 analysis
It’s déjà vu all over again
• Evolving APIs on the network software
  assets….
• Create new consumption and constraint
  patterns…
• Requiring network-level information
Impact on Storage:
                Deutsch’s 8 Fallacies
1. The network is reliable
2. Latency is zero
3. Bandwidth is infinite      Virtualization and cloud
4. The network is secure      computing make bad
                              assumptions worse
5. Topology doesn't change
6. There is one administrator
7. Transport cost is zero
8. The network is homogeneous
Information Creation
• Point in Time • Annotation      •   Topology
• Real Time     • Context         •   Service Definition
• Long Time     • Corroboration   •   Metadata
                • Correlation     •   Analytics
                                  •   Optimization
Decoupling of Control Points
                           Policy               Flows/Filtering
                 Content/Resource Placement   Delivery/Experience




                    logs
Applications     statistics                                          Networks
                                               ephemeral
 adapt to         history                                            adapt to
 networks                                        state              applications
                 topology
                  context
Closed-Loop System
Action                                                Value
Configure                                             Filter
Provision                        GENERATE             Correlate
Dynamic Policy        AFFECTS                         Combine




                                            INSIGHT
Assets                                                Data


                                                      Inventory
                                CREATE                History
                                                      Real-time
Networking Devices, Servers,
Databases, Applications etc.
Under The Hood
            NBI Bridge                                    Java (and other languages)
           SOA, MTOSI                                              via REST

                                       APIs & Libraries

                                 Interface Services
              users, RBAC, application deployment, UI, RESTful wrappers

Element and Network Services                                   Data Services
  inventory, topology, fabric, jobs,
                                                   tagging, taxonomy, join/product, indexing,
        device management
                                                                 search/query


                                                Local Persistence
  DMI
                                                Database cluster
Making Networks Programmable
    3rd party
3rd party applications &
    AppsSDKs
          & SDKs                                                                           Enterprise
                               SI Partner        ISV               Service    Research
                                               Partner            Provider   Institution   Customer




                                                                             Pulse - Endpoint
 Web Services APIs


                           Space - Across the network
         CDN                                                                               Data Center


                              Control   Management     Data /
    Network APIs               API          API      Packet API
                                                                       …        …


      Junos SDK


                              Network device
Content Request Routing
                                                                                                      Content Availability
       Per network response
                                                               DNS Partner                            Content Load
        times and site availability
                                                                                                      Content Capacity




New York                                                                                         Chicago Data Center

                                                                   Network Proximity
                                      Where do I get
                                        Answer:                    Network Availability
                    DNS
                                       my content?
                                        Chicago!                   Network
            ISP A                                                   Congestion                              Media Flow Controller




 London                                                                                          London Data Center


                    DNS

            ISP B                                      BGP                                 BGP              Media Flow Controller




   Paris                                                     Network Data Server                 Amsterdam Data Center


                    DNS

            ISP C                                                                                           Media Flow Controller
Bandwidth Calendaring
   Schedule a reserved path for your session…                                     … without having to know the network.

                                                                                 Real-time topology understanding
                                                                                 Steering traffic through optimal paths
                                                                                 Reservation transaction (WebServices API)
                                                                                 Selecting specific traffic

                        Web Services API


                           Orchestration                                                  What would I use this for?

                                                                                         Flexibility of service placement
                                        Network                                          Scheduled data center backups
                                                                                         Managed content distribution
                                                                                             •   Pre-positioning, live events
                                                                                         Map-reduce class compute jobs
                                                                                             •   HPC data processing, search
                                                                                         Cloud orchestration
                                                                                             •   Mobility of storage/VMs

Location 1                                                Location 2


Scheduled and created application/session specific path through the network
JouleX Energy Manage (JEM)
                  JouleX JEM Application

1
1      /device-management/devices

1
2      /device-management/devices/{device
       id}                                                                Junos Space Platform
1
3
       /device-management/devices/{device id}/exec-
       rpc

1
1   Retrieve all devices under management                           API           Native Apps
1
2   Get info for a single device managed by platform

1
3   RPC call to single device to get the power usage information.
    RPC for EX82xx:
         <get-power-budget-information>
    RPC for other Junos devices                                                Platform
         <get-environment-pem-information>


                                                                            DMI/NetConf
Informing Applications
                  Abstracted Network view
                  • Map interface (network and cost maps)         Network & Service data
                  • Endpoint Cost query interface
                                                                                               Geo
                                                                                             location

                                                                                            Subscriber
                                                                                               Info

                                                                                            Load/Utiliz
                                                  Data Server                                 ation

                                                                                            Topology


    Clients                                                                                  TE Data
(Network-aware       Application-friendly protocol              Source-specific protocols
  applications)      • RESTful Web Service                       (Routing protocols, DMI,      Data
                     • JSON message encoding                          SNMP, WS, …)            Sources
Network Application Domains
• Content / Service Routing
   – Locate best copy of content for the end user, using customer rules
• Managed content distribution
   – Content prepositioning to caches
   – Live events
• Map-Reduce class of applications as consumers and producers
   – High-end distributed computing informed by and informing placement
• Cloud OS network operations
   – Move VMs / Apps / Storage between locations
• Cloudburst
   – Flexible on-demand allocation of cloud & network capacity
• Security
   – DDoS attack prevention
Informing Control Points
• What activities create the most traffic?
• Where is latency introduced? Congestion?
• What impacts user experience the most?
• Extending network vocabulary to general purpose
  applications
• Content networking as a future:
    – More about what, who, when of access, not where
    – Resource oriented: things you link, copy, incorporate
      and extend
What About “Big Data”

“If you’re good at distribution (*), then you’re
   generating data. Use it.”

Steve O’Grady, analyst, Redmonk
  “Big Data + Open Source = Big Money”

(*) distribution of bits == networking
Data-Driven Use Case

“Big Data”   Business Constraints                  Hadoop
 Domain
                             Real Time Analytics
Java Developer
   Domain
      Ephemeral State Updates
                                          Tag/Filter/Join



  Configuration    Event/Log Data      Flow Data
Application Ecosystems
        3rd Party            3rd Party                                                 Experience governed through
          App                  App                                                     data insight & ephemeral state
                                                                                       control: make network aware of
                                           External Developer APIs
                                                                                       applications

                                                                    Flow             Content        Subscriber
                 Existing Systems                                  Analysis         Placement        Analytics


                               Junos Space APIs
    Make applications
   aware of network:                                               Junos Space
resources, integration
      points, services
              exposed                                    Control   Management     Data /
                                                                                             …         …
                                                          API          API      Packet API

                                    Network APIs


                                     Junos SDK            Network device
Hard Problems…
• Triangulating security, privacy and trust
• Precision
• Complexity
  – Running into potentially intractible (NP-Hard)
    problems with network structures and cost
    minimization
• Time
Reach Info & Resources
hstern@juniper.net
@freeholdhal

      Developer Information & Resources
         www.juniper.net/developer
              @junosdeveloper
       helpmebuildmyapp@juniper.net

Mais conteúdo relacionado

Mais procurados

Is Your IT Infrastructure Future-Proof?
Is Your IT Infrastructure Future-Proof? Is Your IT Infrastructure Future-Proof?
Is Your IT Infrastructure Future-Proof? Internap
 
Move your Data Center to the Cloud
Move your Data Center to the CloudMove your Data Center to the Cloud
Move your Data Center to the CloudRedZone Technologies
 
Latest mca projects
Latest mca projectsLatest mca projects
Latest mca projectsGagnertech
 
Dot net projects
Dot net projectsDot net projects
Dot net projectsshahu2212
 
BROCADE and New IP Story
BROCADE and New IP StoryBROCADE and New IP Story
BROCADE and New IP StoryAntonio Palumbo
 
Identity management
Identity managementIdentity management
Identity managementkamalikamj
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationIJTET Journal
 
Techno info solutions titles list
Techno info solutions titles listTechno info solutions titles list
Techno info solutions titles listjanani technoinfo
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET Journal
 
Dl 0n mobile jeff shomaker_jan-2018_final
Dl 0n mobile jeff shomaker_jan-2018_finalDl 0n mobile jeff shomaker_jan-2018_final
Dl 0n mobile jeff shomaker_jan-2018_finalJeffrey Shomaker
 
Art of InfoJacking, Source Conference Seattle, 2011
Art of InfoJacking, Source Conference Seattle, 2011Art of InfoJacking, Source Conference Seattle, 2011
Art of InfoJacking, Source Conference Seattle, 2011Aditya K Sood
 
Mca projects in gagner
Mca projects in gagnerMca projects in gagner
Mca projects in gagnerGagnertech
 
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...idescitation
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET Journal
 

Mais procurados (20)

Is Your IT Infrastructure Future-Proof?
Is Your IT Infrastructure Future-Proof? Is Your IT Infrastructure Future-Proof?
Is Your IT Infrastructure Future-Proof?
 
Jini technology ppt
Jini technology pptJini technology ppt
Jini technology ppt
 
htcia-5-2015
htcia-5-2015htcia-5-2015
htcia-5-2015
 
IEEE Projects 2012
IEEE Projects 2012IEEE Projects 2012
IEEE Projects 2012
 
Project titles abstract_2012
Project titles abstract_2012Project titles abstract_2012
Project titles abstract_2012
 
Move your Data Center to the Cloud
Move your Data Center to the CloudMove your Data Center to the Cloud
Move your Data Center to the Cloud
 
Latest mca projects
Latest mca projectsLatest mca projects
Latest mca projects
 
Dot net projects
Dot net projectsDot net projects
Dot net projects
 
BROCADE and New IP Story
BROCADE and New IP StoryBROCADE and New IP Story
BROCADE and New IP Story
 
Identity management
Identity managementIdentity management
Identity management
 
D0362035
D0362035D0362035
D0362035
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure Communication
 
Techno info solutions titles list
Techno info solutions titles listTechno info solutions titles list
Techno info solutions titles list
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
Dl 0n mobile jeff shomaker_jan-2018_final
Dl 0n mobile jeff shomaker_jan-2018_finalDl 0n mobile jeff shomaker_jan-2018_final
Dl 0n mobile jeff shomaker_jan-2018_final
 
Art of InfoJacking, Source Conference Seattle, 2011
Art of InfoJacking, Source Conference Seattle, 2011Art of InfoJacking, Source Conference Seattle, 2011
Art of InfoJacking, Source Conference Seattle, 2011
 
Mca projects in gagner
Mca projects in gagnerMca projects in gagner
Mca projects in gagner
 
Kinetica master chug_9.12
Kinetica master chug_9.12Kinetica master chug_9.12
Kinetica master chug_9.12
 
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
 

Destaque

OSS Presentation DDR Drive ZIL Accelerator by Christopher George
OSS Presentation DDR Drive ZIL Accelerator by Christopher GeorgeOSS Presentation DDR Drive ZIL Accelerator by Christopher George
OSS Presentation DDR Drive ZIL Accelerator by Christopher GeorgeOpenStorageSummit
 
The Medol Model: Understanding Shame
The Medol Model: Understanding ShameThe Medol Model: Understanding Shame
The Medol Model: Understanding ShameAnger Alternatives
 
Evaluation Facteurs De Risques Cardiovasculaires Cpp 08 09 09
Evaluation Facteurs De Risques Cardiovasculaires Cpp 08 09 09Evaluation Facteurs De Risques Cardiovasculaires Cpp 08 09 09
Evaluation Facteurs De Risques Cardiovasculaires Cpp 08 09 09raymondteyrouz
 
Fibromyalgie td 10 09 13
Fibromyalgie td 10 09 13Fibromyalgie td 10 09 13
Fibromyalgie td 10 09 13raymondteyrouz
 

Destaque (6)

OSS Presentation DDR Drive ZIL Accelerator by Christopher George
OSS Presentation DDR Drive ZIL Accelerator by Christopher GeorgeOSS Presentation DDR Drive ZIL Accelerator by Christopher George
OSS Presentation DDR Drive ZIL Accelerator by Christopher George
 
The Medol Model: Understanding Shame
The Medol Model: Understanding ShameThe Medol Model: Understanding Shame
The Medol Model: Understanding Shame
 
Exposicion amazonas
Exposicion amazonasExposicion amazonas
Exposicion amazonas
 
Evaluation Facteurs De Risques Cardiovasculaires Cpp 08 09 09
Evaluation Facteurs De Risques Cardiovasculaires Cpp 08 09 09Evaluation Facteurs De Risques Cardiovasculaires Cpp 08 09 09
Evaluation Facteurs De Risques Cardiovasculaires Cpp 08 09 09
 
Pré test migrant
Pré test migrantPré test migrant
Pré test migrant
 
Fibromyalgie td 10 09 13
Fibromyalgie td 10 09 13Fibromyalgie td 10 09 13
Fibromyalgie td 10 09 13
 

Semelhante a OSS Presentation Keynote by Hal Stern

Programmable WAN Networking is SFW (Open Networking Summit version)
Programmable WAN Networking is SFW (Open Networking Summit version)Programmable WAN Networking is SFW (Open Networking Summit version)
Programmable WAN Networking is SFW (Open Networking Summit version)Juniper Networks
 
The Enterprise Cloud: Immediate. Urgent. Inevitable.
The Enterprise Cloud: Immediate. Urgent. Inevitable.The Enterprise Cloud: Immediate. Urgent. Inevitable.
The Enterprise Cloud: Immediate. Urgent. Inevitable.Peter Coffee
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6John Rhoton
 
Cloud Computing : Security and Forensics
Cloud Computing : Security and ForensicsCloud Computing : Security and Forensics
Cloud Computing : Security and ForensicsGovind Maheswaran
 
The Cloud: A game changer to test, at scale and in production, SOA based web...
The Cloud: A game changer to test, at scale and in production,  SOA based web...The Cloud: A game changer to test, at scale and in production,  SOA based web...
The Cloud: A game changer to test, at scale and in production, SOA based web...Fred Beringer
 
Don't Architect a Real-Time System that Can't Scale
Don't Architect a Real-Time System that Can't ScaleDon't Architect a Real-Time System that Can't Scale
Don't Architect a Real-Time System that Can't ScaleReal-Time Innovations (RTI)
 
Moving Beyond Migration: Reinventing Process in the Cloud
Moving Beyond Migration: Reinventing Process in the CloudMoving Beyond Migration: Reinventing Process in the Cloud
Moving Beyond Migration: Reinventing Process in the CloudPeter Coffee
 
Distributed Shared Memory on Ericsson Labs
Distributed Shared Memory on Ericsson LabsDistributed Shared Memory on Ericsson Labs
Distributed Shared Memory on Ericsson LabsEricsson Labs
 
Core Network Optimization: The Control Plane, Data Plane & Beyond
Core Network Optimization: The Control Plane, Data Plane & BeyondCore Network Optimization: The Control Plane, Data Plane & Beyond
Core Network Optimization: The Control Plane, Data Plane & BeyondRadisys Corporation
 
Application architecture for cloud
Application architecture for cloudApplication architecture for cloud
Application architecture for cloudMarco Parenzan
 
Cloud computing and library services
Cloud computing and library servicesCloud computing and library services
Cloud computing and library servicesErik Mitchell
 
Programmable Networking is SFW (JavaOne presentation)
Programmable Networking is SFW (JavaOne presentation)Programmable Networking is SFW (JavaOne presentation)
Programmable Networking is SFW (JavaOne presentation)Juniper Networks
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewallvfmindia
 

Semelhante a OSS Presentation Keynote by Hal Stern (20)

Programmable WAN Networking is SFW
Programmable WAN Networking is SFWProgrammable WAN Networking is SFW
Programmable WAN Networking is SFW
 
Programmable WAN Networking is SFW (Open Networking Summit version)
Programmable WAN Networking is SFW (Open Networking Summit version)Programmable WAN Networking is SFW (Open Networking Summit version)
Programmable WAN Networking is SFW (Open Networking Summit version)
 
Network Information Factories
Network Information FactoriesNetwork Information Factories
Network Information Factories
 
The Enterprise Cloud: Immediate. Urgent. Inevitable.
The Enterprise Cloud: Immediate. Urgent. Inevitable.The Enterprise Cloud: Immediate. Urgent. Inevitable.
The Enterprise Cloud: Immediate. Urgent. Inevitable.
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6
 
The SDN Opportunity
The SDN OpportunityThe SDN Opportunity
The SDN Opportunity
 
Cloud Computing : Security and Forensics
Cloud Computing : Security and ForensicsCloud Computing : Security and Forensics
Cloud Computing : Security and Forensics
 
The Cloud: A game changer to test, at scale and in production, SOA based web...
The Cloud: A game changer to test, at scale and in production,  SOA based web...The Cloud: A game changer to test, at scale and in production,  SOA based web...
The Cloud: A game changer to test, at scale and in production, SOA based web...
 
Don't Architect a Real-Time System that Can't Scale
Don't Architect a Real-Time System that Can't ScaleDon't Architect a Real-Time System that Can't Scale
Don't Architect a Real-Time System that Can't Scale
 
Moving Beyond Migration: Reinventing Process in the Cloud
Moving Beyond Migration: Reinventing Process in the CloudMoving Beyond Migration: Reinventing Process in the Cloud
Moving Beyond Migration: Reinventing Process in the Cloud
 
Distributed Shared Memory on Ericsson Labs
Distributed Shared Memory on Ericsson LabsDistributed Shared Memory on Ericsson Labs
Distributed Shared Memory on Ericsson Labs
 
Core Network Optimization: The Control Plane, Data Plane & Beyond
Core Network Optimization: The Control Plane, Data Plane & BeyondCore Network Optimization: The Control Plane, Data Plane & Beyond
Core Network Optimization: The Control Plane, Data Plane & Beyond
 
Application architecture for cloud
Application architecture for cloudApplication architecture for cloud
Application architecture for cloud
 
Cloud computing and library services
Cloud computing and library servicesCloud computing and library services
Cloud computing and library services
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
Programmable Networking is SFW (JavaOne presentation)
Programmable Networking is SFW (JavaOne presentation)Programmable Networking is SFW (JavaOne presentation)
Programmable Networking is SFW (JavaOne presentation)
 
JavaOne Keynote: Programmable Networking is SFW
JavaOne Keynote: Programmable Networking is SFWJavaOne Keynote: Programmable Networking is SFW
JavaOne Keynote: Programmable Networking is SFW
 
An enterprise journey in the Cloud
An enterprise journey in the CloudAn enterprise journey in the Cloud
An enterprise journey in the Cloud
 
Secure Big Data Analytics - Hadoop & Intel
Secure Big Data Analytics - Hadoop & IntelSecure Big Data Analytics - Hadoop & Intel
Secure Big Data Analytics - Hadoop & Intel
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewall
 

Mais de OpenStorageSummit

OSS Presentation DRMC by Keith Brennan
OSS Presentation DRMC by Keith BrennanOSS Presentation DRMC by Keith Brennan
OSS Presentation DRMC by Keith BrennanOpenStorageSummit
 
OSS Presentation Accelerating VDI by Daniel Beveridge
OSS Presentation Accelerating VDI by Daniel BeveridgeOSS Presentation Accelerating VDI by Daniel Beveridge
OSS Presentation Accelerating VDI by Daniel BeveridgeOpenStorageSummit
 
OSS Presentation NexentaStor™
OSS Presentation NexentaStor™OSS Presentation NexentaStor™
OSS Presentation NexentaStor™OpenStorageSummit
 
OSS Presentation OpenStack Swift by Joe Arnold
OSS Presentation OpenStack Swift by Joe ArnoldOSS Presentation OpenStack Swift by Joe Arnold
OSS Presentation OpenStack Swift by Joe ArnoldOpenStorageSummit
 
OSS Presentation VMWorld 2011 by Andy Bennett & Craig Morgan
OSS Presentation VMWorld 2011 by Andy Bennett & Craig MorganOSS Presentation VMWorld 2011 by Andy Bennett & Craig Morgan
OSS Presentation VMWorld 2011 by Andy Bennett & Craig MorganOpenStorageSummit
 
OSS Presentation Keynote by Per Sedihn
OSS Presentation Keynote by Per SedihnOSS Presentation Keynote by Per Sedihn
OSS Presentation Keynote by Per SedihnOpenStorageSummit
 
OSS Presentation Keynote by Jason Hoffman
OSS Presentation Keynote by Jason HoffmanOSS Presentation Keynote by Jason Hoffman
OSS Presentation Keynote by Jason HoffmanOpenStorageSummit
 
OSS Presentation Keynote by Evan Powell
OSS Presentation Keynote by Evan PowellOSS Presentation Keynote by Evan Powell
OSS Presentation Keynote by Evan PowellOpenStorageSummit
 
OSS Presentation by Kevin Halgren
OSS Presentation by Kevin HalgrenOSS Presentation by Kevin Halgren
OSS Presentation by Kevin HalgrenOpenStorageSummit
 
OSS Presentation by Bryan Badger
OSS Presentation by Bryan BadgerOSS Presentation by Bryan Badger
OSS Presentation by Bryan BadgerOpenStorageSummit
 
OSS Presentation by Stefano Maffulli
OSS Presentation by Stefano MaffulliOSS Presentation by Stefano Maffulli
OSS Presentation by Stefano MaffulliOpenStorageSummit
 
OSS Presentation Metro Cluster by Andy Bennett & Roel De Frene
OSS Presentation Metro Cluster by Andy Bennett & Roel De FreneOSS Presentation Metro Cluster by Andy Bennett & Roel De Frene
OSS Presentation Metro Cluster by Andy Bennett & Roel De FreneOpenStorageSummit
 

Mais de OpenStorageSummit (14)

OSS Presentation DRMC by Keith Brennan
OSS Presentation DRMC by Keith BrennanOSS Presentation DRMC by Keith Brennan
OSS Presentation DRMC by Keith Brennan
 
OSS Presentation Accelerating VDI by Daniel Beveridge
OSS Presentation Accelerating VDI by Daniel BeveridgeOSS Presentation Accelerating VDI by Daniel Beveridge
OSS Presentation Accelerating VDI by Daniel Beveridge
 
OSS Presentation Vesk
OSS Presentation VeskOSS Presentation Vesk
OSS Presentation Vesk
 
OSS Presentation NexentaStor™
OSS Presentation NexentaStor™OSS Presentation NexentaStor™
OSS Presentation NexentaStor™
 
OSS Presentation OpenStack Swift by Joe Arnold
OSS Presentation OpenStack Swift by Joe ArnoldOSS Presentation OpenStack Swift by Joe Arnold
OSS Presentation OpenStack Swift by Joe Arnold
 
OSS Presentation VMWorld 2011 by Andy Bennett & Craig Morgan
OSS Presentation VMWorld 2011 by Andy Bennett & Craig MorganOSS Presentation VMWorld 2011 by Andy Bennett & Craig Morgan
OSS Presentation VMWorld 2011 by Andy Bennett & Craig Morgan
 
OSS Presentation Keynote by Per Sedihn
OSS Presentation Keynote by Per SedihnOSS Presentation Keynote by Per Sedihn
OSS Presentation Keynote by Per Sedihn
 
OSS Presentation Keynote by Jason Hoffman
OSS Presentation Keynote by Jason HoffmanOSS Presentation Keynote by Jason Hoffman
OSS Presentation Keynote by Jason Hoffman
 
OSS Presentation Keynote by Evan Powell
OSS Presentation Keynote by Evan PowellOSS Presentation Keynote by Evan Powell
OSS Presentation Keynote by Evan Powell
 
OSS Presentation by Kevin Halgren
OSS Presentation by Kevin HalgrenOSS Presentation by Kevin Halgren
OSS Presentation by Kevin Halgren
 
OSS Presentation by Bryan Badger
OSS Presentation by Bryan BadgerOSS Presentation by Bryan Badger
OSS Presentation by Bryan Badger
 
OSS Presentation by Stefano Maffulli
OSS Presentation by Stefano MaffulliOSS Presentation by Stefano Maffulli
OSS Presentation by Stefano Maffulli
 
OSS Presentation Arista
OSS Presentation AristaOSS Presentation Arista
OSS Presentation Arista
 
OSS Presentation Metro Cluster by Andy Bennett & Roel De Frene
OSS Presentation Metro Cluster by Andy Bennett & Roel De FreneOSS Presentation Metro Cluster by Andy Bennett & Roel De Frene
OSS Presentation Metro Cluster by Andy Bennett & Roel De Frene
 

Último

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Último (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

OSS Presentation Keynote by Hal Stern

  • 1. The New Network is Programmable Hal Stern Chief Architect, Developer Business Unit Juniper Networks
  • 2. Legal Statement This presentation sets forth Juniper Networks’ current intention and is subject to change at any time without notice. No purchases are contingent upon Juniper Networks delivering any feature or functionality depicted. The information and analysis provided in any Juniper Business Analysis are prepared for illustrative purposes only and should not be relied upon by participants as representative of actual results. Actual results of implementation of any Juniper Networks product or solution may vary based upon factors beyond the scope of analysis and/or beyond the control of Juniper Networks. Juniper Business Analysis does not constitute an offer, warranty or representation by or on behalf of Juniper Networks, Inc. and/or its subsidiaries, partners or affiliates
  • 3. The Un-informed State Today THE HUMAN WORLD THE NETWORK WORLD Applications blindly probe the Networks spy on traffic to try network to understand what it to understand applications can deliver Network Aware Applications: Application Aware Networking:  Game ping-stats, Doppler,  Deep Packet Inspection, Geo-location, whois, Deep Flow Inspection proprietary codecs,  Approximate application by proprietary control channels fingerprinting  Approximate topology/location  Service specific overlay topologies
  • 4. A More Ideal State Bringing together the important players… … to enable interaction and influence the experience of the end user Application: Content: End-User: Network: Knows what the end-user Adjusts placement and Knows what it wants and Real-time interaction capabilities are. Informs selection of content to is directed there between application, placement of content in end-user, application content and end-users. proximity of end-user. desires and analytics. Enables multiple Control of resources. policy/profile points
  • 5. What Is Possible? NETWORK APPLICATION APPLICATION NETWORK Applications made better by Networks made better by information information from network from application  Understanding of end-device capabilities  Bandwidth and resource optimization  Real location / topology information  New service topologies  Adjust behavior to real-time usage or  Protect network assets in real-time availability  Closed user security groups  Regulatory compliance  Security identification  Analytics of in-home usage  Disambiguate sessions  Billing granularity  Disambiguate priorities Control of Resources from Flexibility of Service Placement Applications
  • 6. Why Do You Care? • Developers love to tinker. --Cory Doctorow • Every single bit of storage is accessed over a network. • It’s time to start tinkering up and down the stack.
  • 7. Tinkering With Storage • Drivers – SCSI, FC…. – Controller/general purpose system convergence • Filesystems – Performance – Naming – Redundancy
  • 9. Storage In The Large == Networking In The Larger • Cost/Transit models for public/hybrid cloud • Security for data in motion • Congestion, latency and jitter are intentional • What does deep packet inspection show? – Popular storage buckets – Application access signatures – Latency sensitivity
  • 10. Return of the Smart Network Voice Mostly Internet Converged Core 1975-1995 1995-2010 2010- Network is… Smart Dumb Smarter Clients are…. Really dumb Smart Smarter Data Rate 2.4 kb/s 10 Mb/s 100 Gb/s Defining immediate immediate immediate Factor connection access experience
  • 11. Time and Functional Domains Analysis Modeling Action security Design posture QoS service level Real-Time enforcement cloud placement threat, Historical failure cloud cost analysis
  • 12. It’s déjà vu all over again • Evolving APIs on the network software assets…. • Create new consumption and constraint patterns… • Requiring network-level information
  • 13. Impact on Storage: Deutsch’s 8 Fallacies 1. The network is reliable 2. Latency is zero 3. Bandwidth is infinite Virtualization and cloud 4. The network is secure computing make bad assumptions worse 5. Topology doesn't change 6. There is one administrator 7. Transport cost is zero 8. The network is homogeneous
  • 14. Information Creation • Point in Time • Annotation • Topology • Real Time • Context • Service Definition • Long Time • Corroboration • Metadata • Correlation • Analytics • Optimization
  • 15. Decoupling of Control Points Policy Flows/Filtering Content/Resource Placement Delivery/Experience logs Applications statistics Networks ephemeral adapt to history adapt to networks state applications topology context
  • 16. Closed-Loop System Action Value Configure Filter Provision GENERATE Correlate Dynamic Policy AFFECTS Combine INSIGHT Assets Data Inventory CREATE History Real-time Networking Devices, Servers, Databases, Applications etc.
  • 17. Under The Hood NBI Bridge Java (and other languages) SOA, MTOSI via REST APIs & Libraries Interface Services users, RBAC, application deployment, UI, RESTful wrappers Element and Network Services Data Services inventory, topology, fabric, jobs, tagging, taxonomy, join/product, indexing, device management search/query Local Persistence DMI Database cluster
  • 18. Making Networks Programmable 3rd party 3rd party applications & AppsSDKs & SDKs Enterprise SI Partner ISV Service Research Partner Provider Institution Customer Pulse - Endpoint Web Services APIs Space - Across the network CDN Data Center Control Management Data / Network APIs API API Packet API … … Junos SDK Network device
  • 19. Content Request Routing  Content Availability  Per network response DNS Partner  Content Load times and site availability  Content Capacity New York Chicago Data Center  Network Proximity Where do I get Answer:  Network Availability DNS my content? Chicago!  Network ISP A Congestion Media Flow Controller London London Data Center DNS ISP B BGP BGP Media Flow Controller Paris Network Data Server Amsterdam Data Center DNS ISP C Media Flow Controller
  • 20. Bandwidth Calendaring Schedule a reserved path for your session… … without having to know the network.  Real-time topology understanding  Steering traffic through optimal paths  Reservation transaction (WebServices API)  Selecting specific traffic Web Services API Orchestration What would I use this for?  Flexibility of service placement Network  Scheduled data center backups  Managed content distribution • Pre-positioning, live events  Map-reduce class compute jobs • HPC data processing, search  Cloud orchestration • Mobility of storage/VMs Location 1 Location 2 Scheduled and created application/session specific path through the network
  • 21. JouleX Energy Manage (JEM) JouleX JEM Application 1 1 /device-management/devices 1 2 /device-management/devices/{device id} Junos Space Platform 1 3 /device-management/devices/{device id}/exec- rpc 1 1 Retrieve all devices under management API Native Apps 1 2 Get info for a single device managed by platform 1 3 RPC call to single device to get the power usage information. RPC for EX82xx: <get-power-budget-information> RPC for other Junos devices Platform <get-environment-pem-information> DMI/NetConf
  • 22. Informing Applications Abstracted Network view • Map interface (network and cost maps) Network & Service data • Endpoint Cost query interface Geo location Subscriber Info Load/Utiliz Data Server ation Topology Clients TE Data (Network-aware Application-friendly protocol Source-specific protocols applications) • RESTful Web Service (Routing protocols, DMI, Data • JSON message encoding SNMP, WS, …) Sources
  • 23. Network Application Domains • Content / Service Routing – Locate best copy of content for the end user, using customer rules • Managed content distribution – Content prepositioning to caches – Live events • Map-Reduce class of applications as consumers and producers – High-end distributed computing informed by and informing placement • Cloud OS network operations – Move VMs / Apps / Storage between locations • Cloudburst – Flexible on-demand allocation of cloud & network capacity • Security – DDoS attack prevention
  • 24. Informing Control Points • What activities create the most traffic? • Where is latency introduced? Congestion? • What impacts user experience the most? • Extending network vocabulary to general purpose applications • Content networking as a future: – More about what, who, when of access, not where – Resource oriented: things you link, copy, incorporate and extend
  • 25. What About “Big Data” “If you’re good at distribution (*), then you’re generating data. Use it.” Steve O’Grady, analyst, Redmonk “Big Data + Open Source = Big Money” (*) distribution of bits == networking
  • 26. Data-Driven Use Case “Big Data” Business Constraints Hadoop Domain Real Time Analytics Java Developer Domain Ephemeral State Updates Tag/Filter/Join Configuration Event/Log Data Flow Data
  • 27. Application Ecosystems 3rd Party 3rd Party Experience governed through App App data insight & ephemeral state control: make network aware of External Developer APIs applications Flow Content Subscriber Existing Systems Analysis Placement Analytics Junos Space APIs Make applications aware of network: Junos Space resources, integration points, services exposed Control Management Data / … … API API Packet API Network APIs Junos SDK Network device
  • 28. Hard Problems… • Triangulating security, privacy and trust • Precision • Complexity – Running into potentially intractible (NP-Hard) problems with network structures and cost minimization • Time
  • 29. Reach Info & Resources hstern@juniper.net @freeholdhal Developer Information & Resources www.juniper.net/developer @junosdeveloper helpmebuildmyapp@juniper.net