Vision of 3-5 year network technology - ISS (iss.leeds.ac.uk)

muterollΚινητά – Ασύρματες Τεχνολογίες

10 Δεκ 2013 (πριν από 3 χρόνια και 7 μήνες)

123 εμφανίσεις

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

2

Northern Universities
Network Event


3


5 Year View of Technology


Chris Blenkhorn

Consulting Systems Architect

cjb@cisco.com

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

3

Roles ???


Networking



Data Centre, Servers, Apps



Web and Web Apps Development



Full depth and breadth of ICT



Business Impact of ICT

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

4

Mainframe
-
Mini

Client
-
Server

Web

Server

Database

LAN

WAN

1960

1980

1990

2005

Consumer

/

Home

Market Discontinuities: The Impact of the
Consumer and the Home on ICT

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

5

Clayton Christensen


Harvard Business School 2004


Sustaining Innovation

Create Better Products in an Established Market


Disruptive Innovation

Establish or Re
-
shape a Market



Future Innovation

Address Societies’ Future Imperatives

Innovation …

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

6

Topics …


Cisco Today



Sustaining Innovation: Now



Disruptive Innovation: Up to Five Years



Future Innovation



Q and A

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

7

Cisco

Today

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

8

Experiences

The ‘Network as the
Platform’ for Life’s
Experiences

IT and

Communications

Leader in
Next Generation IT
& Communications

Worldwide Leader
in Networking

The
Network

as the
Platform

Now Does Cisco See Its’ Role in the
Market?

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

9

Playing
games

Downloading

songs

Watching movies

and TV

Shopping

online

Listening

to music

Movie
Beam/DVR

Audio

iTV

Gaming

Playing games

Reading
newspapers

and
magazines

Sending e
-
mail

Talking to friends

and co
-
workers

Digital
Imaging

Digital
Stream

Wireless

Mobile
Electronics

Collaborating

E
-
learning

Sending

e
-
mail

Video

Conferencing

Reading newspapers

and magazines

Mobile
Electronics

Digital
Video

PC Broadband

Training/VOD/

Web Cast

At Home

At Work

On
-
the
-
Go

Cisco Products and Services

At Home

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

10

CORE TECHNOLOGIES

10

10

Core (or Foundation) Technologies

SWITCHING


& ROUTING

PROGRAMMABLE

SILICON

INTELLIGENT

SERVICES

VIRTUALISATION

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

11

11

11

11

© 2003 Cisco Systems, Inc. All rights reserved.

ADVANCED TECHNOLOGIES

Advanced Technologies

UNIFIED

COMMUNICATIONS

DATA CENTRE

NETWORKING

WIRELESS

SECURITY

NETWORKED

HOME

OPTICAL

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

12

12

12

12

EMERGING TECHNOLOGIES

Emerging Technologies

AON

PHYSICAL

SECURITY

TELEPRESENCE

DIGITAL
SIGNAGE

IPICS

SERVER

VIRTUALISATION

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

13

Improving the
Utilisation of all
Resources

Ensuring
Ease of
Access to
Information

Unified Communications


Communications
independent of wired or
wireless medium, location
and end device


Ubiquitous UK wireless


Intelligent end devices


Shared Services


ICT consolidation within and
between Public Sector
organisations


Consistent delivery for all
applications and services

Workforce Transformation


New ways of working in the
office


Mobile workforce


Maximum use of voice, video,
collaboration and messaging

Intelligent Building Management


Building automation using
ICT techniques


Small environmental
footprints for buildings


Changing behaviours of staff
and citizens



Skills, Standards, Governance


Focus on skills


Focus on ICT standards


Architectural Blueprints


Drive for best practise / non
duplication of effort

Virtual Data Centres


Virtual compute and storage
resources


Intelligent information
management


GRID
-
style applications

The Cisco Public Sector Strategy: Policy
and Technology Drivers

Delivering
Personalised
Citizen Services

Increasing
Cost
Effectiveness

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

14

Sustaining
Innovation

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

15

A Long List of Topics …


Embedded Systems (and Intelligence)



Virtualisation (of everything) and Grid



Security (of Infrastructure) and Confidentiality (of
Information)



Unified Communications and Mobility
Technologies



© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

16

Embedded Systems …

A.
Put it in Silicon …


B.
Maximise the Integration of Intelligent Services
into the Network Core


C.
Migrate Application Processing (Middleware) from
Servers into the Network


Cisco Application
Oriented Networking (AON)

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

17

A. Putting it in Silicon: Cisco
Chipsets In Comparison

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

18

B. Integrating Intelligence into the Network
Foundation

IP Network

SSL

Applications

OS and Middleware

TDM

Systems

Voice

Apps

TDM

Voice

Systems

Message Handling

I/O Termination

RFID

Mobile

Email

Replication

Database

AV

Disk Management

Load Balancing

Caching

Firewall

Multicast

SSL

Wireless

Mgmt

QoS

Call

Control

IPS

VPN

WAFS

Voice

Mail

Anti
-

SPAM

SBC

Backup

Patch

Updates

Encryption

Email

ERP

NASB

Web Acceleration

File Virtualisation

CRM

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

19

C. Cisco Application Oriented Networking
(AON)


The next stage in the evolution of the network:



Process at application message level



Able to natively understand the content and context of application messages



Enable application to focus on business logic and user interaction while offloading
application overhead aspects to the network with no changes to the existing systems

APPLICATIONS,


PROCESSES,

PEOPLE

PACKET

NETWORK

APPLICATION

ORIENTED

NETWORKING

WEB

MFG

ERP

CRM

SCM

FIN

MESSAGE

ROUTING

EVENT

CAPTURE

APPLICATION

SECURITY

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

20

Virtualisation …

A.
Enterprise Networks

Virtual Networks
-

IP VPN Technology


B.
Data Centre Infrastructure

Virtual LANs and Virtual Switches

Virtual SANs

Virtual Firewalls

Virtual Server Load Balancers

Virtual Compute and Storage Resources

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

21

Data Centre Infrastructure Evolution:
From Silos to Service Oriented Pools

Controlling
Costs

Application
Service Levels

Business
Responsiveness

Compliance

and Resilience

Information
Management

Business

Challenges

Current
Infrastructure

TCO

RESILIENCE

AGILITY

Inconsistent

Security

Inconsistent DR

Isolated Application Silos

Rigid Infrastructure Silos

Under
-
utilised Resources

Operational Complexity
and Inefficiency

Future
Infrastructure

TCO

RESILIENCE

AGILITY

Integrated, multi
-
layer
security

Tiered Storage and
Business Continuance

Service Oriented
Architecture and
Infrastructure

Highly
-
utilised Pooled
Resources

Dynamic Provisioning

Standard Operating
Environment

USERS

VIRTUALISATION

INTELLIGENT INFORMATION
NETWORK

APPLICATION 1...N

POOLED
COMPUTING

POOLED
STORAGE

APPLICATION 1...N

USERS

DEDICATED
COMPUTING

DEDICATED
STORAGE

DEDICATED NETWORK

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

22

22

22

22

Dedicated Data Centre Solution



Core Routers



WAN Interfaces



Full BGP Routing



LAN Switches



High availability



Density of Interfaces



High Performance
Forwarding



Server Load Balancers



L4
-
7 HTTP Inspection



Firewalls



Secure Mission Critical
Backend Services

Core

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

23

23

23

23

© 2003, Cisco Systems, Inc. All rights reserved.

7680_03_2003_c1

Campus
Core

Routed
Interface

Firewall

Load
Balancer

SSL
Termination

Load
Balancer

Servers

Firewall

Backend
Servers

Data Flow

Core

Core

Consolidated and Virtualised Data Centre

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

24

Virtualised Data Centre Services in
Separate Logical Domains

Application Servers

Web Servers

Database Servers

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

25

MPLS Network Feeding ‘Virtual Data
Centre’

IPX
Routing

Voice
VRF

Dept #1
VRF

Dept #N
VRF

Cat6500
MSFC

Cat6500
FWSM

Dept #1
Virtual
Firewall

Dept #N
Virtual
Firewall

Common
VLAN

Voice
VLAN

Dept #1
VLAN

Dept #N
VLAN

Common
IP Server

Common
IPX Server

Dept #1
Server

Dept #N
Server

10G WAN
to Data
Centre
Trunk

(Separate
VPNs /
VLANs)

Core
WAN
Cat6500

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

26

Virtual Switch

SSO across switches
improves resiliency and
eliminates need for HSRP


Improved scalability

since MEC to
core cut # of routing peers in half

Double effective bandwidth

to any
access switch with Multichassis
Etherchannel (MEC)

Virtual Switching Deployment Scenarios:

Traditional Multilayer Campus

Virtual Switch in the
Distribution Layer

Si
Si
Si
Si
Si
Si
Si
Si
© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

27

Virtual Switch

Virtual Switching Deployment Scenarios

Data Centre

Virtual Switch in Aggregation

Virtual Switch in Access

Access

Aggregation

DC Core

MEC to servers simplifies NIC
teaming and doubles available
bandwidth

STP
blocking

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

28

SANS and Storage Virtualisation

FC

FC

FC

Unix/NT

Servers

Mainframes (Ficon)

SATA

Storage Virtualisation


Presents logical view of storage
that is different than physical
storage

Capabilities


Concatenation


Striping


Mirroring


Snapshots


CDP


CDR


Remote Replication

Leverages Intelligent Features


VSANs


Multi
-
protocol


Remote Tape Acceleration


Write Acceleration


SANTap

Standards and Partner Approach


FAIS


IBM, Veritas, EMC

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

29


Flexible VLAN
Deployment


MPLS / VRF
-
Lite at
the MSFC


VLAN Routing at the
MSFC


Virtual Firewall
Services


Virtual Server Load
Balancing


‘Build Once, Use
Many Times’

Catalyst 6500: Intelligent Service Modules
and Virtualisation

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

30

Virtual Server

Virtual Server

Virtual Server

Virtual Server

Server
Processing

I/O

Storage

Applications

Intelligent Interconnect Fabric

Stand
-
By

Resource Pool


Server manager
configures pools of
compute, storage

and I/O


Based on
application,
process, or

business objectives


Massive proliferation of
server resources

CRM

ERP

SCM

Virtual Compute Resources

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

31

Vertical Service Provisioning using
VFrame

App/OS

Security

Storage Networking

Network Application Services

App/OS

App/OS

Compute

Network Connectivity Services

Management

Management

Management

Management

Management

Management

VFrame™


Virtualisation


Orchestration


Provisioning

APIs

APIs

Result:

An Application
-
Centric, Service Oriented Data Centre

Policies

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

33

Security …

A.
Wireless Security


Restricted Wireless



B.
Adaptive Threat Defence



C.
Automated Monitoring, Analysis and Response

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

34

A. Wireless Security: Providing Security
at Each Step


Dynamic WLAN VLAN assignment + 802.11i WPA/WPA2 security

Identity
-
based networking for VLAN assignment

16 MBSSIDs for various authentication types


HW
-
based AES encrypted backhaul links


AP authentication protects against “imitation APs”


Encrypted control traffic between AP and controller


IPSec VPNs for “confidential” mesh client traffic

Controller

IPSec VPN

AP X.509 Certificate Authentication

802.1x + WPA2/AES

VLAN
-
1

H/W AES for
Backhaul Links

Secure Mobile
Infrastructure

Mobile IP
Home Agent

VPN
Gateway

Client and AP Authenticated

Security

Secure Mobile Client
Components


VPN Client


Mobile Client

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

35

Access Control,
Packet Inspection

Firewall Services

Application Intelligence, Content
Inspection, Virus Mitigation

IPS & NW
-
AV Services


Identity, Virtualisation, QoS
Segmentation, Traffic Visibility

Network Intelligence

B. Adaptive Threat Defence

PIX


CSA


NAC

Quarantine VLAN

Cisco Router


CSA


VPN Access

VPN

Cisco DDoS


CSA


Cisco Router

Catalyst

Catalyst


Identity
-
Based

Networking

Cisco IPS


App Inspection, Use
Enforcement, Web Control

Application Security

Malware/Content Defence,
Anomaly Detection

Anti
-
X Defences

Traffic/Admission Control,
Proactive Response

Containment & Control

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

36


Leverage YOUR Existing Investment to
Build “Pervasive Security”


Correlate Data from Across the Enterprise

NIDS, firewalls, routers, switches, CSA

Syslog, SNMP, RDEP, SDEE, NetFlow,
endpoint event logs, multivendor


Rapidly Locate and Mitigate Attacks


Key Features:

Determines security incidents based on
device messages, events, and “sessions”

Incidents are topologically aware for
visualisation and replay

Mitigation on L2 ports and L3 chokepoints

Efficiently scales for real
-
time use across
the Enterprise

C. Automated Security Mitigation,
Analysis, and Response: Cisco CS
-
MARS

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

37

Rich Media

Voice, video & Web

collaboration

Unified

Communicator


Presence

Intelligence in

the network

Speech

Voice access

to services

Mobility

Wired and wireless

Virtualisation

Any time, anywhere

Policy &

Preference

Find me, follow me,

hide me

Unified Communications …

Unity

Messaging

Unified IP Contact
Centre

IP Phones

Service and

Support

Unified

MeetingPlace

Mobile
Connect

Unified

Operations Mgr

Unified

CallManager

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

38

… And Mobility Technologies

A.
Office Wireless and ‘Wireless Cities’


B.
Remote Access Capabilities

Day Extender and Tele
-
working


C.
Fixed / Mobile Convergence


D.
Single Number Reach



© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

39

Disruptive
Innovation

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

40

A(nother) Long List of Topics …

A.
Enterprise Architectures


B.
Intelligent Building Management

Physical Security and Analytics


C.
Web 2.0 and Personalisation


D.
Virtual Worlds


Second Life





© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

41



An architecture

is the fundamental organisation of a
system
: the
relationships

between its
components

and the environment, and the
principles

governing its design and evolution



Business / Industry Architecture
: provides customers with a framework to
more effectively implement and align business processes to technology
capabilities



Technology Architectures
: provides customers with a framework for
optimising their technical resources in support of their business and
technical requirements

Architecture: Components, Relationships, Principles

A. Enterprise Architectures

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

43

The Open Group Architectural Framework
(TOGAF) View

Qualities

Communications Infrastructure

Communications Infrastructure Interface

Network Services

Operating System Services

Software Engineering

Security

Sys and Net Management

Transaction Processing

Location and Directory

User Interface

International Operations

Data Interchange

Data Management

Graphics and Image

Business

Applications

Infrastructure

Applications

Qualities

Application Programming Interface

Qualities

Qualities

Qualities


Application or Software
Developer View of
Architecture



Shows the
Communications
Infrastructure as a thin
non
-
intelligent layer



However similarities to the
Cisco Reference
Architecture …




© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

44

Instant

Messaging

Voicemail &

Unified

Messaging

Rich Media

Conferencing

IP Voice &

Video

Telephony

IP Contact

Centre

Presence

Services

Line of

Business

Document

Management

E
-
Learning

HR

Procurement

Finance

Security Services

Mobility Services

Storage Services


Voice &

Collaboration Services

Compute Services

Identity Services

Infrastructure
Enhancing

Services

Web Application
Acceleration

Remote File Access
Acceleration

Content Delivery

NETWORKED

INFRASTRUCTURE


LAYER

Network Virtualisation Services


Physical Network Templates

Foundation

Services

IP
-
Enabling

Services

APPLICATION


LAYER

COLLABORATION


LAYER

MANAGEMENT,
ANALYSIS AND
DECISION SUPPORT

INTERACTIVE

SERVICES


LAYER

Infrastructure Enhancing Services

Application Enhancing Services

Collaboration

Applications

Business

Applications


Physical Network, Virtualisation and
Foundation Services

The Cisco SONA Reference Architecture

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

45

Foundation

IP
-

the 4
th

Utility

Convergence

Converging
information,
communication and
building technologies


Delivering space,
technology and
services differently

Transformation

LIFECYCLE

B. Intelligent Building Management:
Physical Workplace Transformation

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

46

IP Communications

Fire

Physical

Security

Lighting

Visitor

Access

Elevator

24 / 7

Monitor

Energy

HVAC

WAN

Cisco

Intelligent Converged Environment

Legacy

Disparate Building Networks

PORT

Cisco’s Vision for the Intelligent
Converged Environment

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

47

CCTV Keyboards /
Monitors

Cisco Switch

IP Camera

Cisco IP Gateways
Analog to IP Encoders
with Stream Manager
Virtual Matrix S/W

Cisco IP Gateways
IP to Analog
Decoders

Remote
Monitoring


Cisco Service Platform
with Stream Manager
S/W for Local or Remote
Digital Recording

Cisco Stream Manager
Configuration and Monitoring
S/W

Analog Fixed /
PTZ Cameras

Any to Any

Cisco Video Surveillance (and Analytics)

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

48

C. Web 2.0: The Rise of the Empowered
Citizen (or Consumer or Learner)

Driving Social Computing and Networking into the
Professional Workplace

Driving New Types of Interactions with Friends,
Colleagues and Organisations

Rich Content
Creation,
Personalisation
and Sharing

Interaction
with Web
Content to
Increase
Richness

Personalisation
of web sites
using linked
advertising and
search engines

Combining
different
sources of
content to
create an
integrated
experience

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

49

“http://tim.oreilly.com/news/2005/09/30/what
-
is
-
web
-
20.html”

Tim O’Reilly

What is Web2.0

September 2005

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

50

Web 2.0 Meme Map

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

51

Should You Use Commercial Tools to
Create and Share Rich Content?

Driving Social Computing and Networking into the
Professional Workplace

Driving New Types of Interactions with Friends,
Colleagues and Organisations

Rich Content
Creation,
Personalisation
and Sharing

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

52

Should You Encourage Online Citizen (or
Learner) Feedback on its’ Services?

Driving Social Computing and Networking into the
Professional Workplace

Driving New Types of Interactions with Friends,
Colleagues and Organisations

Interaction
with Web
Content to
Increase
Richness

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

54

Should You Personalise Your Web Sites
with Advertisements?

Driving Social Computing and Networking into the
Professional Workplace

Driving New Types of Interactions with Friends,
Colleagues and Organisations

Personalisation
of web sites
using linked
advertising and
search engines

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

55

Cisco Announces Agreement to Acquire Five Across Inc.


Five Across technology to help enhance Cisco customers' website
experience



SAN JOSE, Calif., February 9, 2007
-

Cisco Systems, Inc., (NASDAQ: CSCO)
today announced a definitive agreement to acquire privately held Five Across, Inc.
of San Francisco, Calif., a leading vendor in the
social networking

marketplace.


The Five Across platform,
Connect Community Builder
, empowers companies to
easily augment their websites with full
-
featured communities and user
-
generated
content such as audio/video/photo sharing, blogs, podcasts, and profiles. These
user
-
interaction functions help companies improve the interaction with their
customers and overall customer experience on their websites. Social networking
functions are of unique interest to media companies, sports leagues, affinity groups
and any organisation wishing to increase its interaction with its online constituency


Cisco Announcement of Five Across Acquisition

News@Cisco

9
th

February 2007

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

55

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

56

“For Cisco, it is about the Human Network. Part of that is
becoming part of communities in Real Life, and now, in
Second Life. We opened the Cisco campus to better
explain and show who we are, what we are about, and
how we are powering the Human Network. And, that
means more than just showcasing products (or, giving
away T
-
shirts and virtual Cisco phones in Second Life). It
means working with the community, becoming part of the
community”


http://slurl.com/secondlife/Cisco%20Systems/132/132/34/


Cisco Second Life Announcement

News@Cisco

1st December 2006

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

56

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

57

Future
Innovation

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

58

Demographic and

Socio
-
Economic Change

Pressures on Natural Resources

and Global Climate

Cross
-
Border Economic Competition

Acceleration in Innovation and

Technological Diffusion

Global Uncertainty and Poverty

The Big Issues: Society’s Future
Strategic Imperatives ….

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

59

Demographic and



Socio
-
Economic Change


Increasing Age of Population


Retirement Age Raised


Increased Healthcare Needs


Social Inclusion

Issues

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

60

In the News … Aging Population

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

61

Demographic and



Socio
-
Economic Change


Increasing Age of Population


Retirement Age Raised


Increased Healthcare Needs


Social Inclusion


Flexible Working


Connected Health


Personalised Learning


Lifelong Learning

ICT Solutions

Issues

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

62

Issues



Price and Availability of Fossil Fuels


Climate Change … is the greatest
long term threat facing the world
today

Increasing Pressure on Natural Resources
and Global Climate

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

63

In the News … Climate Change

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

64

ICT Solutions


Mobility


TeleWorking


Networked Workplaces


Equipment Efficiency

Increasing Pressure on

Natural Resources and Global Climate

Issues



Price and Availability of Fossil Fuels


Climate Change … is the greatest
long term threat facing the world
today

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

65




Catalyst 6500 Power Supply Efficiency has improved




from 70%
-
80% since introduction in 1999.





High end power supplies are better than



90% efficient.


0
5
10
15
20
Pwr Per port
0
50
100
150
Pwr per Gbps
0
2
4
6
8
10
12
14
Pwr per FC Port
0
50
100
150
1st Qtr
Pwr per port
6802

6704

6708

6816

6516a

6724
-
SFP

6748
-
SFP

CSM

ACE

9016

9124

9148

Catalyst 6500 10GbE w/ DFC

Catalyst 6500 GbE w/ DFC

Catalyst 6500 SLB

MDS9500

Power Supply Efficiency and Power Per
Module

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

66

2.7kW per server

Reduces complexity, increase manageability, reduces
latency, and eliminates single points of failure

Application servers typically have
multiple appliances associated
with them. For Cisco IT this
equaled an additional:

With ACE and FWSM deployed in a
Catalyst 6500 these services reside in
the network fabric, eliminating the
appliances and their associated load

Savings =

2.7kW x total servers x kW/hr

Cisco IT Estimates

$23.5M over 3 Years



Firewall



Load Balancer



SSL Offload

Power Consumption Reduction through
Service Integration

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

67

Thank You




Chris Blenkhorn

Consulting Systems Architect

cjb@cisco.com


© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Presentation_ID

68