Bridging the wired wireless

1,053 views

Published on

Published in: Education
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,053
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
65
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Bridging the wired wireless

  1. 1. Unified Networks The Key to Business Agility Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  2. 2. Network Access: THEN Limited. Siloed. Purpose-built Yet Simple. Limited Application Portability Loss of Flexibility DATA VOICE FACILITY Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  3. 3. Network Access: NOW Applications Seamless Anywhere Connectivity More Complex. Growth in Network Connected Devices Network Complexity Can Disrupt the User Experience and Increase TCO Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  4. 4. Given Access Network Complexity… Consider the Right Approach to Network Design It’s NOT Point Network Access Technologies About Understanding the Application and User It’s About Requirements of the Business It’s About Allowing These to Determine the Right Network Topology The Right Approach to Network Access Enables Your Users to Cross Network Borders with a Secure, Consistent Experience Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
  5. 5. Access Networks Comprise Wired, Wireless and Remote Access Technologies Deploy the Right Mix of Technologies That Support Your Varied Business Requirements Application Directives Evolution Contact Email Compliance Green Center Device Diverse Proliferation Users Smart- Smart Engineer Sales Exec phones Meters An Architectural Approach Provides a Holistic View Of the Three Access Technologies to Drive A Borderless Experience Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
  6. 6. What Is Network Unification? Network Applications Facilities Client Unification Services Staffing Indoor and Management Outdoor Security Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  7. 7. Define a Strategy with a Unification Checklist Access Policies for Users and Devices End-to-end Security Simple, Single View of Network Operations IT Support Coverage Compliant Green Considerations Plan for Future Growth Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
  8. 8. Define a Strategy with a Unification Checklist Access Policies for Users and Devices End-to-end Security Simple, Single View of Network Operations IT Support Coverage Compliant Green Considerations Plan for Future Growth Select a Vendor Who can Address Your End-to-End Access Needs Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
  9. 9. Impact of Avoiding Unification Network Simplifying User Managing Building a “Future Interoperability Management Multi-vendor Proof” Network Relationships Increases Total Cost of Operations To Lower TCO, Define an Access Strategy That Aligns with Your Business Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  10. 10. Unification Summary  Unification is a process – not a technology  Understand your application and Network Applications user requirements Facilities Client  Plan your unification in steps Unification Network access Staffing Services Network services Indoor and Outdoor Management Management and policy Security  Wireless and wired networks are cooperative and interdependent Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
  11. 11. Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11

×