• Complain

Peter Southwick - Juniper Networks Warrior: A Guide to the Rise of Juniper Networks Implementations

Here you can read online Peter Southwick - Juniper Networks Warrior: A Guide to the Rise of Juniper Networks Implementations full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2012, publisher: OReilly Media, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Peter Southwick Juniper Networks Warrior: A Guide to the Rise of Juniper Networks Implementations
  • Book:
    Juniper Networks Warrior: A Guide to the Rise of Juniper Networks Implementations
  • Author:
  • Publisher:
    OReilly Media
  • Genre:
  • Year:
    2012
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Juniper Networks Warrior: A Guide to the Rise of Juniper Networks Implementations: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Juniper Networks Warrior: A Guide to the Rise of Juniper Networks Implementations" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

In this practical book, Juniper Networks consulting senior network engineer, Peter Southwick, offers unique first-person field studies on designing, configuring, and troubleshooting new systems that are changing the networking world. Each chapter-long travelogue follows a team of Juniper Networks warriors as they solve specific needs with emerging network platform architectures.In these case studies, Southwick and his fellow warriors analyze a clients particular situation, arrive at an architectural solution, and work through the deployment details. For anyone who operates, installs, designs, or works in IT, this book provides an intimate and entertaining look at whats changing and why.Among the case studies, youll discover how:A service provider protected customers from malicious traffic with Juniper Networks IDP systems SRX5800s improved connectivity and security in a data center Ethernet WAN technology was chosen as a storage solution, rather than a proprietary design on dark fiber An enterprise severed communications between different departments to comply with government personal credit card standards Core network and edge devices helped a power company serve local customers and ISPs in the data services market A hosting company migrated its core, datacenter, edge, and access domains to a state-of-the-art network In this uniquely written book, you will get a detailed view of life in the data center, the edge, the core, and the office of the customers CIO. Steve Fazio, CEO, TorreyPoint

Peter Southwick: author's other books


Who wrote Juniper Networks Warrior: A Guide to the Rise of Juniper Networks Implementations? Find out the surname, the name of the author of the book and a list of all author's works by series.

Juniper Networks Warrior: A Guide to the Rise of Juniper Networks Implementations — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Juniper Networks Warrior: A Guide to the Rise of Juniper Networks Implementations" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Juniper Networks Warrior
Peter Southwick
Published by Juniper Networks

Beijing Cambridge Farnham Kln Sebastopol Tokyo Dedication This book is - photo 1

Beijing Cambridge Farnham Kln Sebastopol Tokyo

Dedication

This book is dedicated to the real warriors of this world who keep us free and sometimes die in the process. We salute and honor you.

Preface

The network has changed a lot recently, with 10 years worth of developments packed into just 2 or 3. Those changes have been in specific network domains. The industry has grown out of the just put another rack in approach, because putting another rack in does not necessarily equate to gaining more bandwidth or more services or more security. Patching your limping network with a new box will give you a faster limping network .

The rise of systemic networking has in turn given rise to the Juniper Networks warrior. While its not a given that they know more than or are better than other vendors professional installers, Juniper Networks warriors think in terms of network platforms and how the entire architecture works for the client. They think in terms of extra capacity in the near future and long-term scalability for the client. They also think in terms of domains: the needs for the service provider edge are different than those of a campus or branch network, but both might use the MX480. For a Juniper Networks warrior, the deployment adapts to the domain rather than the domain bending to accommodate what the deployment cant do.

An explosion of system-wide architectures and network deployments has occurred in the past five years, and I have seen it happen firsthand as a professional services networking engineer (and trainer). I am one of many, and I have encountered both warriors who are umpteen times smarter than I, and others who I have had to drag along by the scruff of the neck. Our numbers are growing.

This book presents a series of network engineers travelogues that I hope will entertain and illuminatethey show specific configurations in this new world, where a systemic approach is actually cheaper, easier, and better than squeezing in another rack.

More specifically, I hope these chapter-length travelogues will show our warriors ability to think on our feet, because no two networks are the same even if they fall in the same domain. A common warriors morning lament is OMG, how are we going to fix that!? But then we put on our shoes and walk into the meeting room and figure it out somehow. And we do it every day, every week, at almost every deployment. As the saying goes, sometimes you get the bear and sometimes the bear gets you . Thankfully, the bear does not win very often, and were still here, gettin the bear.

In most engagements, the equipment has been ordered, the sales deal is done, the media has over hyped the issues, everyone wants new networking power, the deadline is looming, and the politics of the client are, well, very visible. You fly in like a smoking gun, meet with a half dozen other warriorssome you know, some you dontand you are expected to perform like a well-oiled machine for the next week or month, cooped up together, sleeping and eating like a band of foot soldiers. What you do has to be flawless, meticulous, speedy, and mindful of the whims of the client.

As the world favors these platform architectures more and more, the network warrior must perform on a systemic stage. Hats off to you, my fellow network warriors. Its showtime!

What Is the New Network Platform Architecture?

Once upon a time, it used to be just the service provider (SP) and the local area network (LAN). Then it went to SP and enterprise. Then campus and branch, WLAN, and edge joined in. Then the data center, and now user devices by the billion, with each having more communication power than any computer a decade ago. This evolution is a good thing. It means the domains of the worlds networks are adapting to the needs of their entities, and they are organizing themselves by how they operate and the services they need to offer to their users. Putting another router on the rack because its cheap aint going to cut it, because youll eventually need more warriors and more warrior time to fix the cheap patch.

This book endorses Junipers New Network Platform Architecture approach, if only because I have been installing it for years under different names, and it works. This approach is at the heart of each chapters deployment. Any warrior worth his salt should be giddy to see such an emphasis on this platform and what that future offers.

This book darts around the domains in a random fashion because their order is not important, but I call them out at the beginning of each new chapter. This book is about network engineers and the problems and challenges they face when they deploy networks to help people communicate and share. Layer 8 of the OSI model of networking, or politics , is alluded to in several chapters, but I try to avoid going into gory detail about the political battles witnessed during the deployments (most warriors would rather be confronted by a downed network than two clients giving them separate and contrasting instructionsthe network they can fix, while the other problems just seem to fester).

How to Use This Book

Lets look at some specifics on how this book can help you. Every network deployment is different, like trees, like snowflakes, like people. You have to have an open mind, use open standards, and be as meticulous as a warrior. My fellow warriors will enjoy these chapters as pure networking travelogues: they might remind you of that build-out in the Midwest during the Great Blizzard, or those crazy people at University X. For others, who are aspiring to be warriors, or perhaps are part of the warriors sales and support teams, you need to know the process that happens onsite to make it all work. Upon reflection, however, I think that the people who actually spend the money and buy new networking equipment may benefit the most from this book. The warrior tribe sent to your location can work wonders if you listen and participate.

Different readers will use this book for different reasons, so each might use a different part of each chapter for their purposes. Each chapter starts off with an analysis of the clients situation and how the power of the Juniper Networks domains concept can be harnessed to improve that situation. In this portion of the chapter, the trade-offs are weighed, the requirements are outlined, and the solutions architecture is shown. The second part of each chapter gets into the nuts and bolts of how the solution was crafted. I realize that many concepts are used in most engagements, so some of the details might be skipped. But for the most part, the configuration snippets are all usable as presented. Most chapters end with the steps used by the tribe to install, migrate, or activate the clients network. If you are reading this to understand what devices we use in what environments and why, you might want to skip the gory details. If you are reading this as a means to solve your clients issues, you might skip the political section. All in all, there are many ways to use this book; my hope is that whatever your goals, you find it helpful and enjoyable.

I assume a certain level of networking knowledge on the readers part. The less you know about the following concepts, the more each chapter will get fuzzy just when it gets down to warrior-dom:

The OSI model

The Open Systems Interconnection (OSI) model defines seven different layers of technology: the physical, data link, network, transport, session, presentation, and application layers. This model allows network engineers and network vendors to easily discuss different technologies and apply them to specific OSI levels, and allows engineers to divide the overall problem of getting one application to talk to another into discrete parts and more manageable sections. Each level has certain attributes that describe it, and each level interacts with its neighboring levels in a very well-defined manner. Knowledge of the layers above Layer 7 is not mandatory, but understanding that interoperability is not always about electrons and photons will help.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Juniper Networks Warrior: A Guide to the Rise of Juniper Networks Implementations»

Look at similar books to Juniper Networks Warrior: A Guide to the Rise of Juniper Networks Implementations. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Juniper Networks Warrior: A Guide to the Rise of Juniper Networks Implementations»

Discussion, reviews of the book Juniper Networks Warrior: A Guide to the Rise of Juniper Networks Implementations and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.