SlideShare uma empresa Scribd logo
1 de 11
Baixar para ler offline
Unified Networks
          The Key to Business Agility



Presentation_ID   © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Access: THEN

                                                                                                        Limited. Siloed.
                                                                                                         Purpose-built
Yet Simple.                                                                                              Limited Application Portability
                                                                                                         Loss of Flexibility




                    DATA                                                                        VOICE               FACILITY




Presentation_ID   © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential                                        2
Network Access: NOW
                          Applications                                                                       Seamless
                          Anywhere                                                                         Connectivity




          More
          Complex.

                                                                                       Growth in Network
                                                                                       Connected Devices


              Network Complexity Can Disrupt the User Experience and Increase TCO
Presentation_ID   © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential                             3
Given Access Network Complexity…
              Consider the Right Approach to Network Design



           It’s NOT                           Point Network Access Technologies
           About

                                              Understanding the Application and User
           It’s About                         Requirements of the Business


           It’s About                         Allowing These to Determine the Right Network Topology




        The Right Approach to Network Access Enables Your Users to Cross Network
                       Borders with a Secure, Consistent Experience
Presentation_ID   © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential          4
Access Networks Comprise Wired,
              Wireless and Remote Access Technologies
                                                                               Deploy the Right Mix of
                                                                              Technologies That Support
                                                                                Your Varied Business
                                                                                   Requirements
                          Application
                                                                                                              Directives
                           Evolution
                                                Contact
                         Email                                                                            Compliance     Green
                                                Center




                           Device                                                                               Diverse
                         Proliferation                                                                           Users
                       Smart-                   Smart
                                                                                                           Engineer    Sales Exec
                       phones                   Meters




                  An Architectural Approach Provides a Holistic View Of the Three Access
                              Technologies to Drive A Borderless Experience
Presentation_ID    © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential                                      5
What Is Network Unification?


                                                                               Network              Applications


                                                            Facilities                                         Client


                                                                                      Unification              Services
                                                        Staffing


                                                                 Indoor and
                                                                                                           Management
                                                                   Outdoor

                                                                                                Security




Presentation_ID   © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential                             6
Define a Strategy with a Unification Checklist




                                                                  Access Policies for Users and Devices

                                                                  End-to-end Security

                                                                  Simple, Single View of Network Operations

                                                                  IT Support Coverage

                                                                  Compliant

                                                                  Green Considerations

                                                                  Plan for Future Growth



Presentation_ID   © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential                 7
Define a Strategy with a Unification Checklist




                                                                  Access Policies for Users and Devices

                                                                  End-to-end Security

                                                                  Simple, Single View of Network Operations

                                                                  IT Support Coverage

                                                                  Compliant

                                                                  Green Considerations

                                                                  Plan for Future Growth


                    Select a Vendor Who can Address Your End-to-End Access Needs
Presentation_ID   © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential                 8
Impact of Avoiding Unification

                Network                                     Simplifying User                     Managing       Building a “Future
            Interoperability                                 Management                         Multi-vendor     Proof” Network
                                                                                                Relationships




                                                                                 Increases Total Cost
                                                                                     of Operations

             To Lower TCO, Define an Access Strategy That Aligns with Your Business
Presentation_ID   © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential                                        9
Unification Summary
            Unification is a process – not a
             technology
            Understand your application and                                                               Network    Applications


             user requirements
                                                                                                 Facilities                      Client


            Plan your unification in steps
                                                                                                              Unification
                      Network access                                                            Staffing                         Services


                      Network services
                                                                                                    Indoor and
                                                                                                      Outdoor               Management
                      Management and policy
                                                                                                                 Security
            Wireless and wired networks are
             cooperative and interdependent




Presentation_ID   © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential                                               10
Presentation_ID   © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential   11

Mais conteúdo relacionado

Mais procurados

Network Infrastructure Virtualization Case Study
Network Infrastructure Virtualization Case StudyNetwork Infrastructure Virtualization Case Study
Network Infrastructure Virtualization Case StudyCisco Canada
 
#EMC #DOCUMENTUM -content-management-in-action
#EMC #DOCUMENTUM -content-management-in-action#EMC #DOCUMENTUM -content-management-in-action
#EMC #DOCUMENTUM -content-management-in-actionMountaha
 
Simply Connected Solution Brief
Simply Connected Solution BriefSimply Connected Solution Brief
Simply Connected Solution BriefJuniper Networks
 
Cisco Cloud Briefing and Experiences for Cloud Slam 2011
Cisco Cloud Briefing and Experiences for Cloud Slam 2011Cisco Cloud Briefing and Experiences for Cloud Slam 2011
Cisco Cloud Briefing and Experiences for Cloud Slam 2011Cisco Collaboration
 
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...Xenesys
 
Avaya Sip Within Your Enterprise
Avaya   Sip Within Your EnterpriseAvaya   Sip Within Your Enterprise
Avaya Sip Within Your Enterprisehypknight
 
Ronny haraldsvik new managed services
Ronny haraldsvik new managed servicesRonny haraldsvik new managed services
Ronny haraldsvik new managed servicesPranowo Budi Sulistyo
 
Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012Mahbubul Alam
 
Logicalis building a digital infrastructure norwich (2)
Logicalis building a digital infrastructure norwich (2)Logicalis building a digital infrastructure norwich (2)
Logicalis building a digital infrastructure norwich (2)ngcoin
 
Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Arrow ECS UK
 
In building wireless intro from nera
In building  wireless  intro from neraIn building  wireless  intro from nera
In building wireless intro from neraA H M A D I (madi)
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)itforum-roundtable
 
Meraki 2012 Corporate Brochure
Meraki 2012 Corporate BrochureMeraki 2012 Corporate Brochure
Meraki 2012 Corporate Brochureguillaumepays
 

Mais procurados (16)

Network Infrastructure Virtualization Case Study
Network Infrastructure Virtualization Case StudyNetwork Infrastructure Virtualization Case Study
Network Infrastructure Virtualization Case Study
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
#EMC #DOCUMENTUM -content-management-in-action
#EMC #DOCUMENTUM -content-management-in-action#EMC #DOCUMENTUM -content-management-in-action
#EMC #DOCUMENTUM -content-management-in-action
 
Simply Connected Solution Brief
Simply Connected Solution BriefSimply Connected Solution Brief
Simply Connected Solution Brief
 
Cisco Cloud Briefing and Experiences for Cloud Slam 2011
Cisco Cloud Briefing and Experiences for Cloud Slam 2011Cisco Cloud Briefing and Experiences for Cloud Slam 2011
Cisco Cloud Briefing and Experiences for Cloud Slam 2011
 
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
 
Avaya Sip Within Your Enterprise
Avaya   Sip Within Your EnterpriseAvaya   Sip Within Your Enterprise
Avaya Sip Within Your Enterprise
 
Ronny haraldsvik new managed services
Ronny haraldsvik new managed servicesRonny haraldsvik new managed services
Ronny haraldsvik new managed services
 
Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012
 
Logicalis building a digital infrastructure norwich (2)
Logicalis building a digital infrastructure norwich (2)Logicalis building a digital infrastructure norwich (2)
Logicalis building a digital infrastructure norwich (2)
 
Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4
 
In building wireless intro from nera
In building  wireless  intro from neraIn building  wireless  intro from nera
In building wireless intro from nera
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)
 
NNIT
NNITNNIT
NNIT
 
Sahara petrochemicals cisco
Sahara petrochemicals  ciscoSahara petrochemicals  cisco
Sahara petrochemicals cisco
 
Meraki 2012 Corporate Brochure
Meraki 2012 Corporate BrochureMeraki 2012 Corporate Brochure
Meraki 2012 Corporate Brochure
 

Destaque

Extending the lifecycle of your storage area network
Extending the lifecycle of your storage area networkExtending the lifecycle of your storage area network
Extending the lifecycle of your storage area networkInterop
 
Outsourcing it security yes, it’s still your problem
Outsourcing it security yes, it’s still your problemOutsourcing it security yes, it’s still your problem
Outsourcing it security yes, it’s still your problemInterop
 
Frequent Asserted Franchisee Causes of Action Against Franchisors
Frequent Asserted Franchisee Causes of Action Against FranchisorsFrequent Asserted Franchisee Causes of Action Against Franchisors
Frequent Asserted Franchisee Causes of Action Against FranchisorsCarmen Caruso
 
Unconscionability and Franchise Litigation
Unconscionability and Franchise LitigationUnconscionability and Franchise Litigation
Unconscionability and Franchise LitigationCarmen Caruso
 
Frequently Asserted Franchisee Causes of Action Against Franchisors
Frequently Asserted Franchisee Causes of Action Against FranchisorsFrequently Asserted Franchisee Causes of Action Against Franchisors
Frequently Asserted Franchisee Causes of Action Against FranchisorsCarmen Caruso
 

Destaque (8)

Cdc.aahoa 2007
Cdc.aahoa 2007Cdc.aahoa 2007
Cdc.aahoa 2007
 
Copies Of E Mails
Copies Of E MailsCopies Of E Mails
Copies Of E Mails
 
Extending the lifecycle of your storage area network
Extending the lifecycle of your storage area networkExtending the lifecycle of your storage area network
Extending the lifecycle of your storage area network
 
Outsourcing it security yes, it’s still your problem
Outsourcing it security yes, it’s still your problemOutsourcing it security yes, it’s still your problem
Outsourcing it security yes, it’s still your problem
 
Frequent Asserted Franchisee Causes of Action Against Franchisors
Frequent Asserted Franchisee Causes of Action Against FranchisorsFrequent Asserted Franchisee Causes of Action Against Franchisors
Frequent Asserted Franchisee Causes of Action Against Franchisors
 
Unconscionability and Franchise Litigation
Unconscionability and Franchise LitigationUnconscionability and Franchise Litigation
Unconscionability and Franchise Litigation
 
What Lies Beneath
What Lies BeneathWhat Lies Beneath
What Lies Beneath
 
Frequently Asserted Franchisee Causes of Action Against Franchisors
Frequently Asserted Franchisee Causes of Action Against FranchisorsFrequently Asserted Franchisee Causes of Action Against Franchisors
Frequently Asserted Franchisee Causes of Action Against Franchisors
 

Semelhante a Bridging the wired wireless

Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the FutureCisco Security
 
Deploying Cisco ISR G2 and ASR 1000 in the Enterprise
Deploying Cisco ISR G2 and ASR 1000 in the EnterpriseDeploying Cisco ISR G2 and ASR 1000 in the Enterprise
Deploying Cisco ISR G2 and ASR 1000 in the EnterpriseCisco Canada
 
Развитие технологий SDN для сетей ЦОД
Развитие технологий SDN для сетей ЦОДРазвитие технологий SDN для сетей ЦОД
Развитие технологий SDN для сетей ЦОДCisco Russia
 
Technology Development and Innovation at Cisco
Technology Development and Innovation at CiscoTechnology Development and Innovation at Cisco
Technology Development and Innovation at CiscoCisco Canada
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYODGen-i
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYODGen-i
 
Virtualize Your Telephony Platform with Cisco UCS
Virtualize Your Telephony Platform with Cisco UCSVirtualize Your Telephony Platform with Cisco UCS
Virtualize Your Telephony Platform with Cisco UCSAdvanced Logic Industries
 
Oracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterOracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterGeneXus
 
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...HKISPA
 
"Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
 "Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр... "Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
"Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...Cisco Russia
 
Cloud Computing at Cisco
Cloud Computing at CiscoCloud Computing at Cisco
Cloud Computing at CiscoCisco Canada
 
Cat6500 Praesentation
Cat6500 PraesentationCat6500 Praesentation
Cat6500 PraesentationSophan_Pheng
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionCisco Mobility
 
Simplificando el Contact Center en una sola plataforma de Colaboración
Simplificando el Contact Center en una sola plataforma de ColaboraciónSimplificando el Contact Center en una sola plataforma de Colaboración
Simplificando el Contact Center en una sola plataforma de ColaboraciónMundo Contact
 
Cisco switching technical
Cisco switching technicalCisco switching technical
Cisco switching technicalImranD1
 
Build Scanning into Your Web Based Business Application
Build Scanning into Your Web Based Business ApplicationBuild Scanning into Your Web Based Business Application
Build Scanning into Your Web Based Business Applicationbgalusha
 
Federated Networked Cloud
Federated Networked CloudFederated Networked Cloud
Federated Networked CloudEricsson Labs
 
Cisco connect winnipeg 2018 simple it leads to simple it management
Cisco connect winnipeg 2018   simple it leads to simple it managementCisco connect winnipeg 2018   simple it leads to simple it management
Cisco connect winnipeg 2018 simple it leads to simple it managementCisco Canada
 

Semelhante a Bridging the wired wireless (20)

Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
 
Deploying Cisco ISR G2 and ASR 1000 in the Enterprise
Deploying Cisco ISR G2 and ASR 1000 in the EnterpriseDeploying Cisco ISR G2 and ASR 1000 in the Enterprise
Deploying Cisco ISR G2 and ASR 1000 in the Enterprise
 
Развитие технологий SDN для сетей ЦОД
Развитие технологий SDN для сетей ЦОДРазвитие технологий SDN для сетей ЦОД
Развитие технологий SDN для сетей ЦОД
 
Juniper sa-sslvpn
Juniper sa-sslvpnJuniper sa-sslvpn
Juniper sa-sslvpn
 
Technology Development and Innovation at Cisco
Technology Development and Innovation at CiscoTechnology Development and Innovation at Cisco
Technology Development and Innovation at Cisco
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYOD
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYOD
 
Virtualize Your Telephony Platform with Cisco UCS
Virtualize Your Telephony Platform with Cisco UCSVirtualize Your Telephony Platform with Cisco UCS
Virtualize Your Telephony Platform with Cisco UCS
 
Oracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterOracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao Datacenter
 
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
 
"Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
 "Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр... "Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
"Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
 
Cloud Computing at Cisco
Cloud Computing at CiscoCloud Computing at Cisco
Cloud Computing at Cisco
 
Cat6500 Praesentation
Cat6500 PraesentationCat6500 Praesentation
Cat6500 Praesentation
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solution
 
Simplificando el Contact Center en una sola plataforma de Colaboración
Simplificando el Contact Center en una sola plataforma de ColaboraciónSimplificando el Contact Center en una sola plataforma de Colaboración
Simplificando el Contact Center en una sola plataforma de Colaboración
 
Cisco switching technical
Cisco switching technicalCisco switching technical
Cisco switching technical
 
Build Scanning into Your Web Based Business Application
Build Scanning into Your Web Based Business ApplicationBuild Scanning into Your Web Based Business Application
Build Scanning into Your Web Based Business Application
 
Federated Networked Cloud
Federated Networked CloudFederated Networked Cloud
Federated Networked Cloud
 
ODCA Solutions Panel at IDF 2011
ODCA Solutions Panel at IDF 2011ODCA Solutions Panel at IDF 2011
ODCA Solutions Panel at IDF 2011
 
Cisco connect winnipeg 2018 simple it leads to simple it management
Cisco connect winnipeg 2018   simple it leads to simple it managementCisco connect winnipeg 2018   simple it leads to simple it management
Cisco connect winnipeg 2018 simple it leads to simple it management
 

Mais de Interop

Preparing for the cloud
Preparing for the cloudPreparing for the cloud
Preparing for the cloudInterop
 
Portable clouds navigating cloud standards
Portable clouds navigating cloud standardsPortable clouds navigating cloud standards
Portable clouds navigating cloud standardsInterop
 
Planning for (and deploying!) 4 g wireless
Planning for (and deploying!) 4 g wirelessPlanning for (and deploying!) 4 g wireless
Planning for (and deploying!) 4 g wirelessInterop
 
Planning and implementing windows 7
Planning and implementing windows 7Planning and implementing windows 7
Planning and implementing windows 7Interop
 
Overview and current topics in solid state storage
Overview and current topics in solid state storageOverview and current topics in solid state storage
Overview and current topics in solid state storageInterop
 
Next gen lan infrastructure
Next gen lan infrastructureNext gen lan infrastructure
Next gen lan infrastructureInterop
 
New approaches to vulnerability management
New approaches to vulnerability managementNew approaches to vulnerability management
New approaches to vulnerability managementInterop
 
Mst cloud interoperability process
Mst cloud interoperability processMst cloud interoperability process
Mst cloud interoperability processInterop
 
Mobile security new challenges practical solutions
Mobile security new challenges practical solutionsMobile security new challenges practical solutions
Mobile security new challenges practical solutionsInterop
 
Mobile computing threats
Mobile computing threatsMobile computing threats
Mobile computing threatsInterop
 
Mobile application development strategies
Mobile application development strategiesMobile application development strategies
Mobile application development strategiesInterop
 
Managing your virtual environment
Managing your virtual environmentManaging your virtual environment
Managing your virtual environmentInterop
 
Managing change in the data center network
Managing change in the data center networkManaging change in the data center network
Managing change in the data center networkInterop
 
Managing a public cloud
Managing a public cloudManaging a public cloud
Managing a public cloudInterop
 
Malice through the looking glass
Malice through the looking glassMalice through the looking glass
Malice through the looking glassInterop
 
Desktop virtualization primer one size does not fit all
Desktop virtualization primer   one size does not fit allDesktop virtualization primer   one size does not fit all
Desktop virtualization primer one size does not fit allInterop
 
Desktop virtualization best practices
Desktop virtualization best practicesDesktop virtualization best practices
Desktop virtualization best practicesInterop
 
Deep dive why networking must fundamentally change
Deep dive why networking must fundamentally changeDeep dive why networking must fundamentally change
Deep dive why networking must fundamentally changeInterop
 
Deep dive storage networking the path to performance
Deep dive storage networking the path to performanceDeep dive storage networking the path to performance
Deep dive storage networking the path to performanceInterop
 
Deep dive network requirementsfor enterprise video conferencing
Deep dive   network requirementsfor enterprise video conferencingDeep dive   network requirementsfor enterprise video conferencing
Deep dive network requirementsfor enterprise video conferencingInterop
 

Mais de Interop (20)

Preparing for the cloud
Preparing for the cloudPreparing for the cloud
Preparing for the cloud
 
Portable clouds navigating cloud standards
Portable clouds navigating cloud standardsPortable clouds navigating cloud standards
Portable clouds navigating cloud standards
 
Planning for (and deploying!) 4 g wireless
Planning for (and deploying!) 4 g wirelessPlanning for (and deploying!) 4 g wireless
Planning for (and deploying!) 4 g wireless
 
Planning and implementing windows 7
Planning and implementing windows 7Planning and implementing windows 7
Planning and implementing windows 7
 
Overview and current topics in solid state storage
Overview and current topics in solid state storageOverview and current topics in solid state storage
Overview and current topics in solid state storage
 
Next gen lan infrastructure
Next gen lan infrastructureNext gen lan infrastructure
Next gen lan infrastructure
 
New approaches to vulnerability management
New approaches to vulnerability managementNew approaches to vulnerability management
New approaches to vulnerability management
 
Mst cloud interoperability process
Mst cloud interoperability processMst cloud interoperability process
Mst cloud interoperability process
 
Mobile security new challenges practical solutions
Mobile security new challenges practical solutionsMobile security new challenges practical solutions
Mobile security new challenges practical solutions
 
Mobile computing threats
Mobile computing threatsMobile computing threats
Mobile computing threats
 
Mobile application development strategies
Mobile application development strategiesMobile application development strategies
Mobile application development strategies
 
Managing your virtual environment
Managing your virtual environmentManaging your virtual environment
Managing your virtual environment
 
Managing change in the data center network
Managing change in the data center networkManaging change in the data center network
Managing change in the data center network
 
Managing a public cloud
Managing a public cloudManaging a public cloud
Managing a public cloud
 
Malice through the looking glass
Malice through the looking glassMalice through the looking glass
Malice through the looking glass
 
Desktop virtualization primer one size does not fit all
Desktop virtualization primer   one size does not fit allDesktop virtualization primer   one size does not fit all
Desktop virtualization primer one size does not fit all
 
Desktop virtualization best practices
Desktop virtualization best practicesDesktop virtualization best practices
Desktop virtualization best practices
 
Deep dive why networking must fundamentally change
Deep dive why networking must fundamentally changeDeep dive why networking must fundamentally change
Deep dive why networking must fundamentally change
 
Deep dive storage networking the path to performance
Deep dive storage networking the path to performanceDeep dive storage networking the path to performance
Deep dive storage networking the path to performance
 
Deep dive network requirementsfor enterprise video conferencing
Deep dive   network requirementsfor enterprise video conferencingDeep dive   network requirementsfor enterprise video conferencing
Deep dive network requirementsfor enterprise video conferencing
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 

Último (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 

Bridging the wired wireless

  • 1. Unified Networks The Key to Business Agility Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 2. Network Access: THEN Limited. Siloed. Purpose-built Yet Simple. Limited Application Portability Loss of Flexibility DATA VOICE FACILITY Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  • 3. Network Access: NOW Applications Seamless Anywhere Connectivity More Complex. Growth in Network Connected Devices Network Complexity Can Disrupt the User Experience and Increase TCO Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  • 4. Given Access Network Complexity… Consider the Right Approach to Network Design It’s NOT Point Network Access Technologies About Understanding the Application and User It’s About Requirements of the Business It’s About Allowing These to Determine the Right Network Topology The Right Approach to Network Access Enables Your Users to Cross Network Borders with a Secure, Consistent Experience Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
  • 5. Access Networks Comprise Wired, Wireless and Remote Access Technologies Deploy the Right Mix of Technologies That Support Your Varied Business Requirements Application Directives Evolution Contact Email Compliance Green Center Device Diverse Proliferation Users Smart- Smart Engineer Sales Exec phones Meters An Architectural Approach Provides a Holistic View Of the Three Access Technologies to Drive A Borderless Experience Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
  • 6. What Is Network Unification? Network Applications Facilities Client Unification Services Staffing Indoor and Management Outdoor Security Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  • 7. Define a Strategy with a Unification Checklist Access Policies for Users and Devices End-to-end Security Simple, Single View of Network Operations IT Support Coverage Compliant Green Considerations Plan for Future Growth Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
  • 8. Define a Strategy with a Unification Checklist Access Policies for Users and Devices End-to-end Security Simple, Single View of Network Operations IT Support Coverage Compliant Green Considerations Plan for Future Growth Select a Vendor Who can Address Your End-to-End Access Needs Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
  • 9. Impact of Avoiding Unification Network Simplifying User Managing Building a “Future Interoperability Management Multi-vendor Proof” Network Relationships Increases Total Cost of Operations To Lower TCO, Define an Access Strategy That Aligns with Your Business Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  • 10. Unification Summary  Unification is a process – not a technology  Understand your application and Network Applications user requirements Facilities Client  Plan your unification in steps Unification Network access Staffing Services Network services Indoor and Outdoor Management Management and policy Security  Wireless and wired networks are cooperative and interdependent Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
  • 11. Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11