Let’s see how things have shifted over the last few years. Not so long ago, we typically had a desktop computer and a datacenter. Intelligence was built into each. <CLICK>The role of the network was to provide connectivity from that desktop to the server that hosted an application. And back then, we were identified by that singular IP address associated with that computer node. That IP address was our identity.
But with the rise in mobile devices and applications in the last few years, the enterprise scene is changing. Now you are no longer uniquely identified by a specific IP address. You could be on an ipad, an iphone, a cius, and be logging in from anywhere. Who you are and where you are coming in from is not so simple anymore.
Looking at the other side of the equation, cloud and virtualization completely changed the paradigm of where the application could be sitting. It was no longer tied to a specific server. It could move around or be in a public cloud. All of sudden you couldn’t rely on that application being exactly in the location you expected it to be.
Looking at the other side of the equation, cloud and virtualization completely changed the paradigm of where the application could be sitting. It was no longer tied to a specific server. It could move around or be in a public cloud. All of sudden you couldn’t rely on that application being exactly in the location you expected it to be.
Looking at the other side of the equation, cloud and virtualization completely changed the paradigm of where the application could be sitting. It was no longer tied to a specific server. It could move around or be in a public cloud. All of sudden you couldn’t rely on that application being exactly in the location you expected it to be.
How do I manage complexity and scale?
There is a debate raging in the IT industry about the role of the network.In the same week that a gaming company’s network was hacked and the personal information of 60 million customers was leaked [INSERT TIMELY EXAMPLE], there is a debate raging about whether the network matters.In the same moment that the iPad is being adopted by 65% of the Fortune 100 — obliterating conventional wisdom about how corporate networks support consumer devices and mobility —there is a debate raging about whether the network matters.On one side we have newcomers to the networking industry and some industry commentators who believe that the value of a network should be determined only by the cost of its components. They argue that customers should focus squarely on acquisition cost, not the value of their network assets. They argue that customers should focus on capital cost, not network capability and innovation. They believe the network has become a utility; that ‘good’ is good enough.We all understand that negotiating the best price for goods and services always makes good business sense. But this debate is about more than that.The debate is about making a choice between a tactical network where getting the lowest possible price up front is paramount – and a strategic network investment that enables customers to adapt quickly to new business imperatives and to handle the increased demands on their business.
We are seeing a number of mega trends coming together here:First, the mobile, collaborative workforce. 60% of employees believe they don’t need to be in the office anymore to be productive and efficient. They are working across cities, states and borders – more productively – with less time and expense on travel, and often with their own devices. I’d like to tell youabout what customers need to know about ‘good enough’ networks and their ability to support that type of mobile workforce. Second, data center virtualization. Today, most servers still run a single application but by 2014, 70% will be virtualized and 20% of enterprise workers will use virtual desktops. I’d like to tell about what a ‘good enough’ network will and won’t do to support that type of massive shift in IT and the impact to the user experience.Third, let’s talk about Cloud computing. We’re seeing entirely new business and service models evolve in the Cloud economy. 8 out of 10 IT managers plan to use public or private cloud services over the next 3 years. That has huge implications for the network. But the best example, above all, is video. Video will become our primary means of communication. In less than 2 years, video will become 91% of the global internet traffic. That’s driving an unthinkable volume of data. 1 zettabyte. Much of that data is coming from mobile devices. The stat’s I’ve seen show that we are approaching 7 devices per person. A good enough network simply is not enough to support that volume of video.The stat’s I’ve seen show that we are approaching 7 devices per person. A good enough network simply is not enough to support that volume of videoAnd we also see growing security concerns that can only be addressed with a next generation network, as well. 20% of employees have left devices unattended; 58% let others use their device, and we’ve seen a 46% increase in malware for mobile devices.
Good isn’t good enough for today’s business critical networks. A good enough network isn’t good enough for...video…when 91 percent of global Internet traffic will be internet video. a mobile workforce… when 60% of employees believe they don’t need to be in the office to be productive & efficient. downtime…when large businesses lose an average of 3.6 percent in annual revenue due to network downtime each year. security…when20% of employees have left devices unattended; 58% let others use their device, 46% increase in malware for mobile devices. for cloud…when XXX
As those market transitions have unfolded, one foundational technology; one platform has grown in its relevance and its contribution. That’s the network.The network has evolved from offering basic connectivity between mainframes and terminals to enabling the creation of global networks of PCs.The network was the platform first for the transactional Web and the advent of eCommerce, and then the platform for the social Web with its rich media, collaborative and real time capabilities.
Network Requirements ….
This debate has fueled numerous myths and misperceptions in our industry. Here are the seven most important Myths of the Good Enough Network. The Application and Endpoint Ignorant Myth: Good Enough Networks typically operate on the notion that data is data—all just ones and zeroes. More sophisticated next generation networks are built on innovative products that adjust to the application being delivered and the endpoint device on which it appears.Basic QoS Myth: If a company has no plans for video applications or rolling out virtual desktops, basic QoS may suffice. However, if the business wants to take advantage of video conferencing or to reap the benefits of a virtual desktop environment without compromising the end-user experience, they need to invest in a network with advanced QoS capabilities.Single Purpose Myth: Customers investing in networks for a single purpose are missing opportunities to use the power of the network to improve carbon footprint, save energy costs, and provide unified management for wired and wireless networks.Basic Warranty Myth: Service contracts and warranties are not created equal. You usually get what you pay for. Unfortunately, you never realize how good a service contract is until you need it. Be prepared and look at the fine print.Security as a Bolt-On Myth: Network security has to keep pace with an ever-changing threat profile and the increased use of mobile devices. When different security elements don’t share information, it magnifies the challenge of creating consistent security across the entire IT environment and can leave the customer exposed to costly security incidents. Acquisition Cost Myth: When building an IT network, about 20 percent of the budget is for acquiring the hardware and 80 percent is for operating costs. If customers don’t assess the complete financial impact, building a tactical network can quickly become the more expensive network. Just Look for Standards Myth: While industry standards are extremely important, relying only on existing standards as you plan for future needs is misguided. When companies lock themselves into standards-based, good-enough networks, they miss out on higher-level service innovation.
The diagram you see here outlines the main components of the borderless network architecture – it links applications, users, and end-point devices with operational processes and the network.It serves as both a framework for our system and architecture roadmap, as well as the deployment blueprint for Borderless Organizations. Let me briefly walk through its main elements. There are key pillars of functionality that Cisco Borderless Networks delivers on – primarily video, green, security, mobility, and application performance—on an end-to-end basis. For innovative organizations, these are key areas of investment and differentiation. The critical network services and proof-points of these pillars include Medianet, TrustSec and EnergyWise; they are delivered by the core infrastructure including routing, switching, mobility, security and WAN Optimization components. Equally important to the Borderless Network architecture is how the user experience is impacted by these network services—when mobile, when engaging with video, and in the workplace—however it’s defined. Network services integrate with endpoint technologies like AnyConnect, to deliver always-on, seamless, reliable, secure connectivity regardless of location or device.Meanwhile, Borderless Management and Policy are built into Network and User Services, offering a flexible and dynamic framework for policy definition and enforcement that spans across video, green, security, mobility, and application performance. The focus here is to connect the right user, the right device, the right application at the right place, at the right time, to the right network. It enables organizations to offer different levels of access privileges or performance characteristics to users, devices and applications.In this framework, policy definition and administration are centralized while control, visibility and enforcement are distributed via the application of dynamic policy assignments.Finally, we have the end-point devices that Cisco extends intelligence and awareness to, including cameras, video terminals, IP Phones, and mobile devices so that the experience is seamless and end to end. It is this blended approach of technologies and new capabilities that will enable new business models and allow your organization to go Borderless. Let’s take a look now at each of those critical network services I mentioned.services including mobile collaboration and secure mobility
Cisco offers a comprehensive campus switching portfolio that extend from the edge of the network to the core. The Catalyst 6500 and Nexus 7000 are ideally suited for the core layer. At the distribution layer the Catalyst 6500 is thelead platform, and in certain smaller deployments, the Catalyst 4500E. We also have Catalyst 4500-X fixed platform for distribution in space constrained environments. The Catalyst 3000 and 4000 are ideal for the access layers. Certain customers who value a single platform for end to end deployments may opt to deploy the 6500 in the access layer And of course the 2000 is an entry level option for the access layer.
Switch with 3D in the middle. Surrounded by 10 key benefits