Juniper Networks

Displaying 1-40 of 123 results

  • White Papers // Jul 2010

    Mobile Security - why the Time Is Now

    Mobile security is quickly becoming essential for mobile carriers. As mobile devices and networks continue to evolve from second generation (2G) to broadband speeds and also become more open, security attacks on mobile networks and devices will likely increase substantially. The global acceptance of smart phones, net books, PC cards/dongles,...

    Provided By Juniper Networks

  • White Papers // Jun 2010

    Android Market: Threat Analysis of the Android Market

    In keeping with the Open Handset Alliance goals of Android being the first open, complete, and free platform created specifically for mobile devices, Google offers the Android Market. The Android Market offers the ability for developers to create any application they choose with the community regulating whether the application is...

    Provided By Juniper Networks

  • White Papers // Dec 2009

    Ensuring Business Continuity In Government

    The concept of business continuity is based on the identification of all business functions within an organization, and the assignment of a level of importance to each business function. Business continuity planning ensures that all personnel in an organization understand which business functions are the most important to the business....

    Provided By Juniper Networks

  • White Papers // May 2009

    Introduction to Carrier Ethernet VPNs: Understanding the Alternatives

    There are a wide range of VPN technologies available. MPLS-based VPNs are the most prevalent technology types used today, with many based on the use of Ethernet transport to provide high-speed communications. This paper describes the various MPLS-based Ethernet VPN services and technologies which Juniper Networks supports. These include Juniper's...

    Provided By Juniper Networks

  • White Papers // May 2010

    The Cloud-Ready Data Center Network: Apply the Lessons of Cloud Computing to Vastly Improve Economics and Experience

    Cloud computing represents a new way to deliver and use services on a shared IT infrastructure. Previously, applications and hardware were linked, and applications were resident on specifically designated hardware for compute and storage. With cloud computing, the functionality of these same software and hardware products is delivered in a...

    Provided By Juniper Networks

  • White Papers // Oct 2009

    Identity Federation in a Hybrid Cloud Computing Environment Solution Guide

    Cloud computing provides on demand and at scale services for infrastructure, platform, and applications based on an off premise, pay-as-one-go operational model. The enterprise benefits from cloud computing in many ways, from adopting a cloud computing solution to build "Cloud ready" data centers or private cloud data centers, to consuming...

    Provided By Juniper Networks

  • White Papers // May 2010

    Extending the Virtualization Advantage With Network Virtualization: Virtualization Techniques in Juniper Networks MX Series 3D Universal Edge Routers

    This paper discusses the numerous virtualization technologies in Juniper Networks MX Series 3D Universal Edge Routers, and Juniper's network virtualization strategy and virtualization solutions. It also provides specific examples on how network-based virtualization helps achieve business goals. Today's competitive environment and economy are driving organizations to respond to ever-increasing business...

    Provided By Juniper Networks

  • White Papers // Oct 2010

    Control Plane Scaling and Router Virtualization

    Over the last few years, service providers have seen a dramatic shift in the business. Traditional revenues have been flat or declining, and increasingly, revenue is decoupled from the traffic being carried over networks, as customer's access content and services offered by third parties. In order to compete successfully, service...

    Provided By Juniper Networks

  • White Papers // Oct 2010

    GPS Verification for Leak Detection and Repair

    In striving to solve the critical issues facing today's society, one would consider pollution, climate change, financial losses, and threats to health and safety as legitimate concerns. In efforts to reduce impact of the aforementioned issues, the U.S. Environmental Protection Agency (EPA) has developed fugitive emissions compliance programs in which...

    Provided By Juniper Networks

  • White Papers // Apr 2009

    Time-Domain Approach to Energy Efficiency in High-Performance Network Element Design

    Energy efficiency is a corner stone of sustainability in data center and high-performance networking. Yet, there is a notable structural mismatch between networking element development practices and experiential equipment utilization. In particular, some aspects of energy usage (such as elasticity) routinely remains out of focus at the system level, restricting...

    Provided By Juniper Networks

  • Case Studies // Mar 2012

    CODONiS Turns to Juniper Networks QFabric to Deliver Data -Intensive Healthcare From the Cloud

    CODONiS delivers a world-class life sciences computing platform that is designed to help customers accelerate research. Their challenges are to create a world-class life sciences and healthcare computing platform. Advance healthcare and life sciences research through computational breakthroughs. CODONiS deployed Juniper Networks' groundbreaking data center solution, based on the Juniper...

    Provided By Juniper Networks

  • White Papers // Aug 2012

    Green Telecom Metrics in Perspective

    A fast and parallel evolution of ways to measure and assess energy efficiency in telecom has resulted in an entangled web of drafts and recommendations originating from government, research, and standards organizations. This paper focuses primarily on so-called "Large network equipment" metrics and intends to capture state-of-the-art in this area...

    Provided By Juniper Networks

  • White Papers // Feb 2012

    Wireless LAN Reliability in the Unwired Enterprise

    The unwired enterprise has long been a goal in most organizations, and the advent of 802.11n now makes achieving that goal a practical reality. 802.11n and the proliferation of mobile devices are driving the migration from wired to wireless networks throughout the enterprise. But are wireless LANs up to the...

    Provided By Juniper Networks

  • White Papers // Oct 2009

    Cloud Services and Cloud Infrastructure: The Critical Role of High-Performance Networks

    Juniper is uniquely qualified to provide the network infrastructure for cloud computing. Based on one's breadth of experience across service provider and data center networks, and the depth of innovation across silicon, systems and software, one has proven the ability to tackle the tough challenges at the economies of scale...

    Provided By Juniper Networks

  • White Papers // Jan 2009

    Banking on the Mobile

    Juniper Research defines mobile banking as "The provision of banking services to customers on their mobile devices": specifically one means the operation of bank current and deposit or savings accounts. In terms of definition of "Mobile device", the paper makes the distinction that the primary function must be mobile telephony....

    Provided By Juniper Networks

  • White Papers // Oct 2009

    VMware View With Juniper Networks SA Series SSL VPN Appliances: Configuring Secure SSL VPN Access in a VMware Virtual Desktop Environment

    Customers running a VMware View environment don't just want secure access for virtual desktop sessions, they want convenience as well. With this in mind, Juniper Networks SA Series SSL VPN Appliances extend the security deployment by brokering connections to virtual machines and providing Single Sign-On (SSO) when users access their...

    Provided By Juniper Networks

  • White Papers // Dec 2009

    10 Easy Steps to Secure Teleworking

    The convergence of new technologies and business trends, along with employee preferences to work from home, is driving a rapid growth in telework. Additionally, the growth of web-enabled applications, collaboration tools and Virtual Private Network (VPN) technology has helped government departments and agencies of all sizes to allow their employees...

    Provided By Juniper Networks

  • White Papers // Oct 2009

    Data Center Fabric for Cloud Networks: Laying the Foundation for Next-Generation Cloud Infrastructures

    Legacy network architectures are inhibiting today's data centers as IT organizations continue the struggle to keep up with the burgeoning growth of Internet-enabled application services, servers, storage infrastructures and network traffic. The impact of legacy approaches on modern data centers aggravates management complexity and escalates operating costs, while offering little...

    Provided By Juniper Networks

  • White Papers // Feb 2009

    Virtualization in the Core of the Network: New Dimensions of Flexibility and Scale in Service Provider Networks

    This paper is essential reading for business decision makers (up to the CxO level) in both service provider and large enterprise environments. The paper describes a unique solution set for virtualizing a service provider network through an intelligent partitioning of resources in the forwarding, control and service planes. While the...

    Provided By Juniper Networks

  • White Papers // Apr 2010

    OTN Interfaces for IP Over DWDM: IP-Optical Integration for Managing Wavelengths in Routers

    Traffic growth across core networks has proven to be a major driver for IP-optical integration. As time-division multiplexing (TDM)-based framing at Layer 2 has been discarded in favor of simpler architectures, there has been an increasing need for a technology to replace the performance monitoring and fault-handling characteristics of SONET....

    Provided By Juniper Networks

  • White Papers // Oct 2009

    Security Considerations for Cloud-Ready Data Centers

    Data centers have evolved significantly as organizations consolidate servers, applications, and other resources, and as they adopt new technologies as a means to reduce costs and increase efficiency. Technologies such as server virtualization, distributed application tools, and IP-based storage are helping organizations maximize their data center resources, while at the...

    Provided By Juniper Networks

  • White Papers // Feb 2009

    VLAN Design for IPTV/Multiplay Networks: Understanding the Alternatives

    VLANs limit the broadcast domain, ensuring that subscribers cannot see each other's information and also reducing network traffic. They are a fundamental part of how broadband access networks deliver information to subscribers. There are two ways that VLANs are used in this role. A service VLAN (S-VLAN) delivers a single...

    Provided By Juniper Networks

  • White Papers // Oct 2009

    Network Operating System Evolution: Juniper Networks JUNOS Software - Architectural Choices at the Forefront of Networking

    This paper picks up the Juniper Networks JUNOS Software to understand the requirements and challenges that come with the design of a carrier-class network Operating System (OS). The paper cites key facets of the JUNOS Software, which is Juniper's network operating system, to illustrate the evolution of OS design. The...

    Provided By Juniper Networks

  • White Papers // Dec 2009

    Addressing Scaling Challenges in the Data Center: Juniper Networks Virtual Chassis Solution

    Data centers of organization today are constructed while keeping in mind the need for maximum computing, power management, and performance ability. These data centers are made using three-layer hierarchical structure. These organizations face many disputes for their data centers including scaling and operational challenges. This paper discusses how the Juniper...

    Provided By Juniper Networks

  • White Papers // Feb 2009

    802.1X: Port-Based Authentication Standard for Network Access Control (NACnac)

    They require a mechanism that can verify the credentials of all those accessing their network and at the same time check authenticity of other network enterprises with which they are being connected. An identity based access to network not only increases security significantly but also reduces the move of Information...

    Provided By Juniper Networks

  • White Papers // May 2010

    Antivirus for Branch SRX Series and J Series

    An Anti-Virus is an established part of any Unified Threat Management (UTM) suite and has been available on firewalls for many years. Although the introduction of Web 2.0 has created new security requirements, an antivirus remains an integral part of any security strategy. When deciding to use up an Anti-Virus,...

    Provided By Juniper Networks

  • White Papers // Feb 2009

    Do You Need a Broad Band Remote Access Server?

    The BSR (Broadband Service Router) has evolved over time to provide a myriad of capabilities targeted at improving the service provider's ability to control what each subscriber is doing based upon the service they have signed up for, as well as simplifying overall network operations. There are several functions that...

    Provided By Juniper Networks

  • White Papers // Feb 2009

    Enabling Carrier-Class Unified Communications With Juniper Networks EX Series Ethernet Switches

    Unified communications can significantly streamline business communications by expediting business processes and boosting corporate responsiveness. However, to deliver this value, unified communications applications and services must be deployed on top of a converged IP network that provides carrier-class reliability, performance and security. Juniper Networks understands the unique demands unified communications...

    Provided By Juniper Networks

  • White Papers // Aug 2010

    Introduction to Carrier Ethernet VPNs: Understanding the Alternative

    There are a wide range of VPN technologies available. MPLS-based VPNs are the most prevalent technology types used today, with many based on the use of Ethernet transport to provide high-speed communications. This paper describes the various MPLS-based Ethernet VPN services and technologies which Juniper Networks supports. These include Juniper's...

    Provided By Juniper Networks

  • White Papers // Jan 2010

    Seamless MPLS

    Just when one thought that MPLS has peaked, that the pace of innovation has slowed, and that MPLS is getting boring, two promising new developments - namely "MPLS in the access" and "seamless MPLS" - bring fresh excitement to service provider networks. MPLS in the access is evolutionary, but a...

    Provided By Juniper Networks

  • White Papers // Dec 2009

    SSL VPN: The Ideal Approach for Establishing Secure Access to Virtual Desktop Infrastructure Solutions

    Because of the many technical and business-oriented benefits it provides, Virtual Desktop Infrastructure (VDI) appears well on its way to becoming a mainstream IT solution. What organizations need to realize, however, is that maximizing these gains depends on establishing a means to secure remote access. For that matter, what users...

    Provided By Juniper Networks

  • White Papers // Mar 2010

    Meeting the Cyber Security Challenge: High-Performance, Secure Networking for Federal Agencies

    From the White House through every level of the government, economy, and society, the security of the information and communications networks is clearly a top national priority. Ongoing attacks on the defense, energy, healthcare, and other systems have become increasingly sophisticated and have been well documented. These serious and growing...

    Provided By Juniper Networks

  • White Papers // Apr 2010

    Checkout the Mobile Payment Opportunity!

    The definition of a mobile payment is often open to interpretation and can differ from source to source. Juniper Research has a simple definition of a mobile payment as payment for goods or services with a mobile device such as a phone, Personal Digital Assistant (PDA), or other such device....

    Provided By Juniper Networks

  • White Papers // Jun 2004

    HTML overview on T-series

    Please provide abstract

    Provided By Juniper Networks

  • Case Studies // Dec 2008

    Juniper Networks Puts Bangchak Petroleum on Track for ISO 27001 Certification

    Bangchak Petroleum is a Thai energy company which operates an oil refinery with a capacity of 120,000 barrels per day. Bangchak Petroleum wanted to establish a highly secure system that would enable the company to conform to the ISO 27001 information security management standard. Bangchak Petroleum deployed the Juniper Networks...

    Provided By Juniper Networks

  • White Papers // Feb 2009

    MPLS PLug-and-PLay for Metro Ethernet Networks

    This paper will focus on an opportunity to revolutionize the way Metro Ethernet networks are built by applying the concept of MPLS Plug-and-Play, a technology developed by Juniper Networks. MPLS Plug-and-Play offers carriers a way to reduce the operating expense associated with deploying and managing MPLS-based Metro Ethernet networks while...

    Provided By Juniper Networks

  • White Papers // Mar 2009

    Emerging Multicast VPN Applications: Drivers for Scalable Next-Generation Multicast VPN

    Several emerging multicast applications require virtualization to support service delivery, traffic separation, and new business models. A more scalable and flexible approach to implementing Multicast VPN (MVPN) is being deployed in service provider, financial, and enterprise networks to effectively support these emerging applications, while achieving greater economies of scale.

    Provided By Juniper Networks

  • White Papers // Feb 2009

    Juniper Networks EX Series Ethernet Switches: QoS-Enabling the Enterprise - Assuring End-to-End Application Performance

    Building a multiservice network is a strategic initiative that shouldn't be stymied by QoS pitfalls. Juniper Networks designed the EX3200, EX4200 and EX8200 switches to simplify creating a converged infrastructure. The EX Series switches enable enterprises to deliver predictable performance for any combination of traffic with the least possible administrative...

    Provided By Juniper Networks

  • White Papers // Feb 2009

    Meeting PCI Data Security Standards With Juniper Networks STRM Series Security Threat Response Managers

    PCI DSS stands for Payment Card Industry Data Security Standard. This standard was created by major credit card companies to ensure privacy and security of credit card holders. All organization small or large that deals with any credit card processing and transactions need to comply with the standards to avoid...

    Provided By Juniper Networks

  • White Papers // Mar 2009

    Defending Against the Insider Threat

    The security threat posed by company insiders is all too real. In these times of economic uncertainty and widespread layoffs, the potential to create disgruntled employees is all the greater. But there are steps one can take to protect one's self, starting with a sound, defense-in-depth, collaborative security strategy that...

    Provided By Juniper Networks