Корпоративные сети через 5 лет: что нас ждет?
Upcoming SlideShare
Loading in...5
×
 

Корпоративные сети через 5 лет: что нас ждет?

on

  • 181 views

 

Statistics

Views

Total Views
181
Views on SlideShare
181
Embed Views
0

Actions

Likes
1
Downloads
3
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Корпоративные сети через 5 лет: что нас ждет? Корпоративные сети через 5 лет: что нас ждет? Presentation Transcript

    • Ian Bull Enterprise Network Group. EMEAR May 2014 Next Generation IT Enterprise Networks Forum – Moscow June 14 Andrey Kharitonov Business Development. Russia CIS
    • Cisco Confidential 2© 2013-2014 Cisco and/or its affiliates. All rights reserved. Predicting the future is not easy “ Prediction is very difficult, especially about the future.” Niels Bohr, Nobel Laureate “ Everything that can be invented has been invented” - Commissioner, U.S. Patent Office, 1899 “ This 'telephone'... is inherently of no value to us.” Western Union memo, 1886 “ We always overestimate the change that will occur in the next two years and underestimate the change that will occur in the next ten” Bill Gates “ The best way to predict the future is to create it.” Peter Drucker
    • Cisco Confidential 3© 2013-2014 Cisco and/or its affiliates. All rights reserved. What are the Enterprise Megatrends MOBILITY BYOD M2M CLOUD SaaS | DC / V IMMERSIVE COLLABORATION Pervasive Video COST CONTROL, TCO, Operational Efficiency IT EFFECTIVENESS, Service, Simplicity and Network Management SECURITY, Accelerating Cyber-Threats $
    • Cisco Confidential 4© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco VNI Report 2Cisco Visual Networking Index 2014Pew Data Research, Dec 2013, 3Mary Meeker Data, Dec 2013 Device Explosion Network Traffic Patterns IT Transitions Tablets shipped within Europe 90 million per person 3 Devices By 2015, Smartphones + Tablets exceed PC by... 2x Mobile data to grow x26 • BYOD, Mobility, Cloud • Visibility • Simplicity • New LoB IT Needs • Smarter Business Processes Lower TCO / month Avg. mobile user to generate about 1GB Comparing with 63MB today Over 70% will be video Internet of Things/Everything. M2M connectivity Traffic forecast by 2018
    • Cisco Confidential 5© 2013-2014 Cisco and/or its affiliates. All rights reserved. The network is more critical to delivering applications than a year ago Policy for employee device access** The network is not ready for BYOD* The network is not ready for cloud *2013 Cisco Global IT Impact Survey, **2013 Cisco IBSG Horizons Study Optimal Application Experience New Connected Experiences Managed Cloud Services BYOD and Mobility IT Simplicity and Programmability ?
    • Cisco Confidential 6© 2013-2014 Cisco and/or its affiliates. All rights reserved. Opportunity or Challenge? HR: Enable new mobile work styles and BYOD trends to retain the best workforce and achieve more productivity CMO: Provide improved customer experiences to build satisfaction and loyalty CIO: Build an enterprise –wide mobility strategy that addresses new business to employee and business to consumer opportunities CISO: Secure the delivery of mobile apps, data and communications to users on multiple employee- owned and corporate-issued devices VP Apps: Develop new apps and mobilize existing apps for employee, partner and customer mobile devices. Anytime, anywhere. End-user Computing: I need to deliver apps, data, communications to all employee and corporate owned devices with limited budget and resources Network: I need to connect more devices anywhere without increasing cost, complexity or security threats Infrastructure: I need to host, manage and deliver rapid growth in mobile apps and data. Support high demand for bandwidth at any time LOB: Opportunity to build new revenue streams to be more competitive and gain wallet share Challenge Opportunity Business Leaders IT Executives IT Management
    • Cisco Confidential 7© 2013-2014 Cisco and/or its affiliates. All rights reserved. 2000 Mobile Devices were a privilege… 2010 Everyone had at least one Mobile Device… 3 or more Mobile Devices are commonplace… + Connecting M2M 2016 + Compiled from multiple sources: Gartner, ABI, IDC, VNI
    • Cisco Confidential 8© 2013-2014 Cisco and/or its affiliates. All rights reserved. 802.11ac interference detection and mitigation PREDICTABLITY Beamforming for 802.11a/g/n/ac UNMATCHED SCALE Optimized for high speed scheduling and packet processing n n AP ac ac n ac CLEAN AIR CLIENTLINK TURBO BOOST BATTERY SAVINGS INTELLIGENT ROAMING RELIABILITY Unstick clients as they roam between AP’s or to cellular Reduce co-channel interference channels in dense AP installations OPTIMIZED ROAMING RF NOISE SUPPRESION
    • Cisco Confidential 9© 2013-2014 Cisco and/or its affiliates. All rights reserved. 10Base-T 1990 1995 100Base-T 2000 2005 2010 802.11 802.11g 802.11n 1000Base-T 2015 802.11ac Adoption • >50% of enterprise traffic will originate on Wi-Fi by 2018 (Cisco VNI) • 50% of all new Wi-Fi devices in 2014 will be 802.11ac capable (ABI Research) • Wave 1 802.11ac has 5+ years of affectivity for Smartphones and Tablets • Wave 1 802.11ac improves battery efficiency by 2X for Smartphones, Tablets, and Laptops Compiled from multiple sources: Gartner, ABI, IDC, VNI
    • Cisco Confidential 10© 2013-2014 Cisco and/or its affiliates. All rights reserved. Corporate Applications only on the network Corporate and Personal Applications started to share the network Corporate Applications are competing with Personal Applications for the network 2000 2010 2016 + Compiled from multiple sources: Gartner, ABI, IDC, VNI
    • Cisco Confidential 11© 2013-2014 Cisco and/or its affiliates. All rights reserved. HTTP HTTP HTTP Application Visibility and Control Discover: 1000+ applications categorized to simplify management Performance Collection: Enhanced application performance reports, url hit counts, top applications … Control: Apply QoS, Acceleration and Path Control according to company performance expectations Natively Integrated into Cisco Portfolio Simple to Enable
    • Cisco Confidential 12© 2013-2014 Cisco and/or its affiliates. All rights reserved. 2000 Mobile Devices were a privilege… 2010 Everyone had at least one Mobile Device… 3 or more Mobile Devices are commonplace… + Connecting M2M 2016 + Compiled from multiple sources: Gartner, ABI, IDC, VNI
    • Cisco Confidential 13© 2013-2014 Cisco and/or its affiliates. All rights reserved. Onboard Users based on where they are in the network Tailor notifications based on where a User is in the network TAILORED MESSAGING TARGETED ONBOARDING “Turn-by-turn” directions to any location within a venue INDOOR DIRECTIONS Analyze aggregate locations, URLs, and demographics “Big Data” Analytics Connect with other systems, such as registration, property management, product databases, or location- based services SYSTEM INTEGRATION
    • Cisco Confidential 14© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Maps Employee Productivity • Find open rooms • Find people • Find resources • Reserve Rooms • Locate People/Rooms • Find buildings Cisco Maps Improve Employee Productivity through location enabled apps
    • Next Generation IT Core Network Strategy
    • Cisco Confidential 16© 2013-2014 Cisco and/or its affiliates. All rights reserved. Simple Secure Reduced TCO Connecting People Connecting Clouds Connecting Things The Intelligent Platform for a Connected World
    • Cisco Confidential 17© 2013-2014 Cisco and/or its affiliates. All rights reserved. One Policy Identity Services Engine World-class unified policy definition and enforcement across wired, wireless and VPN One Management Cisco Prime Single solution for comprehensive lifecycle management and user, network and application visibility One Network Unified Access / IWAN Catalyst Integrated Industry-leading networking and mobility capabilities for a single network infrastructure Simple Secure Reduced TCO Making IT More Responsive to the Business Less Time on IT Operations, More Time on IT Business Innovation
    • Cisco Confidential 18© 2013-2014 Cisco and/or its affiliates. All rights reserved. Our Product Strategy… Provide an OPEN architecture to allow for flexibility and choice Building the Best The Best Being Better Together
    • Cisco Confidential 19© 2013-2014 Cisco and/or its affiliates. All rights reserved. Strategy for SDN Many Purpose-Built Architectures SWITCHING, ROUTING, WIRELESS Unique Services Purpose- Built ASICs IOS Variants Custom HW Unique Services Purpose- Built ASICs IOS Variants Custom HW Unique Services Purpose- Built ASICs IOS Variants Custom HW Unique Services Purpose- Built ASICs IOS Variants Custom HW Unique Services Purpose- Built ASICs IOS Variants Custom HW Unique Services Purpose- Built ASICs IOS Variants Custom HW Unique Services Purpose- Built ASICs IOS Variants Custom HW Multiple Products on Common Architecture SIMPLE, SECURE, REDUCED TCO UADP and USCP ASIC Standard Platforms Common Services IOS-XE Cisco ONE Architecture AGILE SOFTWARE MODEL Software-Defined Services Management and Policy Standard Platforms UADP and USCP ASIC IOS-XE Cisco ONE Yesterday Today Tomorrow
    • Cisco Confidential 20© 2013-2014 Cisco and/or its affiliates. All rights reserved. Network-Aware Applications Developed by Cisco, Third Parties or Customers Using Network APIs Network Abstraction Layer Provisions Network Services Consistently Across All Network Devices Richest Set of Devices, ASICs & Software Across Wired and Wireless Networks, with Service-Rich IOS and Open APIs NETWORK APPLICATION LAYER NETWORK CONTROL LAYER NETWORK ELEMENT LAYER
    • C97-729241-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential NETWORK APPLICATION LAYER NETWORK CONTROL LAYER NETWORK ELEMENT LAYER Cisco ISE Cisco Prime Cloud Services Security Services Mobility Services Applicatio n Services Application Policy Infrastructure Controller (APIC) Enterprise Module Discovery Topology …. QoS Location Device API – OnePK, OpenFlow, CLI Cisco Network Operating Systems (Enterprise, Data Center, Service Provider) ASIC DATA PLANE SOFTWARE DATA PLANE
    • Cisco Confidential 22© 2013-2014 Cisco and/or its affiliates. All rights reserved. Manual Configuration Automation Box-Centric Network-Centric Provision in Months Hours Closed Systems Open and Programmable Network Data Business Intelligence New Installations Existing + New Installations
    • Cisco Confidential 23© 2013-2014 Cisco and/or its affiliates. All rights reserved. • Rapid Innovation • Simplified Operations • Programmatic Networks Control and Data Plane resides within Physical Device In the SDN paradigm, not all processing happens inside the same device Software defined networking (SDN) is an approach to building computer networks that separates and abstracts elements of these systems – (per Wikipedia definition)
    • C97-729241-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Mobile Devices • Device choice • Simplified provisioning • Unified access • Contextual policy enforcement • Mobile Device Management (MDM) Mobile Workspaces • Complete B2E Mobility • Native, HTML5, hybrid, virtual • Mobile Collaboration • Multi-level security • Mobile App/Data Management (MAM/MIM) Mobile Everything • IT Automation / Workspace Service Orchestration • Mobility everywhere - B2C, IoT, M2M • Consumption Models: On premise, cloud, hybrid • Seamless roaming – public, private networks • Location and SDN-enabled apps Cisco Enterprise Network – ONE Architecture Collaboration Security Cloud Data Center Enterprise MobilityBYOD Mobile Workspace IoT/IoE
    • Thank You Enjoy the rest of the day!