Contenu connexe Similaire à Корпоративные сети через 5 лет: что нас ждет? Similaire à Корпоративные сети через 5 лет: что нас ждет? (20) Plus de Cisco Russia (20) Корпоративные сети через 5 лет: что нас ждет? 1. Ian Bull
Enterprise Network Group. EMEAR
May 2014
Next Generation IT
Enterprise Networks Forum – Moscow June 14
Andrey Kharitonov
Business Development. Russia CIS
2. Cisco Confidential 2© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Predicting the future is not easy
“ Prediction is very difficult, especially about the
future.”
Niels Bohr, Nobel Laureate
“ Everything that can be invented has been invented” -
Commissioner, U.S. Patent Office, 1899
“ This 'telephone'... is inherently of no value to us.”
Western Union memo, 1886
“ We always overestimate the change that will occur in
the next two years and underestimate the change
that will occur in the next ten”
Bill Gates
“ The best way to predict the future is to create it.”
Peter Drucker
3. Cisco Confidential 3© 2013-2014 Cisco and/or its affiliates. All rights reserved.
What are the
Enterprise
Megatrends
MOBILITY
BYOD
M2M
CLOUD
SaaS | DC / V
IMMERSIVE
COLLABORATION
Pervasive Video
COST CONTROL, TCO, Operational Efficiency
IT EFFECTIVENESS, Service, Simplicity and Network Management
SECURITY, Accelerating Cyber-Threats
$
4. Cisco Confidential 4© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco VNI Report
2Cisco Visual Networking Index 2014Pew Data Research, Dec 2013, 3Mary Meeker Data, Dec 2013
Device Explosion Network Traffic Patterns IT Transitions
Tablets shipped within Europe
90 million
per person
3 Devices
By 2015, Smartphones
+ Tablets exceed PC
by...
2x
Mobile data to grow x26
• BYOD, Mobility, Cloud
• Visibility
• Simplicity
• New LoB IT Needs
• Smarter Business
Processes Lower TCO
/ month
Avg. mobile user to generate about
1GB
Comparing with 63MB today
Over
70%
will be video
Internet of Things/Everything.
M2M connectivity
Traffic forecast by 2018
5. Cisco Confidential 5© 2013-2014 Cisco and/or its affiliates. All rights reserved.
The network is more critical to
delivering applications than a year ago
Policy for employee device access**
The network is not ready for BYOD*
The network is not ready for cloud
*2013 Cisco Global IT Impact
Survey,
**2013 Cisco IBSG Horizons Study
Optimal Application
Experience
New Connected
Experiences
Managed Cloud
Services
BYOD and
Mobility
IT Simplicity and
Programmability
?
6. Cisco Confidential 6© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Opportunity or Challenge?
HR: Enable new mobile
work styles and BYOD
trends to retain the best
workforce and achieve
more productivity
CMO: Provide improved
customer experiences to
build satisfaction and
loyalty
CIO: Build an enterprise
–wide mobility strategy
that addresses new
business to employee
and business to
consumer opportunities
CISO: Secure the delivery
of mobile apps, data and
communications to users
on multiple employee-
owned and corporate-issued
devices
VP Apps: Develop new
apps and mobilize
existing apps for
employee, partner and
customer mobile devices.
Anytime, anywhere.
End-user Computing: I need
to deliver apps, data,
communications to all
employee and corporate
owned devices with limited
budget and resources
Network: I need to
connect more devices
anywhere without
increasing cost,
complexity or security
threats
Infrastructure: I need to
host, manage and deliver
rapid growth in mobile
apps and data.
Support high demand for
bandwidth at any time
LOB: Opportunity to build
new revenue streams to
be more competitive
and gain wallet share
Challenge
Opportunity
Business
Leaders
IT
Executives
IT
Management
7. Cisco Confidential 7© 2013-2014 Cisco and/or its affiliates. All rights reserved.
2000
Mobile Devices were
a privilege…
2010
Everyone had at least
one Mobile Device…
3 or more Mobile Devices
are commonplace…
+ Connecting M2M
2016 +
Compiled from multiple sources: Gartner, ABI, IDC, VNI
8. Cisco Confidential 8© 2013-2014 Cisco and/or its affiliates. All rights reserved.
802.11ac interference
detection and mitigation
PREDICTABLITY
Beamforming for
802.11a/g/n/ac
UNMATCHED
SCALE
Optimized for high speed
scheduling and packet
processing
n
n
AP
ac
ac
n
ac
CLEAN AIR CLIENTLINK
TURBO BOOST
BATTERY
SAVINGS
INTELLIGENT
ROAMING
RELIABILITY
Unstick clients as they roam
between AP’s or to cellular
Reduce co-channel
interference channels in
dense AP installations
OPTIMIZED
ROAMING
RF NOISE
SUPPRESION
9. Cisco Confidential 9© 2013-2014 Cisco and/or its affiliates. All rights reserved.
10Base-T
1990 1995
100Base-T
2000 2005 2010
802.11
802.11g
802.11n
1000Base-T
2015
802.11ac
Adoption
• >50% of enterprise traffic
will originate on Wi-Fi by
2018 (Cisco VNI)
• 50% of all new Wi-Fi
devices in 2014 will be
802.11ac capable (ABI
Research)
• Wave 1 802.11ac has 5+
years of affectivity for
Smartphones and Tablets
• Wave 1 802.11ac
improves battery efficiency
by 2X for Smartphones,
Tablets, and Laptops
Compiled from multiple sources: Gartner, ABI, IDC, VNI
10. Cisco Confidential 10© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Corporate Applications
only on the network
Corporate and Personal
Applications started to
share the network
Corporate Applications are
competing with Personal
Applications for the network
2000
2010
2016 +
Compiled from multiple sources: Gartner, ABI, IDC, VNI
11. Cisco Confidential 11© 2013-2014 Cisco and/or its affiliates. All rights reserved.
HTTP HTTP
HTTP
Application Visibility and
Control
Discover: 1000+ applications categorized
to simplify management
Performance Collection: Enhanced
application performance reports, url hit counts,
top applications …
Control: Apply QoS, Acceleration and Path
Control according to company performance
expectations
Natively Integrated into
Cisco Portfolio
Simple to Enable
12. Cisco Confidential 12© 2013-2014 Cisco and/or its affiliates. All rights reserved.
2000
Mobile Devices were
a privilege…
2010
Everyone had at least
one Mobile Device…
3 or more Mobile Devices
are commonplace…
+ Connecting M2M
2016 +
Compiled from multiple sources: Gartner, ABI, IDC, VNI
13. Cisco Confidential 13© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Onboard Users based
on where they are in the
network
Tailor notifications
based on where a
User is in the
network
TAILORED
MESSAGING
TARGETED
ONBOARDING
“Turn-by-turn”
directions to any
location within a
venue
INDOOR
DIRECTIONS
Analyze aggregate
locations, URLs, and
demographics
“Big Data”
Analytics
Connect with other
systems, such as
registration, property
management, product
databases, or location-
based services
SYSTEM
INTEGRATION
14. Cisco Confidential 14© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Maps
Employee Productivity
• Find open rooms
• Find people
• Find resources
• Reserve Rooms
• Locate People/Rooms
• Find buildings
Cisco Maps
Improve Employee Productivity through location enabled apps
16. Cisco Confidential 16© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Simple
Secure
Reduced
TCO
Connecting People
Connecting Clouds
Connecting Things
The Intelligent Platform for a Connected World
17. Cisco Confidential 17© 2013-2014 Cisco and/or its affiliates. All rights reserved.
One Policy
Identity Services Engine
World-class unified policy definition
and enforcement across wired,
wireless and VPN
One Management
Cisco Prime
Single solution for comprehensive
lifecycle management and user,
network and application visibility
One Network
Unified Access / IWAN
Catalyst
Integrated Industry-leading networking
and mobility capabilities for a single
network infrastructure
Simple
Secure
Reduced
TCO
Making IT More Responsive to the Business
Less Time on IT Operations, More Time on IT Business Innovation
18. Cisco Confidential 18© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Our Product Strategy… Provide an OPEN architecture to allow for flexibility and choice
Building the Best
The Best Being
Better Together
19. Cisco Confidential 19© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Strategy for SDN
Many Purpose-Built
Architectures
SWITCHING,
ROUTING, WIRELESS
Unique
Services
Purpose-
Built ASICs
IOS
Variants
Custom HW
Unique
Services
Purpose-
Built ASICs
IOS
Variants
Custom HW
Unique
Services
Purpose-
Built ASICs
IOS
Variants
Custom HW
Unique
Services
Purpose-
Built ASICs
IOS
Variants
Custom HW
Unique
Services
Purpose-
Built ASICs
IOS
Variants
Custom HW
Unique
Services
Purpose-
Built ASICs
IOS
Variants
Custom HW
Unique
Services
Purpose-
Built ASICs
IOS
Variants
Custom HW
Multiple Products on
Common Architecture
SIMPLE, SECURE,
REDUCED TCO
UADP and USCP ASIC
Standard Platforms
Common Services
IOS-XE
Cisco ONE Architecture
AGILE SOFTWARE MODEL
Software-Defined Services
Management and Policy
Standard Platforms
UADP and USCP ASIC
IOS-XE
Cisco ONE
Yesterday Today Tomorrow
20. Cisco Confidential 20© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Network-Aware Applications
Developed by Cisco, Third Parties or Customers Using Network APIs
Network Abstraction Layer
Provisions Network Services Consistently Across All Network Devices
Richest Set of Devices, ASICs & Software
Across Wired and Wireless Networks, with Service-Rich IOS
and Open APIs
NETWORK
APPLICATION
LAYER
NETWORK
CONTROL
LAYER
NETWORK
ELEMENT
LAYER
21. C97-729241-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
NETWORK
APPLICATION
LAYER
NETWORK
CONTROL
LAYER
NETWORK
ELEMENT
LAYER
Cisco
ISE
Cisco
Prime
Cloud
Services
Security
Services
Mobility
Services
Applicatio
n
Services
Application Policy Infrastructure Controller (APIC) Enterprise Module
Discovery Topology …. QoS Location
Device API – OnePK, OpenFlow, CLI
Cisco Network Operating Systems (Enterprise, Data Center, Service Provider)
ASIC
DATA PLANE
SOFTWARE
DATA PLANE
22. Cisco Confidential 22© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Manual Configuration Automation
Box-Centric Network-Centric
Provision in Months Hours
Closed Systems Open and Programmable
Network Data Business Intelligence
New Installations Existing + New Installations
23. Cisco Confidential 23© 2013-2014 Cisco and/or its affiliates. All rights reserved.
• Rapid Innovation
• Simplified Operations
• Programmatic Networks
Control and Data Plane
resides within Physical
Device
In the SDN paradigm, not
all processing happens
inside the same device
Software defined networking (SDN) is an
approach to building computer networks that
separates and abstracts elements of these
systems – (per Wikipedia definition)
24. C97-729241-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Mobile Devices
• Device choice
• Simplified provisioning
• Unified access
• Contextual policy enforcement
• Mobile Device Management
(MDM)
Mobile Workspaces
• Complete B2E Mobility
• Native, HTML5, hybrid, virtual
• Mobile Collaboration
• Multi-level security
• Mobile App/Data Management
(MAM/MIM)
Mobile Everything
• IT Automation / Workspace
Service Orchestration
• Mobility everywhere - B2C, IoT,
M2M
• Consumption Models: On
premise, cloud, hybrid
• Seamless roaming – public,
private networks
• Location and SDN-enabled apps
Cisco Enterprise Network – ONE Architecture
Collaboration
Security
Cloud
Data Center
Enterprise MobilityBYOD Mobile Workspace
IoT/IoE