Andy Ory, VP & General Manager, Juniper Networks

SD-WAN to the Future

SD-WAN
Andy Ory Headshot
For this dicussion about SD-WAN and tunnels, this image shows two men standing in front of an analog clock showing 10:04. The man on the left has a white lab coat, while the man on the right has an orange puffy vest.

“Tunnels? Where we’re going, we don’t need tunnels.”

Making your network tunnel-free with Session Smart leads to better user experiences, simpler operations, and more robust security, while reducing infrastructure costs and bandwidth consumption. In this webinar, Andy Ory and Patrick MeLampy explain how cloud and mobility have left tunnels in the past, how Session Smart Routing makes next-generation SD-WAN possible, and why conventional IP routing is no longer the solution of choice.

Show more

You’ll learn

  • How cloud and mobility have left tunnels in the past

  • How Session Smart Routing makes next-gen SD-WAN possible

  • Why conventional IP routing is no longer the way to go

Who is this for?

Network Professionals Security Professionals

Host

Andy Ory Headshot
Andy Ory
VP & General Manager, Juniper Networks

Guest speakers

Patrick Melampy Headshot
Patrick MeLampy
Juniper Fellow, Juniper Networks

Transcript

00:01 [Music]

00:27 [Music]

00:36 doc you won't believe this but in 2028

00:39 there were no more tunnels used in

00:40 networking how in the world did they get

00:42 the packets to go where they wanted them

00:44 to go well see doc starting in 2022

00:47 companies and governments were so

00:49 frustrated that none of their

00:50 orchestrated tunnel solutions could talk

00:52 to each other we went from having a

00:54 truly useful internet to a mess of

00:56 proprietary overlays

00:58 the standards process was effective the

01:00 ietf realized that the only remaining

01:02 purpose of a tunnel was to get a packet

01:04 to go where it wouldn't go otherwise by

01:07 instead identifying the destination as

01:09 of a packet as a word and not as an

01:12 address that gets rewritten or reused

01:14 they solved all of their problems

01:17 how did this impact the world well for

01:19 the first time in decades things got

01:20 simpler

01:22 using words to describe tenants and

01:23 services became a powerful way to

01:25 express network intent

01:27 once accurately expressed routers were

01:29 able to deliver on experiences like

01:31 never before so i would say experience

01:34 based networking really took hold here

01:36 are some examples file downloads went

01:38 faster bandwidth requirements at data

01:41 centers dropped by 30 percent saving

01:43 lots of money on circuits and head-end

01:45 equipment and due to an infusion of ai

01:47 the cost of network operations were

01:49 reduced substantially what happened to

01:52 sd-wan

01:53 well multi-path routing remains to this

01:55 day honestly multi-path routing is

01:58 something routers should have been

01:59 capable of from the onset of the

02:00 internet the missing capabilities

02:03 required to direct a path for a session

02:05 or service a tunnel was the only

02:08 approach prior to the development of

02:09 secure vector routing by juniper

02:11 networks now every router in the world

02:13 supports multi-path routing and the

02:15 sd-wan use case is now just the routing

02:18 use case i want to buy some stock and

02:20 hold it to 2028 what are the companies

02:22 that transform networking away from

02:24 overlays and underlays i can't give you

02:27 any investment advice but juniper

02:28 networks appears to once again be the

02:30 company that transformed the industry

02:32 they did it at the dawn of the internet

02:34 with the development of asics for

02:36 forwarding and they did it again 30

02:38 years later with the development of

02:39 secure vector routing

02:44 great scott i've never heard of ipv7

02:47 ipv6 was codified in the 90s and was

02:50 still not fully implemented after 30

02:52 years what is ipv7 well doc sometimes

02:56 things are held back because of a

02:57 specific reason

02:59 network address is so widely used we're

03:01 preventing change running two internets

03:03 the ipv4 and the ipv6 was the plan for

03:06 30 years and since both worked it was

03:08 believed to be only a matter of time but

03:10 the transition never completed with

03:12 juniper leading the way towards using an

03:14 addressing system based on words that

03:16 operated over top of the existing

03:18 hodgepodge of networks the addressing

03:21 issue went away ipv7 was born as a

03:24 simple way to subscribe for services by

03:26 name

03:26 dns was mothballed and applications were

03:29 simply requested by name routers had

03:32 routing tables that could turn names

03:33 into locations unexpectedly the world

03:36 shifted to a sub-pub model for

03:38 requesting access to services many of

03:41 the security problems that existed went

03:44 away

03:45 how does this work i can't believe it

03:48 well it uses metadata cookies these are

03:50 inserted into the payload portion of

03:52 packets and used to communicate network

03:54 intent to upstream routers the cool

03:56 thing doc is that this information makes

03:58 it through metal boxes carry grade gnats

04:01 load balancers firewalls and that can

04:03 only be read by the intended next hop

04:05 router so communicating network intent

04:08 via cookies change networking

04:10 but all the application guys use cookies

04:12 today

04:13 this doesn't seem so far-fetched marty i

04:16 wonder why it took so long

04:18 sometimes the future is obvious when you

04:20 look back on it

04:27 well after jeff bezos and elon musk left

04:30 for other solar systems the hyperscale

04:32 big tech company emerged into an even

04:34 larger behemoth

04:36 every single network server in the world

04:38 is now run in a micro google zone data

04:40 center

04:41 how did this change networking well the

04:44 shape of the network has always been

04:45 changing but in their 20s the changing

04:48 shape accelerated the hyperscalers of

04:50 that day developed large worldwide

04:52 networking footprints to connect clients

04:54 anywhere to servers in their data

04:56 centers the concepts of wan and sd-wan

04:58 were challenged what was needed were

05:00 easy to use software capabilities that

05:02 could operate inside the hyperscaler

05:04 servers to bring back network elegance

05:07 and control to enterprises so in the

05:09 future

05:10 corporations will still control their

05:12 own networks yeah i mean the digital

05:15 backbones of companies have become the

05:17 most important infrastructure they own

05:19 they need to control their own networks

05:21 for security and competitive advantage

05:23 they now use ai and ml to assist in

05:26 operating everything

05:27 but but why did the democrats and the

05:29 republicans go away well they didn't

05:31 really go away the prevalence of hackers

05:33 and political operatives and even fake

05:35 news went completely away when networks

05:38 had good audit trails without

05:39 misinformation people started to realize

05:42 we all share the same goals we still

05:44 have political parties but secure access

05:46 to reliable information has changed the

05:48 debate

05:52 doc probably the biggest surprise is

05:54 that the giant security problems we had

05:56 in the early part of the 2020s decade

05:59 has gone away but but marty

06:01 how could this happen

06:03 with the advent of router to router

06:05 authentication and identify identifying

06:08 every session in detail with an audit

06:10 trail defined by an end-to-end

06:12 identifier scams were rapidly terminated

06:15 but probably more important was creating

06:17 smaller network communication segments

06:19 that allowed communications only for

06:21 specific clients and services for a

06:23 single purpose

06:24 they call this hyper segmentation it's

06:26 like taking the internet and breaking it

06:28 into millions of smaller networks each

06:30 with a small subset of users and servers

06:33 wow so what happened to anywhere to

06:36 anywhere anonymous anybody can send

06:38 anything to anybody internet well

06:41 frankly society we just couldn't

06:42 continue to operate that way governments

06:45 were held hostage along with

06:46 infrastructure companies by attackers we

06:48 also couldn't stop using the network we

06:50 were really at a breaking point did did

06:52 sassy help

06:53 well sassy was the beginning of a set of

06:55 revolutions in security the first

06:57 revolution came when basically no one

06:59 could trust anyone also called zero

07:01 trust this paved the way to large

07:04 cloud-based security products they had

07:06 to be in the cloud due to the processing

07:08 requirements large databases of

07:09 real-time information and the

07:11 efficiencies of scale

07:14 so

07:14 it was like the great firewall of china

07:17 no not really

07:18 security became much more service

07:20 specific some types of services require

07:22 very specific security in fact

07:24 separating all of the services into

07:26 separate networks helped prevent losses

07:28 when a breach occurs

07:30 what was needed from the network is very

07:32 simple specific capabilities to loop in

07:35 the closest and best security for a

07:37 specific application or service

07:39 how did they stop attackers from always

07:42 breaking in i mean virtually every

07:43 attack for decades was tied to tricking

07:45 someone into executing code on a trusted

07:47 machine by not trusting any machine we

07:50 made a one large step forward

07:52 once access was obtained exfiltration or

07:54 attacks can be mounted to get the

07:56 executed code onto a machine urls are

07:59 often used or attachments to emails all

08:01 that was required was to trick a human

08:03 that's trusted into clicking on

08:04 something the genius of ai and ml came

08:07 to the forefront of 14 attackers and

08:09 hackers in the famous pandemic of 2021

08:13 the way we contained the virus was to

08:15 segment ourselves as much as possible we

08:17 had to identify and track the infected

08:19 people and quarantine them

08:21 we had to develop complex predictive

08:23 models and we had to find a safe vaccine

08:26 vaccine to inoculate everyone

08:28 the sassy solutions accomplished all

08:30 four of these to wipe out fraud scams

08:32 and attacks on the internet

08:38 you know doc what i found most

08:39 astounding is the esteem and reverence

08:41 that i.t professionals had in the future

08:44 they had a seat at the executive

08:45 roundtable and were involved in every

08:47 aspect of a business turns out digital

08:50 infrastructure of companies defined

08:52 their profit profitability more than any

08:54 other single thing

08:56 marty that's a huge difference from our

08:58 day i.t managers are often not

09:01 appreciated

09:02 yeah you know ai changed everything

09:05 i.t guys went from not really knowing

09:07 how their networks were being used to

09:09 having a seat at the board room

09:11 by learning about applications and

09:12 services it leaders became business

09:15 leaders having network intelligence or

09:17 network knowledge of how digital assets

09:20 were operating became the key source of

09:22 competitive advantage now everybody

09:24 wants to talk to the i.t guy

09:26 why did it take 50 years to get there

09:29 what's preventing us from doing these

09:31 things now well you know our networks

09:33 are multi-layered and today tunnel based

09:36 it's very hard to get useful telemetry

09:38 we try to recognize applications on the

09:41 fly but this has become harder

09:43 everything is encrypted and dns queries

09:45 are now completely invisible google and

09:48 facebook succeeded in getting sni

09:50 encrypted which was the last means of

09:52 identifying applications

09:55 so

09:56 if application creators and owners don't

09:59 want networks to know what's happening

10:01 how how did this amazing transformation

10:04 occur

10:04 well you know the application guys

10:06 aren't afraid of their names but they

10:08 are highly concerned about security ip

10:11 addresses and

10:12 network infrastructure and so forth so

10:15 when changing from using ip addresses to

10:18 names with ipv7 the application guys

10:20 started publishing their applications in

10:22 routing databases

10:24 did this make things better well it was

10:26 perhaps the biggest revolution so no

10:28 longer do application owners have to

10:30 publish list of ip addresses

10:32 but the pub sub model for obtaining

10:34 routes to applications also allowed

10:36 invitation only access which greatly

10:39 improved security all in application

10:41 guys started to cooperate with the

10:43 network guys and you know what they sang

10:45 kumbaya together

10:50 i was very surprised to learn that

10:51 juniper has been added to the dow jones

10:53 index you know it replaced cisco systems

10:56 cisco tried to fight progress but the

10:58 hyperscalers and application developers

11:00 really wanted a network that focused on

11:02 experience as soon as the application

11:04 guys discovered that juniper solutions

11:06 were experience based they became the

11:08 dominant force in networking

11:10 what happened to cisco well they

11:12 actually merged with a food services

11:13 company by the same sounding name

11:15 s-y-s-c-o you ever hear this yeah

11:17 now the bulk of their revenues are from

11:19 selling macaroni i heard biff got a job

11:21 at cisco

11:22 i guess i'm not gonna warn him

11:30 okay so

11:31 we we we

11:34 you know acting is not our long suit

11:37 but we really appreciate this time um

11:40 you know what what is really serious is

11:44 how important our networks are and what

11:46 we can learn from the past because we

11:47 can't really travel into the future but

11:49 if we learn from the past and look at

11:50 the challenges today we can start to

11:52 infer what are the right kinds of

11:54 solutions

11:55 you know an example would be if everyone

11:57 on this webinar looked out their window

11:59 and could visualize 500 billion dollars

12:02 of infrastructure global infrastructure

12:05 that drives the world's economy connects

12:08 us all and it's made up really would be

12:10 in three colors storage compute and

12:13 network

12:14 and what's happened is that storage and

12:16 compute have forever changed i mean

12:18 think about it when you go buy a laptop

12:20 it doesn't even have a disk drive

12:21 anymore your storage is in the cloud

12:24 and and compute you know vmware and

12:26 virtualization just changed the dynamics

12:28 and the economics of being able to

12:30 deploy things like data centers at gale

12:33 same thing's going to happen to

12:34 networking and the reason is both

12:36 storage and compute had general purpose

12:39 compute separating from the software and

12:41 the software could spin

12:43 free and innovate and you know it was

12:45 mark andreasen that you know said maybe

12:47 25 years ago software is going to eat

12:49 the world it's it's software can

12:51 innovate so quickly and so we've worked

12:53 really hard to separate the routing

12:55 software from any underlying hardware

12:57 requirements and really innovate and we

13:00 think that networking is going to

13:02 undergo the same revolution and

13:04 transformation and have the same kind of

13:06 business impact and opportunities as

13:08 storage and compute did one of the key

13:10 things is advancement without technical

13:12 debt you know this notion of putting

13:14 layers upon layers of complexity to

13:16 solve your current problem but just

13:18 making things more unwieldy you know pat

13:21 talk to us a little bit about technical

13:22 debt is that is that what's happening in

13:24 2021 and how do we avoid it

13:28 yeah you know it is my opinion that

13:29 there that um we're accumulating

13:31 technical debt in our networks at a

13:33 pretty rapid pace

13:34 you know in evidence of that that's easy

13:36 to see is there's like calls right now

13:38 for standards uh to be established so

13:41 that um

13:42 tunnel tunnels that are being

13:44 orchestrated

13:45 uh by one vendor can talk to tunnels

13:48 being orchestrated by another vendor or

13:50 even another instance of the same vendor

13:53 you know the fact that these sd-wan

13:55 solutions can't talk to each other is a

13:57 giant problem

13:58 it's also a problem that they're all

14:00 using slightly different proprietary

14:03 headers and information you know we the

14:06 the way that the network has become so

14:08 ubiquitous and powerful over over the

14:10 ages is because we've all used the same

14:13 protocols and and subscribe to standard

14:16 standards are very very important

14:18 you know

14:19 lately i've seen a bunch of standard

14:21 proposals being made for

14:23 people that want the overlay network to

14:26 actually communicate with and send

14:28 security events and and uh with the

14:31 underlay so you you know if an alarm or

14:34 a circuit issue or route issue happens

14:36 in the underlay you need to tell the

14:38 overlay and vice versa and you know it's

14:40 it's sort of maddening um

14:43 in terms of the amount of debt we're

14:44 accumulating and most recently i'll give

14:46 you you know another example of how

14:48 we're overloading existing protocols to

14:51 the extent that is probably going to

14:53 drive us uh to another breaking point so

14:56 the to the dns subsystem is really used

14:59 for routing today the dns system answers

15:01 the question for every client

15:04 not just what is the address of a

15:06 particular server but where is the best

15:08 server for me at this moment in time now

15:12 and so that's really a routine that

15:14 really should be the choice of the

15:16 network and not the choice of of dns i

15:18 mean dns is provisioned and populated

15:21 and takes you know 10 12 15 minutes for

15:24 it to be updated and we're using dns now

15:27 with very very short leases which is how

15:29 long the information is valid sometimes

15:31 measured in seconds and that's because

15:33 we want

15:34 clients to keep coming back to get new

15:36 information so we can do

15:38 spread stuff out do load balancing and

15:40 run our the internet in a different way

15:43 using dns as part of our routing

15:44 solution

15:46 you know so it's very important that um

15:49 that we pay attention to uh these kinds

15:52 of technologies that are being stretched

15:55 and

15:55 hopefully uh avoid sort of piling on the

15:58 tech and creating problems that just

16:00 won't go away and then solving them with

16:02 yet another another layer

16:05 so andy um

16:08 one of the you really strike uh it's it

16:11 sounds so interesting when you talk

16:12 about innovation and software and

16:14 why is it that

16:16 you know big companies oftentimes really

16:19 struggle with being innovative

16:22 you know well i mean the the truth is

16:24 innovation requires little companies and

16:27 big companies small groups and large

16:29 groups because it's not just the idea

16:31 it's not it's not a science experiment

16:33 it actually is delivering a solution

16:35 that has impactful positive business

16:38 outcomes in a sustained and scalable way

16:41 and so what you have is you have little

16:42 focused

16:43 organizations that worship from the

16:45 altar of disruption and speed whereas

16:48 you have larger organizations that are

16:50 about customer intimacy and business

16:52 predictability and so really it's almost

16:55 like a texas two-step and you know what

16:57 you find are small organizations can

17:00 really innovate and then need to partner

17:02 with the larger organizations to become

17:04 part of a broader context and you know

17:08 that that's a transition that we as an

17:10 organization went through about six

17:12 months ago you know so we patrick and i

17:16 are two of the seven co-founders of 128

17:18 technology and about six months ago we

17:21 found one of the greatest if not the

17:23 greatest routing company the most

17:25 innovative routing company in the world

17:27 where we were cohabitating a very large

17:29 10 000 site deployment in retail health

17:32 care and we realize one plus one really

17:34 equals four

17:36 and so

17:37 um you know we're able to provide

17:39 innovation and juniper is able to

17:42 provide full stack integration they're

17:44 able to provide comprehensive

17:46 uh security solutions they provide ml

17:49 and ai and cloud things that we don't

17:51 have and so it really is important that

17:54 you have both of those elements so that

17:56 the sustainable business outcomes can be

17:58 affected

17:59 you know sometimes what happens that big

18:01 companies themselves just try and

18:03 innovate without any real insight and it

18:07 ends up being that we pile on to an

18:09 existing technology in a way that just

18:11 isn't so valuable and starts to become

18:13 unwieldy and maybe even inefficient or

18:16 cause problems i'm pat do you want to i

18:18 know you have one that you want to talk

18:19 about

18:21 yeah you know

18:23 it's really interesting like um

18:25 the way the network works and i'm not

18:27 sure how many people know this but the

18:29 way it evolved was that uh it's all

18:32 based on tcp and with tcp you know in

18:35 the early days

18:36 andy i had the same problem in one of my

18:38 webinars don't touch the papers near

18:40 your computer

18:42 i'm so sorry

18:43 it's okay you do it very very carefully

18:46 it comes across very loud um

18:50 so the interesting part is is uh the way

18:52 the tcp operates is is it it never knows

18:56 how fast the network is

18:58 the client and server have no clue and

19:00 the server can send out packets way

19:02 faster than the network can can can

19:04 deliver them which would result in all

19:06 of those packets being dropped and

19:08 having to be retransmitted to prevent

19:10 this from happening over and over again

19:12 every time there's a client server uh

19:14 session that gets established the tcp

19:16 protocol starts slow and sort of ramps

19:19 up speed and when it gets to the point

19:22 where it's going as fast as the

19:24 end-to-end connection will allow a

19:26 packet will be dropped and when that

19:28 packet's dropped it signals the server

19:30 don't go any faster and it also signals

19:32 the client don't go any faster so

19:34 everybody sort of settles down locks in

19:36 and understands oh this is how fast i

19:38 can go and and without dropping packets

19:41 and that's how the the whole internet

19:43 works now the sd-wan guys

19:45 several of them

19:47 tout forward air correction as a way to

19:49 replace a packet that was dropped in the

19:51 middle of the network

19:52 and what's funny is is dropping packets

19:55 is essential for the network to work

19:57 correctly and so now the you know these

19:59 tunnels um because they're aggregate

20:01 flows and because

20:03 they're not a single inside of these

20:05 tunnels are hundreds if not thousands of

20:07 individual flows

20:09 because they're such large what we call

20:11 elephant flows they suffer more random

20:14 early discard than

20:16 than if if all of those sessions had

20:17 been uh separate and in different flows

20:20 going through the same routed network

20:22 first they would be spread out as much

20:24 and they wouldn't all be impacted by

20:25 random early discard but when a discard

20:27 occurs it's more likely to happen on a

20:29 tunnel so by adding forward air

20:31 correction they can recover that packet

20:33 but recovering that packet doesn't make

20:35 sense with the tcp standard and so

20:39 it and the worst part about it is is it

20:41 consumes up to 33

20:43 additional bandwidth on top of the

20:45 on top of the tunnel overhead so it's an

20:48 example yet of another sort of

20:50 solution to a problem that we created by

20:54 solving the problem with more tech you

20:56 know we need to get back to basics of

20:58 routing packets

20:59 if tunnel's only purpose is to get a

21:02 packet to go where it wouldn't go

21:03 otherwise we need to fix the way routing

21:06 works and that's what 128 technology did

21:09 and that's why juniper acquired us

21:12 you know andy um

21:14 it's really fascinating

21:19 because some you know that businesses

21:22 really really need to focus on their

21:24 digital infrastructure it's so important

21:26 to how they run maybe you could talk for

21:28 you know i i'm certainly interested in

21:30 your views on how

21:31 important the i.t profession and the

21:34 digital infrastructure of their

21:36 companies are and maybe you can comment

21:38 on that

21:39 yeah it's funny you know in the in the

21:41 present you know the little movie clip

21:43 you and i did um

21:45 we talked about the importance of the

21:47 i.t professional and uh it's true that i

21:51 t you know most people don't understand

21:53 in their organization what the cio does

21:55 it's very hard for them to figure it out

21:57 and they tend to look at it as a cost

21:59 center um and and to some extent there's

22:02 some truth to that

22:04 uh we're also seeing that um we're

22:06 outsourcing everything to the cloud you

22:08 know we're moving more and more to the

22:09 cloud and you tend not to outsource

22:11 things that are strategic and so these

22:14 are these tend to be short you know i

22:17 think that that this is a short-term

22:19 move of what's really going to happen to

22:20 i.t i think that it and the it

22:23 profession is going to become incredibly

22:25 strategic to every one of these large

22:28 corporations because as they digitally

22:30 transform all their engagement and all

22:33 their experience is going to be trolled

22:35 through the lens of what it is able to

22:37 deliver and secure and when you think

22:40 about it we live in a world even today

22:42 where the largest taxi cab company in

22:45 the world doesn't own a single car and

22:47 that's uber and the largest hotel chain

22:50 in the world doesn't own a single hotel

22:52 and that's airbnb and we've seen the

22:55 last 15 months of the pandemic we've

22:57 seen real digital engagement of all of

22:59 our stakeholders whether it's employees

23:01 or partners or customers

23:04 and you know what you realize is that

23:06 the network is where things stop and

23:08 where things start and it is critically

23:10 important so i do think that the next 10

23:12 years it is going to become more

23:15 strategic than it's ever been digital

23:17 transformation is real and the pandemic

23:20 has only served to accelerate it we have

23:22 a saying around juniper

23:24 that experience is the new uptime and it

23:27 and it really is because if people have

23:30 a good experience when they impact when

23:32 they interact with your business they're

23:33 going to do it again and if they have a

23:35 bad experience they may go somewhere

23:37 else and and that's really a big deal um

23:41 you know i've had i i guess i could say

23:43 marty

23:44 i'm kind of kind of uh

23:46 curious what else changed in 2028

23:50 well you know it it's really surprising

23:52 how the worlds of networking and the

23:54 worlds of um the application guys and

23:57 the and the devops guys all sort of

23:59 merge together into

24:02 an amazing world the application guys

24:05 really really have a lot of information

24:07 that the networking guys would like to

24:08 have for example if the user's failing

24:11 to log into a service repeatedly i would

24:14 think the networking guys would like to

24:16 know that secondly if an application

24:18 needs quality uh cost for a particular

24:22 purpose and the application owner is

24:24 willing to pay for it it would be really

24:26 quite nice if the application could

24:28 request that securely of the network

24:31 network intent being communicated

24:33 through the payload portion of packets

24:35 in the form of metadata

24:38 in the future could be incredibly

24:40 powerful way to not only authenticate

24:42 and secure connectivity between routers

24:45 but between routers and servers and

24:47 between clients and and and routed

24:49 networks so i i feel like you know this

24:52 ipv7 we we all make we made fun of it in

24:56 the in the video but there really does

24:58 have to be a new way

25:00 in the future there has to be a new way

25:02 we can't continue to use ip addresses

25:05 the way we've been using them

25:07 and

25:08 use dns to try to put some sense to them

25:11 and to figure out how to run these

25:13 networks securely it and express network

25:15 intent using addresses it's just not

25:18 going to work so i i am uh excited uh

25:21 when when i when we joined juniper i was

25:24 very excited because many of the people

25:26 in in juniper senior uh

25:28 engineering areas are very committed to

25:30 standards and the question started

25:32 coming up right away about well

25:34 when are we going to make secure vector

25:36 routing a standard when is the metadata

25:38 going to go through a standardization

25:39 process we want to make this stuff open

25:41 or we will never

25:43 that's what networking people do and

25:45 that was really good news for me and uh

25:48 we're very excited to say that juniper

25:50 is committed to making these things

25:51 standard and we really need our our

25:54 customers and our our support in in

25:56 achieving that

25:57 um because you know we can't do it

25:59 ourselves we need we need our big

26:01 customers to help us but we're very

26:03 excited about that and i do believe that

26:05 that networking networking is in a a

26:08 sort of a place where it's going to

26:10 change fast not only andy because of the

26:12 things you said

26:14 the introduction and software but also

26:16 incredible brokenness in how it's

26:18 working and how we're just layering on

26:21 more inefficient layers of technology to

26:23 solve problems that only create more

26:25 problems and make things harder to

26:27 understand

26:28 and i just feel like we're at it we're

26:30 at a breaking point and there's going to

26:31 be some fantastic innovation i do

26:33 believe juniper's found it in ai and in

26:37 secure vector routing uh swirled

26:39 together that's my belief

26:42 yeah i mean i mean the thing you know

26:43 patrick and i are new to juniper we've

26:45 been here for a little over half a year

26:48 and so we have fresh eyes and what's

26:51 wonderful first of all is that the

26:52 commitment is authentic

26:54 that the folks are present they believe

26:56 what patrick's saying that change is

26:58 afoot they need to think differently

27:00 they need to partner they need to assess

27:02 their value

27:03 in terms of the impactful business

27:05 outcomes they can have with their

27:07 customers slash partners

27:09 the other thing is that juniper very

27:11 much is in the goldilocks zone

27:13 they're big enough to be global they're

27:15 big enough to have a comprehensive

27:17 solution from full stack at the edge all

27:20 the way into the cloud with all of the

27:22 requisite technologies like ml and ai

27:25 but they're small enough that they can

27:27 all get in a room and they can really

27:28 talk about the issues

27:30 and they're they're the things they buy

27:32 the things they acquire are truly

27:34 impactful

27:35 and

27:36 you know that that's why i think you're

27:37 going to continue to see

27:39 juniper lead through this incredible

27:42 transition

27:43 of what's going on in this market

27:45 so with that i think we ought to open it

27:47 up to questions really appreciate

27:48 everyone's time on this webinar

27:51 pat we're um

27:53 maybe let me move my papers here without

27:55 making too much noise and let's look at

27:56 some of these questions

28:04 so there was a question about um

28:06 ai features and how they helped during

28:08 the course of time in in performance of

28:11 the network

28:13 well i have to say um i always prided

28:16 myself when i was a cto and top

28:18 technologist at both acme packet and 128

28:22 that i i understood everything about

28:24 technology and i can honestly say it's

28:27 embarrassing but i knew nothing about ai

28:29 and ml and i did not appreciate how it

28:32 worked i did not appreciate what it

28:34 could mean or the power that it it has

28:36 andy and i used to sit around

28:38 over having we share an office because

28:41 we're i don't know why we share an

28:42 office which is ridiculous but

28:44 we would sit around and have coffee and

28:46 talk about when cars will drive

28:48 themselves and when they won't

28:50 and um we would argue

28:52 literally for hours about the same topic

28:54 you know

28:55 and of course

28:56 neither of us really knows the answer um

28:59 but

29:00 artificial intelligence is really unique

29:02 and and the way i i'm a i'm a guy that

29:06 has to see it and touch it to believe it

29:09 when i got to juniper and i started

29:10 talking to the data scientists

29:12 at first i said yeah yeah yeah it's all

29:14 crap and then i i saw some of the models

29:17 they have and i was blown away so for

29:20 example we struggled and the best way to

29:23 to explain it is through example we

29:25 struggled and literally

29:27 uh had so much difficulty with some bad

29:30 cables at a large deployment it was a 10

29:32 000

29:33 router deployment at a major retail

29:35 store and and there were two routers at

29:37 every site connected by a two foot long

29:39 cable which provided the dog leg and a

29:42 method of communicating between the

29:43 active and the standby

29:45 because we only saw software at the time

29:48 we were an independent company

29:50 the customer had to go out and buy these

29:52 cables and so they spec them out as cat

29:54 6 cables and they ordered 10 000 of them

29:56 and uh

29:58 you know they

29:59 they're only two foot long cable and you

30:01 know we wound up having a bunch of

30:04 problems and uh

30:06 in these routers and the the the symptom

30:08 was that the uh auto negotiation would

30:11 fluctuate from you know full speed to to

30:14 it would downshift to slower speeds we

30:16 wound up seeing some occasional runts or

30:19 framing errors or or and this was across

30:22 a large number

30:23 of of these different locations and you

30:26 know the end customer was just

30:28 fit to be tied it was they were they

30:29 were excited about the technology but

30:31 frustrated that the hardware wasn't

30:33 working they thought it was the hardware

30:34 we tried swapping the hardware things

30:36 out

30:36 we tried everything and literally after

30:38 three or four weeks we said well gee why

30:41 don't we swap out the cable and they

30:43 didn't believe that the cables could

30:45 cause such a problem but we did swap

30:46 them out at one site and the problem

30:48 went away we then realized that by

30:51 testing the cables and having them

30:53 taking them to a test lab that they were

30:55 insufficient and as much as 10 or 15

30:58 percent of them were bad not all of them

31:00 but they had no way to know of the 10

31:02 000 locations which locations had the

31:05 bag cables and which ones didn't and so

31:07 they wound up having to replace them all

31:09 i got to juniper and the very first

31:12 example they showed me on their aiml was

31:15 a bad cable detection algorithm and you

31:18 know

31:18 they trained it they got data from bad

31:21 cables over and the and the data science

31:23 guys who don't know anything about

31:24 networking or bad cables we're able to

31:26 see the data behind it and able to make

31:29 predictive models of not only cables

31:32 that were actively failing but cables

31:34 that were likely to fail or or degrade

31:37 and keep in mind cable performance is

31:39 tied to lots of things including

31:41 temperature and humidity so

31:43 i have to say that i fell off my chair

31:46 when i saw that and and then i saw some

31:48 of their other models they're developing

31:49 it's truly transformational i mean

31:52 imagine the cost of replacing all those

31:54 cables because you just don't know and

31:56 andy uh i always tell you when i

31:58 remember when i first saw the internet

32:00 and i told you this was going to change

32:01 the world this ai ml and networking is

32:04 going to change networking

32:06 yeah i mean another example are we we

32:09 statically engineer and provision

32:11 pathways on our network for the types of

32:13 services and our biases are programmed

32:15 in there as well so we may sit there and

32:17 say voice needs to go over the mpls

32:19 circuit we'll use the dia circuit for

32:21 something else

32:22 but you know a network a learning

32:24 network is able to look at this and

32:26 might say actually that's not the case

32:28 and so if it's able to harvest in real

32:30 time what's going on it can start

32:33 challenge some of our biases and

32:35 empirically derive what are the best

32:37 ways best paths best resources for the

32:40 kinds of services we want not to mention

32:42 that things are our dynamic

32:45 you know william has a question here

32:46 about you know header compression as a

32:48 way to say bandwidth and before i turn

32:50 that over to pat because we did have an

32:51 argument early on about header

32:53 compression um versus tunnelless

32:56 architectures and what the difference is

32:58 there are so many reasons not just the

33:00 bandwidth savings for not using tunnels

33:03 they're

33:04 bi-directional they provide a trap door

33:06 in the in the return path they increase

33:09 your attack surface area they make it

33:10 very difficult to manage individual

33:13 sessions on a link and dynamically move

33:15 that um there's lots of different

33:17 reasons but pat maybe you want to

33:18 briefly talk about um header compression

33:20 versus what we're doing

33:23 yeah so uh i mean in fact some people

33:26 who are really smart say you're still an

33:27 overlay and you are just compressing

33:29 headers and while that's true

33:32 uh we eliminate all the extra data

33:34 that's sent over and over and over again

33:36 on every packet by by using session

33:38 state to do it what andy said is

33:40 critically important we also enforce the

33:42 return pathway which is what a firewall

33:44 would do

33:45 and and by keeping the the flows

33:48 together into a session uh we've we've

33:50 been able to provide a lot more

33:52 analytics and information that would be

33:55 useful to an ai solution or to a a siem

33:59 solution or to a network owner an

34:00 operator i mean we actually don't need

34:03 to build an a a complete overlay data

34:06 collection and data processing thing to

34:08 figure out what's going on in our

34:09 network we actually know

34:11 so uh

34:12 all of that's really good but in the

34:14 metadata like we talked about

34:16 the metadata being used to compress the

34:18 tunnel or get rid of the tunnel it also

34:20 contains routing intent

34:22 and it's signed and it's signed by the

34:25 first router for the second router

34:27 and it also has a time of day in the

34:30 signature so what winds up happening is

34:32 this means that nothing can be replayed

34:35 this means that that if i'm a router

34:37 talking to another router in the network

34:39 every packet that arrives at that

34:40 interface is absolutely authenticated

34:43 from it its source is authenticatable

34:46 also inside this metadata is a session

34:48 id that is attached or assigned by the

34:51 first router that sees the session and

34:53 and starts the process and so you can

34:56 trace things through the network like an

34:58 audit basis you can actually even on our

35:00 products get traces for a particular

35:03 session through the entire network of

35:04 routers that support the metadata and so

35:07 we

35:08 it's a it's a it's a transformational

35:10 way

35:11 to do uh to express network uh intent

35:14 between between routers that works

35:17 through every firewall every

35:18 carrier-grade net so it really is a

35:20 bigger deal than just header compression

35:23 and andy there was another question here

35:26 yeah

35:26 there was a question here about

35:28 bad actors working their way into ipv7

35:32 um you know

35:35 first of all virtually the entire dns

35:37 infrastructure is is not is used in an

35:40 unencrypted fashion and i know there's

35:42 lots of efforts uh dnssec and there's

35:44 lots of efforts to make people stop

35:46 doing that

35:47 but when you think about

35:50 like like office 365 they publish their

35:53 addresses online so that firewall

35:56 administrators can build rules to

35:59 secure or to increase the security

36:02 between the their their routers or their

36:04 firewalls at their locations and

36:06 microsoft's uh office 365 servers and

36:10 they update this monthly or whatever and

36:13 i think zoom does the same thing i think

36:15 salesforce doesn't say all these basic

36:17 uh software as a service uh guys are

36:20 updating their their addresses and

36:21 information we

36:23 we think that

36:25 and it's all done in a non-standard

36:26 fashion like everyone has their own way

36:28 of doing it

36:29 most people it's a document on an html

36:31 document it's got to be hand entered

36:34 into our extended acls and our routers

36:37 manually and we have to do all the

36:39 the bitwise math uh to make to enter the

36:41 stuff correctly and it's just really

36:44 painstakingly painful and the question

36:46 is would

36:47 application owners uh submit that

36:49 information into a registry that is

36:51 accessible securely i actually think

36:53 they would i think it would be

36:55 you know the nice thing about

36:57 subscription models for information

36:59 routing information is that

37:00 you could publish information in a

37:02 routing database for only those parties

37:04 that you want to obtain it

37:07 and i know it's complicated but you know

37:09 linkedin facebook these are amazing

37:12 networks of of social networks where

37:15 they scale to unbelievable sizes where

37:17 there's a lot of controls over who can

37:19 see what and and who can access what it

37:21 doesn't seem far-fetched to me that that

37:23 couldn't be how the the the router

37:26 network operates in the future

37:29 pat let's see if we can go into the next

37:30 one which is you know expand on using

37:32 words instead of ip addresses

37:35 yeah so inside this metadata that i

37:38 talked about we actually put two words

37:40 in there the one word is the tenant and

37:42 another which is basically the

37:44 identifies the client's network zone or

37:46 security zone or or and and

37:49 and

37:50 the tenant is structured as a as a

37:52 dotted domain-like address so it can

37:55 you can only be in one vlan but you know

37:57 if you use a dotted domain name like

38:00 model you can actually be in a

38:02 hierarchical set of vlans which is

38:05 essentially uh which is what we do so

38:07 you could be you know an employee but

38:09 you could also be a director you could

38:11 also be a a a you know an executive and

38:15 you could

38:16 have all these different tiers defined

38:18 by uh like like a domain address and

38:21 that's the tenant side that

38:22 that's who's wanting the service and

38:24 it's not a 10.0 address or

38:27 it's a real textual name and then the

38:30 service itself is a real textual name

38:33 very similar to a domain name service

38:36 that you would get in dns in fact it's

38:37 identical and so what winds up happening

38:40 is in this network intent you know the

38:42 name of the service the person wants and

38:43 you know who the requester is by

38:45 security zone or by or and and you trust

38:48 it because it's been signed by the the

38:50 branch router so you trust it and it

38:52 gives you information that you wouldn't

38:54 have otherwise so now when you get to

38:57 the other side of the network

38:58 forget you you don't even need dns

39:01 really what you need is you have the

39:02 name of the service you need to know

39:04 where that service is and if that

39:06 service is on a specific address you can

39:08 route you can not nat to that address or

39:10 route straight to that address so that

39:12 the name itself stays in the routing

39:15 system from beginning to end now

39:17 invariably you leave the the

39:20 the domain of this kind of routed

39:22 network and wind up in the old world in

39:24 the old world you are correct you know

39:27 no one's going to be able to read that

39:30 name out until this kind of networking

39:32 ipv7 spreads like wildfire

39:37 i think i answered the question i hope

39:39 yeah yeah

39:41 so um next one is about dna ns and

39:43 cookies playing a role in svr between

39:46 two public ips

39:49 uh where's the question i don't see it

39:50 here oh hold on it says do the dns and

39:54 cookies play any role in svr between two

39:56 public ips

39:59 oh

40:00 um

40:03 well you know

40:05 the public ips classically that we use

40:07 today are not

40:09 really

40:10 they're like um

40:12 like at your branch office no one really

40:14 probably even knows your public address

40:16 um unless you are smart enough to figure

40:18 it out and when you go to a service the

40:20 branch you know the public address

40:22 that's on the edge of the data center

40:25 that your tunnel's using today you may

40:27 not be able to discern as well i think

40:30 the um

40:32 you know the the public addresses in the

40:34 ipv4 network and the ipv6 network are

40:36 like transport addresses that the

40:39 networking world needs to know they need

40:41 i i need to know how to get to the data

40:43 center and then once at the edge of the

40:45 data center how to get to the servers

40:47 that have the service i'm looking for

40:49 and the name that we're putting in the

40:51 metadata helps with both

40:54 we call those public addresses by the

40:56 way at

40:58 uh in our ssr product at juniper we call

41:00 those public addresses waypoints they're

41:02 like if you know ipv6 segment routing

41:05 they're like

41:06 um

41:07 the segments they're they're like the

41:09 the the the

41:10 the instance of the fact

41:13 and pat where you're going to go i want

41:15 let me loop two questions into what

41:16 you're about to say because it's

41:18 important we had a question about is

41:20 this name data routing and we had a

41:21 question about how is this different

41:23 from segment routing and i remember

41:26 around our shop for the last five years

41:28 you would talk about you know the recipe

41:30 for doing what we do is taking segment

41:32 routing some name data routing and some

41:34 lisp and stirring it together maybe we

41:36 want to maybe you want to talk a little

41:37 bit about that i think that'll put name

41:39 data routing and segment routing into

41:40 context

41:42 yeah sure so name data routing it does

41:44 suggest that you you route to named

41:46 objects on on the internet and let the

41:48 network figure out where they are

41:51 and in a sense we do that only you know

41:54 so

41:55 that's why it's one part name data

41:57 networking um although

42:00 name data networking operates on top of

42:02 an existing network it requires a

42:04 complete change in how clients and

42:06 servers operate and so

42:08 we on the other hand

42:10 uh can bridge the old world to this

42:13 named world by using our router as a way

42:16 of applying those kinds of policies

42:18 with lisp you know it's it

42:20 it has too weak it has a weakness and it

42:22 has a strength the strength the strength

42:24 of

42:25 of lisp is that it has a big database of

42:28 of things that you need to get to and it

42:31 gives you an address to get there so

42:34 that's similar to how our step protocol

42:37 operates where

42:38 uh you know you you it's like dns you

42:41 give it a name and uh it instead of it

42:43 giving you the actual address

42:46 of

42:47 of the service instance it gives you the

42:50 waypoint address to get there but it

42:52 operates very similar to dns and lisp

42:54 it's like it's like lisp more than dns

42:57 but it's similar where you can look

42:58 things up to find out an address to send

43:00 stuff to

43:01 and then of course ipv6 segment routing

43:04 you know with ipv6 segment routing you

43:06 change the address of the packet to go

43:08 to the router you want it to go to

43:11 in our world we changed the source

43:14 address

43:15 and the destination address to be the

43:16 router addresses to create a pair of

43:18 routers so i'm the source router you're

43:20 the desk writer i changed the address

43:22 source address to me i changed the

43:24 desktop to you now i have a pathway

43:26 between me and you for a session a

43:29 singular session and in return

43:32 the the return path is assumed to be

43:34 exactly the same

43:36 and so the reverse addresses are used in

43:38 the return path and we can send four

43:41 billion unique sessions between any two

43:43 routers using this technique

43:45 and so that's all three of them combined

43:47 it's like the best of all threes merged

43:49 together the weakness with lisp of

43:50 course is that there's no security and

43:52 if you know the the our loc or the the

43:55 the the secret address that's returned

43:57 from the that's the server you can send

43:59 packets into a data center with without

44:01 there's no there's no um uh

44:03 authentication so we've added that so

44:05 it's like all three put together

44:08 into one

44:09 and and something that's really

44:11 important because there is 500 billion

44:13 dollars of existing infrastructure you

44:15 know over the last 15 or 20 years people

44:17 have talked about starting a brand new

44:18 internet it's just not going to happen

44:21 we need we need technologies and

44:24 solutions that innovate in place and so

44:27 you know if you have our technology at a

44:29 thin edge at a branch site and you have

44:31 it in a data center or at another branch

44:34 site that that works we we can and it

44:36 will work with regular ordinary routers

44:39 in between and we don't need

44:41 bi-directionality but when you

44:43 think about the importance of experience

44:46 and how that is all session based on you

44:49 know it's a digital transformation that

44:51 does really presuppose that you are able

44:54 to

44:55 get the bi-directionality so that you're

44:57 able to make sure that the total

45:00 experience not one way or the other is

45:04 functioning well and and that's really

45:06 important

45:07 so you know so andy there's been several

45:09 questions about ipv7 um

45:13 it was a complete farcical notion that

45:15 there was an ipv7 so there really is no

45:17 ipv7

45:18 um you know we were there are bad actors

45:20 though

45:21 well there are bad actors but think

45:23 about the thing about ipv7 is is you

45:26 know we have to get away from using

45:28 these fixed sort of addresses that have

45:31 no meaning to humans

45:32 to express network intent and whether

45:34 you want to call that ipv7 or you want

45:36 to call it uh

45:39 you know

45:40 i don't know what we're going to call it

45:41 but i i think something has to change

45:43 we're at a breaking point and so we made

45:45 that up as a joke

45:48 um

45:49 yeah you know there was a question here

45:51 about you know is 128 uh somehow a zero

45:54 trust network zero tr you know for acc

45:56 an access concept between firewalls no

45:58 tunnels only encrypted sessions

46:02 yeah it is it is zero trust in many ways

46:05 uh first of all every single session is

46:08 authenticated with its unique signature

46:11 on every single header at first packet

46:14 on every on the metadata it's signed and

46:16 then

46:17 thereafter every single packet has an

46:20 hmac um checksum on it or an hmac

46:22 signature on it every single packet that

46:24 is unique to that particular tenant uh

46:27 tenant that is where the traffic is

46:29 coming from

46:30 uh so it it really is um

46:33 you know you can't get one packet into

46:35 this it's it's it's as secure or not as

46:38 a ipsec tunnel would be it's absolutely

46:41 as secure as that nothing can get in in

46:44 in the back way

46:45 but it's more secure than a tunnel in

46:47 the sense of what andy said earlier you

46:49 know tunnels are like open doors like

46:52 it's like a hallway with open doors on

46:54 both ends that open up pathways and

46:57 to a t all of our sd-wan competitors

47:00 use cider block style

47:02 uh

47:04 route enablement

47:05 uh through these tunnels like they

47:07 create they they use these tunnels to

47:08 create a larger

47:10 you know private network that spans from

47:12 your data center to your brand site and

47:14 then you have to go about the business

47:16 of deciding what should go through that

47:18 tunnel with either extended acls or or

47:22 whatever that particular vendor offers

47:24 as a way to to stop things from going

47:26 through the tunnel that shouldn't go

47:27 through the tunnel you know because once

47:29 you open that door

47:30 things could sneak in and out and we

47:32 don't do that we treat each session

47:35 as a unique

47:36 authenticated admittance uh in both

47:40 directions so if it's going from the

47:42 data center to the to the branch uh

47:45 it is a unique session that is is

47:47 separated from the the the session going

47:50 the opposite way from the branch to the

47:51 data center so it really is uh

47:54 zero trust between these routers and

47:56 when you think about um

47:58 segmentation um you know what a lot of

48:02 sd-wan

48:03 companies do is they say well you need

48:05 to have a separate tunnel for if you

48:07 want to have pci compliance

48:09 between the branch and the data center

48:13 you don't need that with our solution we

48:15 are in fact we do quite well in the

48:16 retail area especially the largest

48:18 retail companies on the planet because

48:21 they use our technique for obtaining pci

48:24 compliance it's very very secure

48:26 and you don't have to have a separate

48:27 tunnel

48:28 for to achieve that level of separation

48:32 right right a very easy way to think

48:34 about what we're talking about

48:36 is if you know pat and i each have a

48:38 phone and i can call pat he can answer

48:40 it he can tell me what he sees

48:42 and perhaps he is a video sensor we hang

48:46 up when pat picks his phone off hook he

48:47 doesn't get dial tone so by making route

48:50 paths directional and session stateful

48:54 you really can provide a lot of security

48:56 natively it's almost like a firewall on

48:58 every single route path

49:01 there's a question here about um traffic

49:03 encryption you know pat should elaborate

49:05 on this because it's really interesting

49:07 where things are going and how the

49:08 solution works

49:10 yeah so

49:11 some some sessions or some services do

49:14 need encryption because they're not

49:16 encrypted it may be a an older sort of

49:19 sort of technique your company's using

49:20 that is from 20 years ago and there's no

49:22 encryption uh what we see in most of the

49:25 networks we're in is that about 80 to 85

49:28 of everything that's going between the

49:30 branch and the data center or the branch

49:32 and the internet is already encrypted

49:34 it's already encrypted but and 20 is not

49:37 and of that 20 percent a lot of it is

49:39 things like dns or and or ntp you know

49:42 old-fashioned protocols

49:44 and some of them are going through the

49:46 the the

49:47 branch to data center connections

49:50 and so what we do is we have this

49:52 conditional encryption notion and when

49:54 we see um

49:56 protocols that are not encrypted uh we

49:58 actually can encrypt the payload using

50:00 aes 256 which is the same cipher that

50:03 everyone's using with um with an ipsec

50:06 tunnel so you you're essentially got the

50:08 same

50:09 uh cryptographic security but without

50:12 necessarily having the overhead of

50:14 establishing a complete tunnel and we do

50:17 it on a session by space session by

50:19 session basis so it it's as good as tls

50:23 uh in that sense it's session by session

50:25 and it's encryption for each session we

50:27 do all the key management between the

50:28 routers for those protocols that don't

50:30 have

50:31 uh encryption but we don't re-encrypt

50:34 everything else and so if you're using

50:35 ipsec tunnels

50:37 and 80 of your traffic's already

50:39 encrypted you're paying a heavy price

50:41 both in terms of increased latency

50:43 increased bandwidth and and a much lower

50:47 performing uh router because of all the

50:49 encryption work it's doing

50:51 so we do not

50:55 there's a question here about for an

50:56 enterprise currently to make use of of

50:59 the 128 solution the juniper 128

51:01 solution is an on-prem data center

51:03 on-prem slash data center the model as

51:06 opposed to public cloud so maybe we

51:07 should talk about

51:09 where we are with cloud so so we

51:11 we make software and in the same exact

51:14 software like the exact same

51:16 distrib release of software will run at

51:19 aws it'll run on a dell server it'll run

51:22 on a on a lantern or an azure telecom

51:25 box it'll run in azure it'll run in uh

51:28 uh

51:28 uh

51:30 ali cloud i mean it's the same exact

51:32 software and it runs on high-end

51:35 yeah and

51:36 so you don't have to it's almost like

51:39 and and you can have one

51:42 sheet of glass to run all of that you

51:44 know one conductor to run all of it and

51:46 when we you know when bit when um marty

51:48 was coming back from the future and he

51:50 said that the it guy uh controlled

51:53 things that were in the public clouds uh

51:55 that's how you would do it is you you

51:57 have complete network control of all

51:59 these routers wherever they're located

52:05 so um another question was about you

52:07 know does 1500 byte packet size make

52:09 sense in a world of 100 and 400 gig

52:12 links and you know first of all a huge

52:15 part of the gain of our technology and

52:18 not encapsulating happens with the

52:20 latency with respect to small packet

52:22 sizes where interactive

52:24 communications are involved i mean you

52:26 can see latency cut in half at that

52:28 point but it is true that if you try and

52:30 encapsulate large packets you can result

52:32 you know it can be packet fragmentation

52:34 as a result but maybe you want to answer

52:37 the question more broadly about

52:39 yeah

52:40 it's it's a very good question because

52:42 we on the outset our assumption was that

52:44 we'd only save 12 to 15 percent of the

52:46 bandwidth when we before we actually got

52:48 customers and really dug into it the

52:51 assumption was that oh you know this

52:52 1500 byte packet uh it needs to be act

52:55 with a small packet the average would be

52:57 750 bytes you know uh velocloud uses a

53:01 hundred and third 131 bytes of

53:03 of overhead we don't have any

53:06 therefore we would save 131 over 750 12

53:09 14 and that that was our assumption

53:12 and and

53:13 we were so surprised at how many small

53:16 packets are out there in real networks

53:18 you know we did a retail establishment

53:20 and they didn't believe that they were

53:22 going to save anything they were using

53:23 cisco dmvpn and they weren't even using

53:26 sd-wan it was just dm vpn which is a

53:29 basically uses ipsec tunnels to connect

53:31 branches to to uh the data center and

53:34 they said there's no way you know you're

53:35 going to save 15

53:37 no way so we

53:39 counted

53:40 real traffic on a real we we were

53:42 implemented in a real store for a trial

53:44 and we measured and compared uh the

53:46 traffic before and after the

53:48 implementation and we we uh did it over

53:52 a two hour period and we saved them 37

53:55 and you know

53:56 the question really comes down to why

53:58 are there so many small packets what are

53:59 their proprietary apps and why are they

54:01 sending small packets and all those i

54:03 don't have the answers to all those

54:05 i mean

54:06 all i can say is is that

54:08 it was 37 savings and they were just

54:10 dumbfounded when they computed because

54:13 everything has to go through a security

54:14 stack and because they uh have to have

54:17 data center head-end routers and they

54:18 have to have uh circuits and everything

54:21 for this whole network they were saving

54:23 five terabytes a day based on that and

54:25 and it really did move the needle and i

54:28 you know it is surprising um i think

54:30 everyone should should

54:32 measure their own

54:33 uh

54:34 you know try to measure their own we

54:36 added a feature in our product that

54:38 actually does it for you and it tells

54:40 you how much you're saving over using a

54:42 velocloud-like solution uh or or

54:46 you know a solution based on ipsec

54:48 tunnels and it computes it in real time

54:50 and you'll see it vary from 12 to go as

54:53 high as 50 percent for certain

54:55 applications like voice we we do a lot

54:57 of voice as well

54:58 it saves well into the hundred percent

55:00 range well into a hundred

55:02 it it's amazing it's it's like a it cuts

55:05 your bandwidth in half so

55:07 it is remarkable actually and and before

55:10 people say it doesn't matter they really

55:12 need to start looking at their costs of

55:14 their of all their head and routing

55:15 equipment and circuits right

55:18 and and you know a derivative of that is

55:20 that you know more and more people are

55:21 using wireless as a backup

55:24 to augment their wireline connectivity

55:26 and if you need to move a session that's

55:28 not performing onto a wireless link and

55:31 you depend upon tunnels you're either

55:32 going to drop the session because the

55:34 tunnel convergence time is going to be

55:35 longer than what the session timer will

55:37 allow or you're going to keep the

55:38 session you're going to keep the tunnel

55:40 alive and incur a pretty onerous expense

55:42 in terms of heartbeat

55:45 while you're just waiting to receive

55:46 something that may or may not

55:48 happen so

55:50 you know not requiring tunnels means

55:51 that you can just move over to wireless

55:53 link you you can move the session it

55:55 runs and there's no convergence time

55:57 there's no bandwidth penalty in terms of

55:59 a heartbeat there was i think john had a

56:01 question as it related to does this

56:03 replace bgp and that's a good question

56:06 that is a good question the

56:08 no it it doesn't in fact our although we

56:10 didn't explicitly talk about it in our

56:13 in this presentation our router has to

56:15 support ospf bgp and all the different

56:17 routing protocols that are in use today

56:19 because there's nothing wrong with layer

56:21 three layer three works fine you know

56:23 the issue really is when networks talk

56:25 to each other it's like i have an rfc

56:27 1918 private network running 10.0

56:30 addresses and i need to talk to aws that

56:32 has another 10-0 address space and our

56:35 approach to this over the last three

56:37 decades has been let's make a win and

56:39 normalize all this addressing so

56:41 everything can talk to everything and

56:43 then we'll put in extended acls to

56:45 prevent everything from talking to

56:46 everything and then you know

56:49 let's hope the company doesn't divest

56:51 anything or buy anything or or change

56:53 anything because oh my god

56:54 it it it just becomes so freaking

56:56 brittle and so we said the problem is

56:59 you can't go between networks it's an

57:00 inter-networking problem we have it's

57:02 not a networking problem it's how these

57:04 networks where these networks meet that

57:06 bgp doesn't go

57:08 you can't connect be you know bgp won't

57:11 allow you to connect a private network

57:13 over a public network to a private

57:15 network it doesn't permit that that's

57:17 the focus of what we're trying to do

57:20 here which is create an internetwork

57:22 that works

57:26 so something you said uh sparked ramesh

57:28 uh to have an observation saying so i

57:30 suppose this is an overlay then

57:33 yes it it it is an overlay technically

57:35 we get into this dispute of is it an

57:37 overlay and it is a logical overlay for

57:40 sure it just isn't tunnel based it

57:42 signals with metadata

57:44 in the first packets of sessions and um

57:47 not in every session like ipv6 segment

57:50 routing but just in the first packet

57:53 right right

57:55 well patrick i you know i i guess i'd

57:58 like to just you know end by saying

57:59 thank you to everyone that came um you

58:02 know we have lots of materials we run

58:05 um you know lots of webinars seminars um

58:09 we're distributed all over the world

58:11 come check us out we we really feel like

58:13 we can have a dramatic income on your

58:16 digital transformation journey that will

58:18 have positive business outcomes for your

58:21 enterprise or your organization and um

58:24 you know we're we're here for you so i

58:26 hope this is the beginning of a

58:27 relationship or an extension of an

58:30 existing relationship pat is there

58:32 anything you want to end with yeah i'm

58:33 on linkedin if anybody wants to have a

58:35 one-on-one about the technology i i just

58:38 love it so give reach out to me on

58:39 linkedin

58:42 excellent

58:44 thank you

Show more