Weitere ähnliche Inhalte
Ähnlich wie Bridging the wired wireless
Ähnlich wie Bridging the wired wireless (20)
Kürzlich hochgeladen (20)
Bridging the wired wireless
- 1. Unified Networks
The Key to Business Agility
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
- 2. Network Access: THEN
Limited. Siloed.
Purpose-built
Yet Simple. Limited Application Portability
Loss of Flexibility
DATA VOICE FACILITY
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
- 3. Network Access: NOW
Applications Seamless
Anywhere Connectivity
More
Complex.
Growth in Network
Connected Devices
Network Complexity Can Disrupt the User Experience and Increase TCO
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
- 4. Given Access Network Complexity…
Consider the Right Approach to Network Design
It’s NOT Point Network Access Technologies
About
Understanding the Application and User
It’s About Requirements of the Business
It’s About Allowing These to Determine the Right Network Topology
The Right Approach to Network Access Enables Your Users to Cross Network
Borders with a Secure, Consistent Experience
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
- 5. Access Networks Comprise Wired,
Wireless and Remote Access Technologies
Deploy the Right Mix of
Technologies That Support
Your Varied Business
Requirements
Application
Directives
Evolution
Contact
Email Compliance Green
Center
Device Diverse
Proliferation Users
Smart- Smart
Engineer Sales Exec
phones Meters
An Architectural Approach Provides a Holistic View Of the Three Access
Technologies to Drive A Borderless Experience
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
- 6. What Is Network Unification?
Network Applications
Facilities Client
Unification Services
Staffing
Indoor and
Management
Outdoor
Security
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
- 7. Define a Strategy with a Unification Checklist
Access Policies for Users and Devices
End-to-end Security
Simple, Single View of Network Operations
IT Support Coverage
Compliant
Green Considerations
Plan for Future Growth
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
- 8. Define a Strategy with a Unification Checklist
Access Policies for Users and Devices
End-to-end Security
Simple, Single View of Network Operations
IT Support Coverage
Compliant
Green Considerations
Plan for Future Growth
Select a Vendor Who can Address Your End-to-End Access Needs
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
- 9. Impact of Avoiding Unification
Network Simplifying User Managing Building a “Future
Interoperability Management Multi-vendor Proof” Network
Relationships
Increases Total Cost
of Operations
To Lower TCO, Define an Access Strategy That Aligns with Your Business
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
- 10. Unification Summary
Unification is a process – not a
technology
Understand your application and Network Applications
user requirements
Facilities Client
Plan your unification in steps
Unification
Network access Staffing Services
Network services
Indoor and
Outdoor Management
Management and policy
Security
Wireless and wired networks are
cooperative and interdependent
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
- 11. Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11