как корпоративные ИТ ИТ отделов к BYOD — ИТ · для работы, — это персональные устройства сотрудников.
Корпоративные сети через 5 лет: что нас ждет?
-
Upload
cisco-russia -
Category
Technology
-
view
323 -
download
2
Transcript of Корпоративные сети через 5 лет: что нас ждет?
Ian Bull Enterprise Network Group. EMEAR
May 2014
Next Generation IT Enterprise Networks Forum – Moscow June 14
Andrey Kharitonov Business Development. Russia CIS
Cisco Confidential 2 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Predicting the future is not easy
“ Prediction is very difficult, especially about the future.” Niels Bohr, Nobel Laureate
“ Everything that can be invented has been invented” - Commissioner, U.S. Patent Office, 1899
“ This 'telephone'... is inherently of no value to us.” Western Union memo, 1886
“ We always overestimate the change that will occur in the next two years and underestimate the change that will occur in the next ten” Bill Gates
“ The best way to predict the future is to create it.” Peter Drucker
Cisco Confidential 3 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
What are the Enterprise
Megatrends
MOBILITY
BYOD
M2M
CLOUD
SaaS | DC / V
IMMERSIVE
COLLABORATION
Pervasive Video
COST CONTROL, TCO, Operational Efficiency
IT EFFECTIVENESS, Service, Simplicity and Network Management
SECURITY, Accelerating Cyber-Threats
$
Cisco Confidential 4 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco VNI Report
2Cisco Visual Networking Index 2014 Pew Data Research, Dec 2013, 3Mary Meeker Data, Dec 2013
Device Explosion Network Traffic Patterns IT Transitions
Tablets shipped within Europe
90 million
per person
3 Devices
By 2015, Smartphones
+ Tablets exceed PC
by... 2x
Mobile data to grow x26
• BYOD, Mobility, Cloud
• Visibility
• Simplicity
• New LoB IT Needs
• Smarter Business Processes Lower TCO
/ month
Avg. mobile user to generate about
1GB Comparing with 63MB today
Over
70% will be video
Internet of Things/Everything.
M2M connectivity
Traffic forecast by 2018
Cisco Confidential 5 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
The network is more critical to delivering applications than a year ago
Policy for employee device access**
The network is not ready for BYOD*
The network is not ready for cloud *2013 Cisco Global IT Impact
Survey,
**2013 Cisco IBSG Horizons Study
Optimal Application
Experience
New Connected
Experiences
Managed Cloud
Services
BYOD and
Mobility
IT Simplicity and
Programmability
?
Cisco Confidential 6 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Opportunity or Challenge?
HR: Enable new mobile work styles and BYOD trends to retain the best workforce and achieve more productivity
CMO: Provide improved customer experiences to build satisfaction and loyalty
CIO: Build an enterprise –wide mobility strategy that addresses new business to employee and business to consumer opportunities
CISO: Secure the delivery of mobile apps, data and communications to users on multiple employee-owned and corporate-issued devices
VP Apps: Develop new apps and mobilize existing apps for employee, partner and customer mobile devices. Anytime, anywhere.
End-user Computing: I need to deliver apps, data, communications to all employee and corporate owned devices with limited budget and resources
Network: I need to connect more devices anywhere without increasing cost, complexity or security threats
Infrastructure: I need to host, manage and deliver rapid growth in mobile apps and data. Support high demand for bandwidth at any time
LOB: Opportunity to build new revenue streams to be more competitive and gain wallet share
Challenge
Opportunity
Business
Leaders
IT
Executives
IT
Management
Cisco Confidential 7 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
2000
Mobile Devices were
a privilege…
2010
Everyone had at least
one Mobile Device…
3 or more Mobile Devices
are commonplace…
+ Connecting M2M
2016 +
Compiled from multiple sources: Gartner, ABI, IDC, VNI
Cisco Confidential 8 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
802.11ac interference detection and mitigation
PREDICTABLITY
Beamforming for 802.11a/g/n/ac
UNMATCHED SCALE
Optimized for high speed scheduling and packet
processing
n
n
AP
ac
ac
n
ac
CLEAN AIR CLIENTLINK TURBO BOOST
BATTERY SAVINGS
INTELLIGENT ROAMING
RELIABILITY
Unstick clients as they roam between AP’s or to cellular
Reduce co-channel interference channels in dense AP installations
OPTIMIZED ROAMING
RF NOISE SUPPRESION
Cisco Confidential 9 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
10Base-T
1990 1995
100Base-T
2000 2005 2010
802.11
802.11g
802.11n
1000Base-T
2015
802.11ac
Ad
op
tio
n
• >50% of enterprise traffic will originate on Wi-Fi by 2018 (Cisco VNI)
• 50% of all new Wi-Fi devices in 2014 will be 802.11ac capable (ABI Research)
• Wave 1 802.11ac has 5+ years of affectivity for Smartphones and Tablets
• Wave 1 802.11ac improves battery efficiency by 2X for Smartphones, Tablets, and Laptops
Compiled from multiple sources: Gartner, ABI, IDC, VNI
Cisco Confidential 10 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Corporate Applications
only on the network
Corporate and Personal
Applications started to
share the network
Corporate Applications are
competing with Personal
Applications for the network
2000
2010
2016 +
Compiled from multiple sources: Gartner, ABI, IDC, VNI
Cisco Confidential 11 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
HTTP HTTP
HTTP
Application Visibility and Control
Discover: 1000+ applications categorized
to simplify management
Performance Collection: Enhanced
application performance reports, url hit counts,
top applications …
Control: Apply QoS, Acceleration and Path
Control according to company performance
expectations
Natively Integrated into Cisco Portfolio
Simple to Enable
Cisco Confidential 12 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
2000
Mobile Devices were
a privilege…
2010
Everyone had at least
one Mobile Device…
3 or more Mobile Devices
are commonplace…
+ Connecting M2M
2016 +
Compiled from multiple sources: Gartner, ABI, IDC, VNI
Cisco Confidential 13 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Onboard Users based on where they are in the
network
Tailor notifications based on where a
User is in the network
TAILORED MESSAGING
TARGETED ONBOARDING
“Turn-by-turn” directions to any location within a
venue
INDOOR DIRECTIONS
Analyze aggregate locations, URLs, and
demographics
“Big Data” Analytics
Connect with other systems, such as
registration, property management, product databases, or location-
based services
SYSTEM INTEGRATION
Cisco Confidential 14 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Maps
Employee Productivity
• Find open rooms
• Find people
• Find resources
• Reserve Rooms
• Locate People/Rooms
• Find buildings
Cisco Maps Improve Employee Productivity through location enabled apps
Next Generation IT Core Network Strategy
Cisco Confidential 16 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Simple
Secure
Reduced
TCO
Connecting People
Connecting Clouds
Connecting Things
The Intelligent Platform for a Connected World
Cisco Confidential 17 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
One Policy Identity Services Engine
World-class unified policy definition
and enforcement across wired,
wireless and VPN
One Management Cisco Prime
Single solution for comprehensive
lifecycle management and user,
network and application visibility
One Network Unified Access / IWAN
Catalyst
Integrated Industry-leading networking
and mobility capabilities for a single
network infrastructure
Simple
Secure
Reduced
TCO
Making IT More Responsive to the Business
Less Time on IT Operations, More Time on IT Business Innovation
Cisco Confidential 18 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Our Product Strategy… Provide an OPEN architecture to allow for flexibility and choice
Building the Best The Best Being
Better Together
Cisco Confidential 19 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Strategy for SDN
Many Purpose-Built Architectures
SWITCHING, ROUTING, WIRELESS
Unique Services
Purpose-Built ASICs
IOS Variants
Custom HW
Unique Services
Purpose-Built ASICs
IOS Variants
Custom HW
Unique Services
Purpose-Built ASICs
IOS Variants
Custom HW
Unique Services
Purpose-Built ASICs
IOS Variants
Custom HW
Unique Services
Purpose-Built ASICs
IOS Variants
Custom HW
Unique Services
Purpose-Built ASICs
IOS Variants
Custom HW
Unique Services
Purpose-Built ASICs
IOS Variants
Custom HW
Multiple Products on Common Architecture
SIMPLE, SECURE, REDUCED TCO
UADP and USCP ASIC
Standard Platforms
Common Services
IOS-XE
Cisco ONE Architecture
AGILE SOFTWARE MODEL
Software-Defined Services
Management and Policy
Standard Platforms
UADP and USCP ASIC
IOS-XE
Cisco ONE
Yesterday Today Tomorrow
Cisco Confidential 20 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Network-Aware Applications
Developed by Cisco, Third Parties or Customers Using Network APIs
Network Abstraction Layer
Provisions Network Services Consistently Across All Network Devices
Richest Set of Devices, ASICs & Software
Across Wired and Wireless Networks, with Service-Rich IOS
and Open APIs
NETWORK
APPLICATION
LAYER
NETWORK
CONTROL
LAYER
NETWORK
ELEMENT
LAYER
C97-729241-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
NETWORK
APPLICATION
LAYER
NETWORK
CONTROL
LAYER
NETWORK
ELEMENT
LAYER
Cisco
ISE
Cisco
Prime
Cloud
Services
Security
Services
Mobility
Services
Application
Services
Application Policy Infrastructure Controller (APIC) Enterprise Module
Discovery Topology …. QoS Location
Device API – OnePK, OpenFlow, CLI
Cisco Network Operating Systems (Enterprise, Data Center, Service Provider)
ASIC DATA PLANE
SOFTWARE DATA PLANE
Cisco Confidential 22 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Manual Configuration Automation
Box-Centric Network-Centric
Provision in Months Hours
Closed Systems Open and Programmable
Network Data Business Intelligence
New Installations Existing + New Installations
Cisco Confidential 23 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
• Rapid Innovation
• Simplified Operations
• Programmatic Networks
Control and Data Plane
resides within Physical
Device
In the SDN paradigm, not
all processing happens
inside the same device
Software defined networking (SDN) is an
approach to building computer networks that
separates and abstracts elements of these
systems – (per Wikipedia definition)
C97-729241-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Mobile Devices
• Device choice
• Simplified provisioning
• Unified access
• Contextual policy enforcement
• Mobile Device Management (MDM)
Mobile Workspaces
• Complete B2E Mobility
• Native, HTML5, hybrid, virtual
• Mobile Collaboration
• Multi-level security
• Mobile App/Data Management (MAM/MIM)
Mobile Everything
• IT Automation / Workspace Service Orchestration
• Mobility everywhere - B2C, IoT, M2M
• Consumption Models: On premise, cloud, hybrid
• Seamless roaming – public, private networks
• Location and SDN-enabled apps
Cisco Enterprise Network – ONE Architecture
Collaboration
Security
Cloud
Data Center
Enterprise Mobility BYOD Mobile Workspace
IoT/IoE
Thank You Enjoy the rest of the day!