Your SlideShare is downloading. ×
Jim grubb   internet of everything
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Jim grubb internet of everything

326
views

Published on

Published in: Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
326
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
16
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • So, why did we go down this path?
    One of the things that has happened is that the IT work used to be very fragmented in it’s connectivity, you used to have:
    Ethernet
    token ring
    FDDI
    ATM
    all of those different types of physical connection options.
    Over the past two decades we have seen a great standardization and convergence towards Ethernet, wifi and IP
    But when we look at the industrial side, you’ve got:
    zigbee
    z-wave
    usb
    LTE
    wimax
    all of these different types of physical or logical transports
    And we know those are going to exist for a long time to come.
    Because they are not all solving for the exact same problem
    So people want a lot of diversity of interfaces to be able to connect these gateways.
    They want to be able to talk to sensors over a wide range of options. So they show up with a module…an interface….
    I’ve got a nice wihart this, or a zigbee that and the challenge that presents in terms of how do we backhaul that traffic is that ….now you have a dongle that you want to plug into my router.
    I have to write a device driver in IOS…that is going to take us nine months. IOS is a monolithic operating system and we have to write it, test it, regression test it, integrate it into a release…which is not very agile or very nimble.
    This means we are going to be at this for YEARS trying to connect all of these different devices.
    IOX allows these companies to come with their dongle, they often already have a linux driver, they can simply recompile and test deliver that driver in the IOX environment in a number of hours.
    Effectively what they have done is extended our routers which has A set of functionality with additional functionality.
    This is not just for IO, given that we have a full linux environment there you could deploy any kind of linux application.
    The IOX framework is essentially covering the fact that we are running IOS and linux running side by side and adding these two additional components
    That allow you to choose the applications, efficiently deploy them to the router
    Then once the applications are running you may want to start them, stop them, update them, etc. so there is management capabilities as well.
    All of this is covered under this software framework we call IOX.
    ***********************************************************************
    New application enabled environment enabled across our lines of IOT routers, switches, access points, servers, and cameras
    Built with Industry standard operating systems support complimenting several decades of Cisco’s investment in the award winning Internetworking Operating System (IOS)
    Allows customers and partners to bring their own application to the infrastructure level with a high degree of distribution
    Allows for Cisco value adds to IOS built in a dynamic environment to address the rapidly evolving and diverse IOT interface requirements
    IOx SDK provides applications with the ability to get deeper into data as it travels through the network
    Complete architecture including compute and storage resources along with application hosting and management
  • Whether it’s a passenger train in a bustling city or a freight train slithering through the mountainside, news of derailment is a tragic story. You may have heard about the fatal train accident in New York City’s Bronx or the recent incident in Philadelphia where a train hauling crude oil was dangling over a river. The US federal government has seen more oil spilled in rail incidents in 2013 than was spilled in the nearly four decades since it began collecting data. The demand for preventative measures is greater than ever.
    Train derailment is typically due to equipment failure, specifically in the ball bearings of a wheel. Today, train operators have routine schedules to swap out wheels and engines without fully knowing if the equipment is used beyond repair. Or in worse case scenarios, damaged equipment is not replaced in time to prevent failure and accidents.
    In addition to performance, train operators face fierce competition from alternative transportation providers and must find ways to offer better amenities and services to retain and attract new passengers.
    These are just a few of the concerns rail companies are hoping IoT and Cisco will address.
  • So if we go back to the examples we shared with you earlier, an 819 router sitting on a freight train can monitor the ball-bearings and monitor the utility of bearing to let you know if its overheating or has worn down to 35% of useful material. An alert can be sent to the train operator notifying him to pull over at the next available station or to stop and repair the wheel.
  • Finding the data is not difficult, but choosing the best data to use from among all the data available can be difficult. The challenge is how to manage and extract value from a constant stream of information and turn it into a competitive advantage.
    With the right infrastructure, Data in Motion becomes faster and cheaper to use than Data at Rest because Data in Motion is easier to locate and does not need to be retrieved from its stored state and then pushed through the analytical engines.
  • To better understand this definition, we must first break down IoE’s individual components.
    People: As the Internet evolves toward IoE, we will be connected in more relevant and valuable ways. Today, most people connect to the Internet through their use of devices (such as PCs, tablets, TVs, and smartphones) and social networks such as Facebook. In the future, people will be able to swallow a pill that senses and reports the health of their digestive tract to a doctor over a secure Internet connection. In addition, sensors placed on the skin or sewn into clothing will provide information about a person’s vital signs. According to Gartner, people themselves will become nodes on the Internet, with both static information and a constantly emitting activity system.
    Process: Process plays an important role in how each of these entities — people, data, and things — works with the others to deliver value in the connected world of IoE. With the correct process, connections become relevant and add value because the right information is delivered to the right person at the right time in the appropriate way.
    Data: With IoT, devices typically gather data and stream it over the Internet to a central source, where it is analyzed and processed. As the capabilities of things connected to the Internet continue to advance, they will become more intelligent by combining data into more useful information. Rather than just reporting raw data, connected things will soon send higher-level information back to machines, computers, and people for further evaluation and decision making. This transformation from data to information in IoE is important because it will allow us to make faster, more intelligent decisions, as well as control our environment more effectively.
    Things: This group is made up of physical items such as sensors (e.g. pressure, radio activity, image, temperature, vibration), consumer devices, enterprise assets that are connected to both the Internet and one another, RFID (a simple tag that can used to identify an object) and "actuators.” An actuator is an object that makes an "action": for example, it could turn off an engine, a light, or start a process to control a more complex system. In IoE, these things will sense more data, become context-aware, and provide more experiential information to help people and machines make more relevant and valuable decisions. Examples of “things” in IoE include smart sensors built into structures like bridges, and disposable sensors that will be placed on everyday items such as milk cartons.
  • Organizations are starting to understand the potential value presented by the market transition to the Internet of Everything. The possibilities unleashed by connecting new things, unlocking new sources of data, combining those with people collaborating or undertaking new tasks, and innovating new or optimizing existing processes are immense. The potential value at stake across private industries alone is estimated to exceed $14.4 trillion by 2022.
  • This is our strategic framework that brings together our historical strengths to help our customers adapt their existing network investments to meet the changing demands of IT and develop the model for next generation IT
    This is the strategy that will help us capitalize on the value at stake with the Internet of Everything and be the #1 IT Company
  • Technology and business transitions are changing the role and expectations of IT.
    Over the past few years, a number of technology trends have been impacting companies, organizations and consumers. These can be summed up into five major technology transitions
    Mobile: handling increased users, devices, high bandwidth content, and cloud
    Cloud: shift to Cloud is creating new architectures, applications, control points, services and business models
    New breed of applications: move from Client  Server to Mobile  Cloud
    IoT: ubiquitous connectivity, computing & intelligence and machine-to-machine connections
    Data & Analytics: shift from centralized databases & analytics with structured, static data  distributed databases of unstructured & structured data with real-time info flows which leads to real-time decision making
    These transitions and other macroeconomic trends are impacting businesses such that organizations care about
    Growth & Productivity: capitalizing on growth opportunities (open new markets, increase penetration, etc.) and increasing innovation & productivity to address these opportunities more efficiently and in a more agile manner
    New Business Models: having / developing more flexible consumption models; capex-based  more opex-based models (e.g., adapting to mobile and cloud delivery / interaction, outcomes based, accelerating service creation)
    Experience expectations: increasing employee and customer expectations with the proliferation of devices and Cloud services in the workplace (“anywhere, anytime” demand). In addition, organizations are looking for greater linkages to drive business processes and business outcomes
    Globalization: global talent and a globally dispersed workforce, emerging market requirements and indigenous innovation
    Security & Compliance: increasing expectations from users around the world with security, regulation and compliance requirements (e.g., from malicious to competitive; cyber security, geo-political)
    In addition, IT budgets are shifting to the Line of Businesses. Together, this changing world results in a changing role of IT… to accommodate the technology transitions while dealing with the business implications we all face.
  • Management orchestration SW that enables application
    Today’s Network is complex, not flexible. We need to create a layer between applications and the network to make the network more relevant
    Today apps developer really don’t come to the NW level., they take the NW for granted. So we need to make it easier to tap in and leverage the potential to do what they have to do
    The Infrastructure has to support apps, and in our current state the infrastructure is too complex. Need to create layer to abstract the NW to make it simpler for applications to deliver value to the customer.
    We previewed our strategy earlier using the Unified Platform. However as we have continued our development we are continuing to refine it.
    The Infrastructure Provisioning, Element Management and Infrastructure Security & Policy are part of the physical and virtual infrastructure; CISCO ONE; ONE is Open Network Environment. Service Management, Orchestration and APP Security Policy & Compliance becomes part of the Cloud Enablement Platform.
    Even though we are calling it the Cloud Enablement platform, it really is the Application Enablement platform for all applications not just cloud ones.
  • Management orchestration SW that enables application
    Today’s Network is complex, not flexible. We need to create a layer between applications and the network to make the network more relevant
    Today apps developer really don’t come to the NW level., they take the NW for granted. So we need to make it easier to tap in and leverage the potential to do what they have to do
    The Infrastructure has to support apps, and in our current state the infrastructure is too complex. Need to create layer to abstract the NW to make it simpler for applications to deliver value to the customer.
    We previewed our strategy earlier using the Unified Platform. However as we have continued our development we are continuing to refine it.
    The Infrastructure Provisioning, Element Management and Infrastructure Security & Policy are part of the physical and virtual infrastructure; CISCO ONE; ONE is Open Network Environment. Service Management, Orchestration and APP Security Policy & Compliance becomes part of the Cloud Enablement Platform.
    Even though we are calling it the Cloud Enablement platform, it really is the Application Enablement platform for all applications not just cloud ones.
  • IN CLOSING, CISCO SECURITY NOW HAS THE INDUSTRY’S MOST COMPREHENSIVE ADVANCED THREAT PROTECTION COVERING THE ENTIRE ATTACK CONTINUUM
    AND THE INDUSTRY’S BROADEST SET OF ENFORCEMENT AND REMEDIATION OPTIONS AT ATTACK VECTORS WHERE THREATS MANIFEST
    THE CISCO SECURITY PORTFOLIO HAS SPECIFIC PLATFORM BASED SOLUTIONS TO SOLVE YOUR CURRENT PROBLEMS, BUT ALSO INTEGRATE INTO AN OVERALL SECURITY SYSTEM.
    THEY WORK TOGETHER TO PROVIDE PROTECTION THROUGHOUT THE ATTACK CONTINUUM – BEFORE, DURING, AND AFTER AN ATTACK
  • IN CLOSING, CISCO SECURITY NOW HAS THE INDUSTRY’S MOST COMPREHENSIVE ADVANCED THREAT PROTECTION COVERING THE ENTIRE ATTACK CONTINUUM
    AND THE INDUSTRY’S BROADEST SET OF ENFORCEMENT AND REMEDIATION OPTIONS AT ATTACK VECTORS WHERE THREATS MANIFEST
    THE CISCO SECURITY PORTFOLIO HAS SPECIFIC PLATFORM BASED SOLUTIONS TO SOLVE YOUR CURRENT PROBLEMS, BUT ALSO INTEGRATE INTO AN OVERALL SECURITY SYSTEM.
    THEY WORK TOGETHER TO PROVIDE PROTECTION THROUGHOUT THE ATTACK CONTINUUM – BEFORE, DURING, AND AFTER AN ATTACK
    60/30/10 2012
    10/30/60 2020 – Neil McDonnald
  • Transcript

    • 1. The Internet of Everything Jim Grubb
    • 2. Data, Lots of it New Advanced Aircraft 10 TB every 30 minutes Off Shore Rig 1.5TB every 2 weeks Smart Grid 1.1 Billion data points every day Billions of data points every day Industrial Automation
    • 3. “We are creating more information every ten minutes then was created since the beginning of recorded history and the year 2008.” Dave Evans Futurist, March 2014
    • 4. Data-at-rest
    • 5. from our transactional systems
    • 6. http://www.cisco.com/en/US/netsol/ns1120/index.html Data-in-motion
    • 7. Sensors Mobile backhaul Cloud Social
    • 8. Information equals competitive advantage
    • 9. Parking sensor
    • 10. Vehicle sensors
    • 11. Agricultural sensors
    • 12. iGrill2 Meat Thermometer
    • 13. Medical sensors
    • 14. Spiroscout inhaler uses GPS, WiFi to track asthma attacks
    • 15. Spiroscout inhaler uses GPS, WiFi to track asthma attacks
    • 16. Spiroscout inhaler uses GPS, WiFi to track asthma attacks
    • 17. Oracle Microsoft SQLMy SQL IOE Analytics and Applications Composite Database Medical Database Shipping Database Weather Database
    • 18. Industrial Sensors
    • 19. Industrial Automation moving to IP Embedded Outdoor Wireless Video Physical Access Plant Switching Field Networking Plant Routing
    • 20. Video as a Sensor
    • 21. Information equals competitive advantage
    • 22. Information equals competitive advantage
    • 23. Information equals competitive advantage
    • 24. Information equals competitive advantage
    • 25. Things
    • 26. Data, Lots of it New Advanced Aircraft 10 TB every 30 minutes Off Shore Rig 1.5TB every 2 weeks Smart Grid 1.1 Billion data points every day Billions of data points every day Industrial Automation
    • 27. Centralized Computing Tbps Gbps Tbps Gbps
    • 28. Fog Computing IOx Fog IOx Fog IOx Fog Mbps Kbps Mbps Kbps UCS-E Fog
    • 29. IOxIOxIOxIOx Hardened Edge Platforms: Embedded Storage and ComputeHardened Edge Platforms: Embedded Storage and Compute Application ManagementApplication Management Application StoreApplication Store IOSIOSIOSIOS LinuxLinuxLinuxLinux Distributed Applications IOx SDK IOx Enables Applications At The Network Edge
    • 30. Enabling Fog at the Edge CGR 2010 819 ISR CGR 1120 CGR 1240 IP Cameras
    • 31. Fear of DerailmentFear of Derailment Underutilized EquipmentUnderutilized Equipment Poor Passenger AmenitiesPoor Passenger Amenities and Servicesand Services
    • 32. Immediate ResponseImmediate Response to Equipment Failureto Equipment Failure Real-time Health Status ofReal-time Health Status of TrainsTrains New Passenger AmenitiesNew Passenger Amenities and Servicesand ServicesREPLACEREPLACE BEARINGSBEARINGS CAR 07
    • 33. Load ImbalancesLoad Imbalances Poor Use of BrownfieldPoor Use of Brownfield AssetsAssets Increasing DemandIncreasing Demand
    • 34. Local Load BalancingLocal Load Balancing Operational EfficienciesOperational Efficiencies New Business ModelsNew Business Models 01 02 03 04 05 06 07 08 09 10 Maintenance Needed on Transformer 7
    • 35. Virtual Machine Virtual Machine Virtual Machine Virtual Machine Virtual Machine UCS-E Enables Fog ISR Branch Router UCS-E Blade
    • 36. Fog Computing
    • 37. Location and Presence
    • 38. Location and Presence
    • 39. Location and Presence
    • 40. Location and Presence
    • 41. The answer to everything is on-line
    • 42. People
    • 43. The Value of Data
    • 44. Delivering the right information to the right person (or machine) at the right time Process Connecting people in more relevant, valuable ways People Turning data into more useful information for decision making Data Physical devices and objects connected to the Internet and each other for intelligent decision making Things Internet of everything Value
    • 45. Internet of Everything Opportunity Opportunity Internet of Everything IoTCloudBig Data Social and Collaboration Mobile Computing $2.5T in better asset utilization $4.3T in employee productivity $2.7T in supply chain logistics $3.7T in better customer experience $3T in new innovations $125B in increased public sector revenue $19 trillion$19 trillion in value Public sector $4.6T Private sector 14.4T By 2022, the Internet of Everything will help enable new productivity, profits and cost savings with: Time
    • 46. http://internetofeverything.cisco.com
    • 47. TECHNICAL SERVICES ADVANCED /PROFESSIONAL SERVICES PLATFORM SERVICES MANAGED SERVICES It has to be easy “The majority of a company’s IT budget is used to maintain the status quo. Currently, 83% of IT budget is used to simply maintain the current operating environment. This is up from 75% five years ago.” – ZK Research Zeus Kerravaka
    • 48. The IT Challenge – Operational Complexity Applications/Services Enterprise Infrastructure Controllers Virtual Services Infra Security VM Managers Point Tools Orchestration Security & Compliance Performance Visibility & Monitoring Provisioning People and Process ComplexityHundreds of Tools
    • 49. Enabling Fast IT Management & Orchestration Application Security, Policy & Compliance Open APIs Network Intelligence Automated Infrastructure Provisioning Integrated Element Management Policy-based Infrastructure Security Automated Infrastructure Provisioning Integrated Element Management Policy-based Infrastructure Security Physical & Virtual Infrastructure Management & Orchestration Application Security, Policy & Compliance Open APIs Network Intelligence Applications/Services Application Centric Infrastructure (ACI)
    • 50. Single Network (Physical/Virtual) Cisco Application Centric Infrastructure (ACI)Built on a common Policy Model Infrastructure Abstraction and Access to Network Intelligence Enable Business Innovation Identity Location Device Type Device Posture SLA QoS Security Load Balancing APIC EM Common Policy Model Applications/Services Application Centric Infrastructure (ACI) Northbound API’s Southbound API’s
    • 51. Cisco ACI Common Policy Model Consistent Policy Across DC, WAN and Access DATA CENTER ACCESSWAN Application Network Profile SLA, Security, QoS, Load Balancing User/Things Network Profile QoS, Security, SLA, Device APIC EMAPIC EM APPLICATION PROFILE USER ACCESS
    • 52. What We’re Doing – Accelerating Cloud Services Enterprise Private Clouds Public Clouds Partner Clouds Intercloud Fabric APIs Portal APIs Enterprise Workloads Native Cloud Applications Big Data & Analytics Collaboration & Video HCS IaaS PaaS Microsoft Suite aaS DRaaS Meraki Analytics WebEx Security IOE aaS HANA aaS vDesktop aaS Cloud Services & Applications APIs
    • 53. Intercloud Fabric Intercloud Fabric Cisco Intercloud Fabric On-Premise Cisco Intercloud Fabric for Business Cisco Intercloud Fabric for ProvidersCustomer Financial Employee CRM Security Policy Network Policy Cloud Services
    • 54. It has to be secure
    • 55. Covering the Entire Attack Continuum BEFOREBEFORE Discover Enforce Harden AFTERAFTER Scope Contain Remediate Detect Block Defend DURINGDURING
    • 56. BEFOREBEFORE Discover Enforce Harden AFTERAFTER Scope Contain Remediate Detect Block Defend DURINGDURING Covering the Entire Attack Continuum ASA
    • 57. Instant Security with ACI Policy Automation DATA CENTER WAN Threat Detected New Security Policy Remediation Action Update ACCESS
    • 58. Do the right thing balance
    • 59. Do it soon
    • 60. Do it soon! 30% H2O Efficiency? 30% Energy Efficiency? 30% Less Pollution? 30% Less Global Warming?
    • 61. The Internet of Everything Jim Grubb