Little Book of Borderless Networks

17
1 Little Book of Borderless Networks

description

Borderless networks; a new paradigm in networking

Transcript of Little Book of Borderless Networks

  • 1

    Little Book of Borderless Networks

  • 32

    Contents

    Introduction 3

    Industry Trends 4

    Industry Trend 1: The consumerisation of 5 mobile devices

    Industry Trend 2: Work anywhere 6

    Industry Trend 3: Cloud and virtualisation 7

    Industry Trend 4: Pervasive video 8

    Industry Trend 5: Environmental conscience 9

    Whats the Difference Between a Network 10-11 and a Borderless Network?

    Technologies behind a Cisco Borderless Network 13

    Secure-X 14

    Medianet 15

    EnergyWise 18

    Application Velocity 19

    Mobility with CleanAir 21

    In Summary 26

    Making the transition to borderless networking 27

    For more information 27

    Glossary of Terms 28 -29

    Contributors 30

    The Little Book of Borderless Networks outlines the industry trends that have led to the need for new network capabilities, explains what a Borderless Network is and describes the functionality in a Borderless Network and the benefits it brings.

    Cisco has been the leading provider and innovator of networking technologies for over 25 years, supplying fast, robust and reliable networks to customers worldwide. Just as current industry trends are increasing the business relevance of the network, so too are they placing new demands on it. So much so, that traditional networks are no longer sufficient to meet the needs of businesses as they adapt to these trends. In response, Cisco has innovated its technology further to provide not just a network, but a borderless network.

    SecureX, Medianet, EnergyWise, AnyConnect, CleanAir and Clientlink are the Borderless Network innovations that enable new methods of connecting, working and collaborating. This book offers brief explanations of their features and benefits.

    A short glossary is also provided. The intention is to give a simple overview of the key facts in an easy to read and keep format. We hope you find it useful.

    Introduction

    2

    Thank you for taking the time to read this document and for your interest in Ciscos Borderless Networks.

    Sarah EcclestonHead of Borderless NetworksCisco UK&I

  • 54

    Industry Trends

    4

    Industry Trend 1: The consumerisation of mobile devices

    Rather than being supplied by the IT department, the majority of these devices will be purchased and used by the consumer. And this trend continues to gather pace. When the iPhone was launched in 2007 it took four years to sell 100 million. In 2011, over one million iPhone 4S were pre-ordered in a single day. Android devices, such as the Motorola Xoom and the Blackberry Playbook, are also becoming more prevalent. Indeed, it was reported that over 100 types of mobile smart device were launched at CES 2011 in Las Vegas. Instead of trying to stop personal devices from being used in the workplace, many organisations have recognised the need to adopt and enable them. Indeed, 80% of the Fortune 100 companies have either deployed or have trialled the Apple iPad.

    The days when all employees had the same model of laptop or PC, and worked only from that corporate device, are over. It is estimated that by 2015 the average number of devices per person will be seven, and that there will be 924 million smartphones and 120 million tablets globally.

  • 76

    That means providing context-aware security security methods that understand who the user is, their role in the organisation, their location and their device, and so can apply security policy accordingly.

    Effective policy management for BYOD using Context-Aware Security

    Traditional networks and security paradigms do not offer this. But through technologies such as TrustSec and AnyConnect, a Cisco Borderless Network does.

    Industry Trend 3: Cloud and virtualisation

    The ability to offer employees constant access to tools and information, regardless of location, becomes easier and less expensive within a Cloud environment. Previously employees may only have been allowed to access data while in an office where the data centre was physically located. However, this arrangement makes no sense when applications are located remotely in a cloud, often hosted and managed by a SaaS provider.

    With cloud, the opportunity to move away from people storing data and applications locally on desktops Gartner advises that 56% of clients are reviewing VDI as one example can offer organisations a sense of increased physical security.

    As organisations adopt Bring Your Own Device (BYOD) policies for their workforce, the challenge is to provide a network that can support and enable the connectivity, security and productivity of this vast range and quantity of mobile devices.

    Traditional networks cannot offer this. But a Cisco Borderless Network can.

    Industry Trend 2: Work anywhere

    So, as employees increasingly work from customer sites, partner sites, home and even coffee shops, the network needs to make sure they remain connected, securely and with consistent application performance. And when they do, they should be just as productive and receive the same or, preferably, even better experience than if they had connected as a consumer.

    Imagine if every time you moved from one location to another from the office to home, or from home to Starbucks for example you had to re-authenticate yourself on your wireless device before you were allowed to make a phone call. This is exactly what laptop users have been doing for years. Each time they moved location, they had to re-establish VPN connectivity before gaining access to corporate applications and data.

    For an increasingly mobile workforce supplied with wireless and 3G devices, this restrictive and time-consuming practice will not be acceptable.

    Work is not a place.... its an activity.

    The culture shift to working anywhere, from any device, has created the need to sustain constant, secure connectivity to corporate data.

    To retain an equivalent sense of IT security, the network becomes even more critical in ensuring secure access. One element of Ciscos Borderless Network, SecureX provides this.

  • 98

    Also, when tools and information are moved to a cloud environment enabling employees to connect from any device, anywhere it is essential that the performance of those applications, and therefore the productivity of end users, is maintained.

    Application Velocity, a feature of a Cisco Borderless Network, enables this.

    Finally, there will always be situations where, rather than centralising or outsourcing to third parties, it makes more sense for organisations to carry on hosting applications locally on-site. For example, File and Print services or Microsoft applications used by employees at branch offices.

    The ISR G2 Branch Router a primary element of the Borderless Network ensures organisations dont miss out on potential cost savings from the consolidation and virtualisation of these remaining applications. Incorporating a virtual blade server (known as UCS Express), the ISR G2 features a Services-Ready Engine (SRE) and uses much of the same intelligence as Ciscos UCS server.

    No other router in the market can do this.

    Industry Trend 4: Pervasive video

    Traditional network technologies such as QoS and MPLS have for many years provided prioritisation of video over voice and data traffic. But when as much as 90% of the traffic is video, these traffic management techniques become ineffective. Whats needed now is a network that recognises not all video is treated equal.

    For example, the CEO of company X wants to deliver a VoD to all employees giving an urgent company update. That would be video traffic, created by an employee, on a corporate network. At the same time, a company employee wants to watch a baseball game on YouTube also video traffic, created by an employee on a corporate network.

    Both video streams will be competing for bandwidth and network resources.

    The solution is a network that can prioritise specific video content over other video content, dependant on user, device or content.

    A Cisco Borderless Network is the only network that can do this, using Medianet (for fixed networks) and VideoStream (for wireless networks). Read more about how these solutions ensure the network can easily and cost-effectively meet the demands of pervasive video later in the book.

    Cisco VideoStream recognises and prioritises video traffic, optimising quality of experience for end users

    Industry Trend 5: Environmental conscience

    Companies are keen to demonstrate Corporate Social Responsibility through sustainability initiatives and greener work practices. Any cost benefits that can also be realised through energy savings are increasingly attractive. These factors led Cisco to transform the network into a platform for innovating energy management.

    A key component of the Borderless Network, EnergyWise measures, reports and reduces energy consumption across the entire IT estate. It does this, for example, by enabling PCs and PoE devices, such as IP handsets and IP cameras, to be automatically powered-down when not in use, thereby providing significant reduction in costs and carbon footprint.

    By 2014, Gartner estimates that 90% of the worlds internet traffic will be video.

  • 1110

    Whats the difference between a Network and a Borderless network?

    Cisco networks have always been, and continue to be, fast, robust and reliable connectivity platforms. But as a result of the trends outlined earlier, organisations today need more from their LAN and WAN than just speed and reliability. It was for this reason that Cisco invested and innovated a Borderless Network that gives the same speed and reliability our customers are accustomed to, but which also allows the connection of any device, anywhere, just as securely and with the same performance.

    Traditional networks are usually based on a standard corporate device, often a fixed device, in a fixed work environment where employees and applications can be secured using simple firewall technology.

    The demands on a traditional network: fast, reliable connectivity

    In contrast, a borderless network:

    Allows a mobile workforce to remain securely connected and productive as they move and change location, through the provision of a business-critical wireless network with CleanAir and Clientlink, and the use of technologies such as AnyConnect and ISE

    Creates a fast, safe cloud environment through WAN connections secured with Cisco SecureX and optimised with Cisco Application Velocity

    Supports greater choice of end user device type, including iPad and CIUS, along with context-aware security enabled by Cisco SecureX and Identity Services Engine (ISE)

    Provides the ability to rapidly configure video endpoints and prioritise video content according to policy, in turn improving scalability and enhancing quality of experience for end users, through the use of Medianet

    Whats the Difference Between a Network and a Borderless Network?

    10

  • 1312

    Todays demands on a borderless network: one that enables BYOD, cloud and video in a secure and productive manner

    The following sections describe each borderless network technology, explaining in more detail how this functionality is provided.

    The Anywhere Workspace

    Technologies behind a Cisco Borderless Network

    13

  • 14 15

    Secure-X: What is it and why is it so important?

    What is it?The Cisco SecureX Architecture is a context-aware, network-centric approach that enables:

    Greater alignment of security policies with business needs

    Integrated global intelligence

    Simplified security delivery

    Consistent security enforcement throughout theorganisation

    Why is it important?Consider an employee who has a laptop supplied by IT plus his or her own tablet, which is allowed by IT to connect to the corporate network.

    In the office, they connect their laptop to the network over a fixed cable. The Cisco Secure-X architecture identifies them (and any associated group membership, such as job role)on a corporate laptop, at a corporate location, on a wired connection. An appropriate access policy is applied to this user. The network and security devices, such as firewalls, make access and policy enforcement decisions based not just on IP address, but also on context: information such as device-type, location, applications the user is accessing, time of day and so forth.

    Within a virtualised data centre, this policy information can also follow the user by taking advantage of Cisco solutions like the Nexus 1000v, VSG, and the upcoming vASA. This means that even if the virtual server upon which the data located is moved to another server or even another data centre, the security policy and policy enforcement will move with it.

    Later on, the employee leaves the office and goes to a coffee shop to meet a customer. Using the wireless network, they can continue working by using the VPN client loaded on their tablet. Having already identified the context of the user, Cisco Secure-X might continue to allow access to the corporate network, but because the users status has changed (no longer on a corporate laptop or connected via secure corporate wireless) could block requests to access certain secure servers or applications. This policy will follow the user through the network and might allow access to email for example, but not stop them accessing the data that their companys policy deems restricted.

    Medianet: What is it and why is it so important?

    What is it?Like many other elements of Cisco Borderless Networks, Medianet is not a product. Instead, it is functionality which is embedded into the fabric of Cisco routers and switches. Medianet provides a suite of tools designed to help automatically deploy, manage and troubleshoot video deployments. It includes:

    Smart screens and cameras communicating with thenetwork

    A suite of tools to check network readiness

    Protection of the network against problems and alertingITwhen they happen

    Enablement of the network to differentiate different videostreams

    Why is it important?Video is dramatically changing the way we work. From hospitals sharing consultants, to academic experts linking up across the globe, video enables more flexible working and greater levels of collaboration than ever before. By 2014, 90% of the worlds Internet traffic will be video.

    The result is automated security enforcement, from the endpoint to the cloud that is seamless to the end user and more efficient for the IT department.

    With video already being a business critical application, it becomes increasingly challenging to not only ensure a low-latency and lossless network, but also to differentiate between different kinds of video.

    14

  • 1716

    Medianet responds to these challenges in a number of ways:

    Automatic configurationVideo endpoints, such as IP CCTV cameras, often need to be moved from time to time. The problem is that when the device is moved, features such as location information, QoS and VLAN mappings dont follow. As a result, the installation process becomes complicated and labour intensive, with IT needing to correlate the cameras with the correct locations and network settings.

    Automatic configuration example with an IP CCTV Camera

    With a Cisco Borderless Network, the network tells the camera where it has been installed and automatically configures it, saving significant time and effort.

    Network readinessVideo is very sensitive to poor network conditions. One packet drop in 10,000 can render video unwatchable. By using IP SLA Video Operation, Cisco routers and switches can simulate real-time video traffic. Performance Monitor can then check for latency, loss and jitter which are critical in video delivery.

    Using IPSLA VO and Performance Monitor to carry out network readiness assessments

    Video protectionOnce the video is deployed on a stable network, Performance Monitor can be used to constantly monitor its status. Mediatrace checks end-to-end if QoS is working and proactively warns of problems to ensure the optimal video delivery and best possible end user experience.

    Performance Monitor and Mediatrace detect and mitigate problems

    Differentiating videoForecasts suggest there will be 400% more video on the internet in the next two years, but not all of it will be of equal value. Medianet enables the network to capture the kind of video being transmitted, distinguishing, for example, between TelePresence traffic and an executive videoconference.

    Reserving video using the Media Services Interface

    Using this intelligence, video admission control can then be tuned to allow only desirable video across the WAN, or to prioritise business-critical video, thus improving the users overall experience. This works by having end-to-end visibility of video traffic, something usually not possible due to various encryption techniques that are deployed.

    1. Camera is plugged in

    2. Switch detects camera,lets it know where it is and gives it the right QoS and VLAN settings

    3. Camera uses the information from the switch to notify theIP CCTV server of its location

    1. IPSLA VO allows routers and switches to simulate video traffic

    2. Performance Monitor can determine where the problems are, if any, and allow IT to isolate and fix them

    3. Readiness assessments can be performed without any specialist equipment, or even any video devices

    1. Video may often traverse multiple paths

    2. Performance monitor can alert when there are problems, such as loss or latency

    3. IT are then alerted and can fix it and the network can failover to the backup path

    1. Using the Media Services Interface (MSI), video is able to reserve a guaranteed path through the network

    2. Resource Reservation will work on any network and guarantee important video is delivered, even if encrypted

  • 1918

    For those organisations that dont presently have such a system, Cisco has partnered with SolarWinds (Orion module) and IBM (Tivoli). EnergyWise can also be managed using Cisco Prime LMS.

    Beyond ITIT typically accounts for around 30-40% of overall energy usage within an organisation. The majority is typically used for heating, lighting and ventilation. By partnering with organisations such as Johnson Controls, Honeywell, Schneider and APC, Cisco has the broadest ecosystem and can therefore enable monitoring and control of those elements as well.

    CompetitionRather than address individual devices and their power consumption, EnergyWise takes a more holistic architectural approach. It can be used to control not only individual phones or switch ports, but also to look at overall energy patterns. The advantage of this approach far exceeds savings of milliwatts from individual devices.

    Application Velocity: What is it and why is it so important?

    What is it?Application Velocity puts application-level intelligence in the fabric of the network, allowing key business applications to perform better and have higher availability over a Cisco Borderless Network. It works by:

    Optimising applications for the WAN to provide a better user experience

    Understanding applications on the network and providing the best network path

    Partnering with key application providers on joint initiatives for easy deployment

    Integrating useful features on Cisco routers and switches for new applications

    Why is it important?With services increasingly moving to the cloud, the network becomes an increasingly important component of application performance. Remote desktop applications such as Citrix, require unique network characteristics for which traditional routed environments were never designed.

    EnergyWise: What is it and why is it so important?

    What is it?EnergyWise helps organisations to take control of their energy expenditure. It works in three key stages:

    Monitoring: Because the network is the one ubiquitous element which connects to everything, from PCs and printers, through to smart building management systems, Cisco EnergyWise allows a business to quickly understand their current energy footprint

    Policy: Once a baseline is established, policies can then be written and enforced. For example, if an employee is not using a PC, EnergyWise can automatically put that PC into a lower power mode and also have the intelligence to turn off that same users phone

    Reporting: Saving energy is only part of the story, EnergyWise captures data and provides the ability to report it back to the business in a meaningful way

    Why is it important?Energy management and sustainability has been a top agenda for successive governments over the past ten years. With a combination of regulation, public concern and the opportunity to differentiate, most businesses are now working to lower, or eradicate entirely, their carbon footprint.

    Energy Management with EnergyWise

    Integration on the desktopMany organisations already have some kind of energy management system in place for their desktop computers. Examples include 1E Nightwatchman, Verdiem Surveyor and JouleX Energy Manager. Cisco has partnered with each of these market leaders to integrate the EnergyWise API with their platforms. In short, a Cisco Borderless Network can be integrated with most reporting solutions.

    1. Energywise uses the network to measure PC and network device (IP phones, wireless devices, etc) power consumption

    2. Energywise integrateswith building management systems for heating, lighting, air conditioning

    3. Policies based on time of day or usage may be implemented to maximise savings

  • 2120

    Oracle and others, to optimise the performance of the Cisco Borderless Network.

    Integrating useful featuresA Cisco network not only includes industry-leading performance, but innovations, such as Universal Power over Ethernet (UPoE). This allows a single switch port to power a thin client device, including its dual monitors.

    Campus high-availability features and designs, such as StackPower (the ability to redundantly share power between 3750X switches), Virtual Switching System (a redundancy method for 4500 and 6500 series switches) and StackWise+ (a redundancy method for 3750 switches) ensures that applications are always available within the campus.

    Mobility with CleanAir: What is it and why is it so important?

    What is it?Previous networks provided connectivity to fixed or wired devices as a priority and wireless connectivity was considered an additional convenience rather than a business critical service. If the wireless network was suffering from poor performance, the user had the option of connecting the laptop via an Ethernet cable. With the proliferation of mobile devices, Ethernet ports are not present, so wired LAN connectivity on such devices is not an option. So the corporate wireless network must now be of business-critical standard to enable productivity on such devices.

    CleanAir and ClientLink are two features of the Cisco wireless networking portfolio, which is specifically designed to improve wireless performance.

    CleanAir provides visibility of all wireless devices and non-Wi-Fi interferers (such as microwave ovens and wireless video cameras). CleanAir can then identify devices and sources of interference and mitigate these risks before they can impact wireless performance.

    Clientlink provides a more reliable means of wireless communication by establishing a directed communication with the wireless device and access point (AP). Most 802.11n solutions offer improvements in the uplink communication from client to access point. Cisco ClientLink is unique in that it offers uplink improvements as well as downlink communication, from access point to client. This is significant

    Optimising applications for the WANWhen servers move from the branches to headquarters (or Cloud) applications need to traverse the WAN. Unfortunately, unlike a LAN environment, these applications are likely to encounter high latency, packet loss and congestion. All of these factors reduce application performance andproductivity.

    Application Velocity and WAAS: Optimising the delivery of applications across the WAN

    Cisco WAAS can optimise traffic across the network, using smart algorithms for compression, redundancy elimination and even optimisation of the application protocols for efficient transport. There are two modes of deploying WAAS in branches - either WAAS Express which is integrated into the ISR G2 routing platforms, or using a full WAAS deployment, which can be a physical box, or an ISR G2 module.

    Understanding applicationsTraditional networks route traffic based on bandwidth using a metric called the link cost. Rather than considering unique application requirements, this decision is usually based on available bandwidth and is set by network engineers.

    However, this is not always optimal. For example, a branch office with a 1Mbit/s and a 10Mbit/s link will always use the latter. It does not take in to account latency or loss, which for some applications is more important than bandwidth. Hence, should the fastest link have high latency, the users will have a poor experience.

    Cisco performance routing is able to select the best path on a per-application basis, ensuring remote desktop and other latency sensitive traffic takes the best link, rather than the lowest cost one. This feature can work with or without WAAS.

    Partnering with application providersAs a part of Application Velocity, Cisco has teamed up with a number of application providers, including Citrix, SAP,

    1. Applications sometimes need low latency,not high speed

    2. Application velocity compresses and optimises applications using WAAS and sends them over the most appropriate link (low latency or high speed)

    3. Applications perform better over a Cisco network, enabling successful branch consolidation

  • 2322

    because the majority of daily communication on the WLAN such as web browsing, email, and file downloads occur in the downlink direction. Improving the downlink throughput of the slowest clients improves the experience not only for the clients, but also for all other clients on the network.

    Why is it important?

    Along with wireless APs, such as the recently released 3600, which provides wireless connectivity that is 30% faster than previously experienced, these technologies allow the deployment of a business critical wireless network for business productivity on devices where fixed access is notan option.

    Bring Your Own Device (BYOD)The distinction between a device used exclusively for work and a device used exclusively for personal use has become blurred. This trend is known as Bring Your Own Device (BYOD). Additionally some organisations are shifting away from providing employees with a standard imaged computing device to an environment where the employee owns and controls the computing device that is used for work.

    Personal devices are extensions of the users personality each containing a personal choice of applications. Hence the challenge for IT organisations is to provide the end user with the freedom to use any device while enforcing stringent security policies to protect corporate intellectual property when the user device joins the secure campus network, increasingly over Wi-Fi.

    Cisco ISE: Solving the BYOD explosion

    The wireless network should be treated as another access method, adhering to the same principles as a wired network. Practically, this means understanding the criticality of the wireless network, what it will be used for and the level of access control required. A unified network incorporating the Cisco Identity Services Engine allows context aware security policies to be extended uniformly across the entire network wired, wireless and VPN.

    Improving IT management

    It does this by delivering converged user, access and identity management, with complete visibility into endpoint connectivity - regardless of device, network or location.

    Cisco Prime Network Control System: Unifying wired and wireless network management

    NCS speeds up troubleshooting for the most reported customer pain point network problems related to client devices. It also provides monitoring of endpoint security policy, through integration with the Identity Services Engine (ISE). In turn, this delivers visibility into compliance based on real-time contextual information from the network, users and devices across the entire wired and wireless access network.

    Self-healing wireless networks In addition to providing an appropriate security policy, it is also imperative to provide a consistent access experience. The first enterprise Wi-Fi networks were an

    Historically, network management has been siloed between wired and wireless. A unified network incorporating the Network Control System (NCS) provides a more efficient IT operational model.

    The result is a more reliable roaming experience and increased capacity of the network.

  • 2524

    added convenience used for web surfing in reception or conference rooms. For these applications, a best-effort level of performance was acceptable.

    Now Wi-Fi has matured to the point that it is being deployed for many mission-critical applications which are being accessed increasingly from a plethora of devices, such as tablets and smart phones. Hospitals use Wi-Fi for mobile access to patient files and to remotely monitor secondary bedside systems. In retail and manufacturing, Wi-Fi is used for logistics and business transactions. Increasingly, Wi-Fi is being used for voice and video, which is sensitive to the impact of interference.

    For example, in a hospital, where Wi-Fi has become mission-critical, if a microwave oven is turned on, it will disrupt communication in that particular area for all other Wi-Fi devices and users on that same channel. These users could be consultants using their tablet device to view patient records, doctors using their Wi-Fi phones to communicate with nurses, or even patients wearing Wi-Fi remote monitoring devices. The CleanAir system will detect the interference, identify the source, locate it on a map and take action to mitigate the impact of this interference. This action could involve changing channels within 30 seconds to avoid.

    Cisco CleanAir: Real-time monitoring and proactive management for wireless networks

    Better visibility into interference sourcesThe system also remembers intermittent interference from persistent sources such as microwave ovens or wireless video cameras. Through tight integration, the CleanAir system identifies the channels where these devices operate and optimises the coverage in those areas to minimise future disruption.

    While external or standalone spectrum analysis tools have existed for some time, Cisco has taken the bold step of integrating this capability directly into the Cisco 3500 Series Access Point. Cisco CleanAir is a revolutionary technology and industry first that provides access to a rich spectrum of information that is automatically gathered on interference sources.

    Context Aware Location ServicesKnowing the location of resources and users as they access the wireless network is becoming increasingly important. Being able to track the physical location of Wi-Fi devices facilitates a variety of innovative applications, including real-time asset tracking, location-based security, business policy enforcement and improved network management.

    Voice over Wireless LAN By integrating voice, data and wireless networks, organisations can extend the capability of the existing premises-based telephony system to add support for wireless telephony. This enables staff to communicate with each other at any time, in any place. A Unified Wireless Network keeps everyone connected, promotes collaboration and improves productivity.

    Guest Access SolutionsTheres a growing need to provide guest access for customers, vendors, partners and visitors. Guest networking is the ability of the network to assign special access rights based on the profile of each user. The system can customise the privileges granted based on the persons role. As an example, a consultant could be granted more network privileges than a supplier.

    A Unified Wireless Network is an excellent platform for providing guest services, given the ubiquity of wireless-enabled laptops, tablets and smart phones. Moreover, it improves the quality of guest services by allowing the guest to maintain a single profile across all network types.

    Wi-Fi networks are expected to run with very high reliability. Its no longer acceptable for Wi-Fi networks to have unexpected downtime due to interference.This is where Cisco CleanAir technology comes in.

  • 2726

    Making the transition to borderless networking

    For customers currently facing some or all of the challenges described in this book whether that is the need to deploy business videos, the requirement to support BYOD or the desire to move to a cloud environment Cisco recommends a Transformative Networking assessment

    This consultative assessment provides an architectural roadmap defining the technology required to meet the clients specific business needs.

    Energy assessments, video-readiness assessments and TrustSec security assessments are also available through qualified Cisco Partners.

    For more information

    Cisco Borderless Networks: www.cisco.com/go/borderless

    London 2012 and the most advanced network infrastructure in Olympic history: www.cisco.com/assets/partners/london2012/Cisco_London2012_BorderlessNetworks_FINAL.pdf

    www.ciscolondon2012.co.uk

    In SummaryNew capabilities developed in Ciscos networking technology are enabling a culture shift in how people work, live, play and learn in an increasingly digital, mobile and online world.

    Clearly, a network built from multiple vendors and without Cisco Borderless Network functionality, may provide connectivity, but it wont enable the features of a borderless network which todays businesses demand:

    Only a Cisco Borderless Network can:

    Enable true mobility

    Offer prioritised and easily managed video content

    Ensure a safe and protected Cloud environment

    Secure connectivity of an increasingly mobile workforce, connected via a multitude of smart devices, from an almost infinite number of locations.

  • 2928

    Glossary of TermsTERM ACRONYM DEFINITION

    Application Programming Interface

    APISource code that is used as an interface by software components to communicate with each other

    Bring Your Own Device policy

    BYOD

    A set of rules governing a corporate IT departments level of support for employee-owned PCs, smartphones and tablets

    Closed-Circuit Television

    CCTVThe use of video cameras to transmit a signal to a specific place, or set of monitors

    Intrusion Prevention System

    IPSSensors that identify, classify and stop malicious activity on the network

    IP SLA IP SLA

    A feature embedded in Cisco Internetwork Operating System (IOS) software that actively monitors network performance and assists with troubleshooting, readiness assessment and health monitoring

    Local Area Network LANComputer network covering a small local area, such as a home or office

    LAN Management Solution

    LMSA suite of applications for monitoring and administering Cisco networks

    Multiprotocol Label Switching

    MPLS

    IP technology that integrates Layer 2 and Layer 3 information in order to simplify and improve IP-packet exchange

    Power over Ethernet PoE

    Enables power to be transmitted to Ethernet-connected equipment, such as IP phones, wireless access points and CCTV cameras

    Quality of Service QoSNetwork optimising technologies for prioritising traffic and allocating resources

    Software as a Service SaaSOn demand software hosted by a service provider and offered to users via the Cloud/Internet

    Services-Ready Engine SRE

    Router blades for the Cisco ISR G2 branch router that provide the capability to host Cisco, third-party and custom applications

    TERM ACRONYM DEFINITION

    TelePresence TP

    Incorporates high-quality spatial audio and life-like video at low latency in a specially tuned environment.

    Virtual Adaptive Security Appliance

    vASAA virtualised firewall and security solution developed by Cisco, in partnership with VMware

    Virtual Local Area Network

    VLAN

    Provide the segmentation services traditionally provided by routers in LAN configurations, enhancing security and traffic flowmanagement

    Video on Demand VoD

    Allows subscribers to view TV programming in real time, or download and view programmeslater

    Virtual Desktop Infrastructure

    VDI

    Hosting a desktop operating system within a virtual machine running on a hosted, centralised or remote server

    Virtual Private Network VPN

    A network that primarily uses public telecommunication infrastructure, such as the Internet, to provide remote access to corporate networks and systems

    Virtual Security Gateway

    VSG

    Delivers security and compliance for virtual computing environments through improved visibility and enforcement of security policies between applications and virtual machines

    Virtualisation Experience Infrastructure

    VXI

    A system for integrating virtualised data centres, networks and endpoints with essential desktop virtualisation services for interactive multimedia

    Wide Area Network WANGeographically dispersed network that connects multiple sites and covers great distances

    Wide Area Application Services

    WAAS

    Application acceleration and WAN optimisation solution for the branch office that improves the performance of any TCP-based application operating in a WAN environment

    3rd Generation Mobile Technology

    3GA generation of standards for mobile phones and services

    28 29

  • 30 31

    Contributors

    Matt Day Systems Engineer, Routing & Switching,Borderless Networks UK&[email protected]

    Elliot HughesSystems Engineer, SecurityBorderless Networks UK&[email protected]

    Tim HardwickSystems Engineer, MobilityBorderless Networks UK&[email protected]

    3131

  • 32

    Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Ciscos trademarks can be found at www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1007R)