IBM j-type Data Center Networking Introduction
An IBM Redbooks publication
Note: This is publication is now archived. For reference only.
Published on 07 May 2010
ISBN-10: 0738434280
ISBN-13: 9780738434285
IBM Form #: SG24-7820-00
Authors: Jon Tate, David Mai, Holger Mueller, Tomasz Siwiarek and Meiji Wang
As organizations drive to transform and virtualize their IT infrastructures to reduce costs and manage risk, networking is pivotal to success. Optimizing network performance, availability, adaptability, security, and cost is essential to achieving the maximum benefit from your infrastructure.
But what is needed to support these networking requirements?
manageability
environment
complex networks
IBM® and Juniper® have entered into an agreement to provide expanded network technology choices with the new IBM Ethernet switches, routers, and appliances to provide an integrated end-to-end resiliency and security framework.
Combined with the IBM vast data center design experience and with a field-proven operating system, Junos®, this portfolio, which we describe in this IBM Redbooks® publication, represents the ideal convergence of strength and intelligence. For organizations striving to transform and virtualize their IT infrastructure, such a combination can help you reduce costs, manage risks, and prepare for the future.
This book is intended for anyone who wants to learn more about IBM j-type Data Center Networking.
Chapter 1. The role of the data center
Chapter 2. Virtualization
Chapter 3. IBM j-type portfolio of data center networking products
Chapter 4. Data center networking simplification
Chapter 5. Data center network security
Chapter 6. Data center networking access layer
Chapter 7. Data center mobility
Chapter 8. Junos and operational simplicity
Chapter 9. Managing the data center network with IBM j-type
Chapter 10. z/VM use case
Chapter 11. Virtual private LAN service use case
Chapter 12. Virtual IP addresses use case
Chapter 13. Consolidating firewall services in the data center use case
Chapter 14. IBM PowerVM and VMware use cases
Chapter 15. Disaster recovery data center use case
Chapter 16. Two-tier network use case