SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
Clement Tam
How to build Campus Network to
embrace e-Learning Era 2.10
UnifiedAccess for Education
One Policy – One Management – One Network
Andy Lam
15th June, 2013
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Internet
Floor 4
Floor 3
Floor 2
Floor 1
Core Switch &
Wireless
Controller
One Management
Tool for Wired
and Wireless
Identity Services
Engine
Hall
(High Density AP)
Building /
Classroom
Playground
(Outdoor AP)
Application
Firewall
Perfect Campus Infrastructure
Edge Switches
Access Point
(AP)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Preparing
students for
success in the
global
economy
Keeping
students fully
engaged –
Adaptive
Learning
Obsoleting
traditional
textbooks for
E-Textbooks
Implementing
mandated
Online Testing
Protecting
student and
school district
data
Providing safe
learning
environments
BYOD for
faculty, staff,
students, and
parents
Tech savvy
students
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Wish List
Authentication Services
I only want to allow the “right” users
and devices on my network
Authorization Services
I want user and devices to receive
appropriate network services
Guest Lifecycle
Management
I want to allow guests into the
network and control their behavior
Profiling Services
I need to allow/deny iPads
in my network (BYOD)
Posture Services
I want to ensure that devices
on my network are clean
Secure Groups Access
I need a scalable way of enforcing
access policy across the network
Identity
Services
Engine
Simplified
Policy
Management
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Wired+Wireless+WAN Policy/Guest Management
AFTER
Unified Context-based Policy Management for
Employees and Guests Across The Network
Account for every device and
block unwanted devices
AAA + profiling, provisioning,
and posturing = secure BYOD
Simple | Unified | Automated
Who? What? When? Where? How?
Provides Unparalleled Control
BEFORE
Separate Policy And Guest Management
Wired | Wireless | WAN
Improved
Control
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Policy
Guest
Student
Faculty
Personal Device
Personal Device
Faculty Device
Personal Device
Wireless Classrooms
Captive Portal
DMZ Guest Tunnel
Faculty
VLAN
5 Dimensions of Policy and Provisioning
Anytime
Anytime
Student VLAN
Student ACL
Wired
Wireless
VPN
Faculty
ACL
Guest VLAN
M–S
8 am–6 pm
TimeLocation
Access
Method
DeviceUser
Anywhere
Anywhere
Anytime
Anytime
Anytime
Anywhere
Anywhere
Wired
Wireless
IF $Identity AND $Device AND $Access
AND $Location AND $Time THEN $Policy
Library
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Account
Sponsorship
Account Notification
Credentials Automatically
Provided to Guest Via Email,
SMS, or Printed Receipt
Web Browser Redirects to Login Screen
User Can Manage Access for Their Own Device
Successful Authentication
• Isolated Guest Network on DMZ
• Role Based Policy Applied
• User granted access to Internet
Example K-12 Education Walkthrough—Guest
Approved Sponsor
Creates Account.
Captive
Portal
Access
Granted
ISE
Policy /
Guest Engine
Internal
WLC
Anchor WLC
Guest User
on DMZ
DMZ
Internet
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Wish List
Planning Services
I want clear visibility in
to the RF environment
Discovery Services
I want to discover and inventory any
and all devices attached to the network
Deployment Services
I want flexible and easy to use
templates and deployment tools
Monitoring Services
I want to monitor the LAN, WLAN, and
WAN with a single application
Troubleshooting Services
I want to troubleshoot the LAN, WLAN,
and WAN from a single application
Compliance Services
I need to monitor and audit system-wide
configurations for compliance purposes
Prime
Infrastructure
Simplified
Network
Management
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Single Pane of Glass View and Management of
WLAN – LAN - WAN
AFTER
Comprehensive User and Unified Access Network
Visibility and Advanced Troubleshooting
Provides Unparalleled Visibility
BEFORE
Separated management
Improved
Visibility WLAN
LAN
WAN
+
Identity



Simple Improves IT efficiency
Unified Single view of all user access data
Advanced Troubleshooting Less time
and resources consumed
×
×
×
Siloed Inefficient operational model
Repetitive Manual correlation of data
Error Prone Consumes time and resources
WLAN
LAN
WAN
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
• You can use to column grid for
laying out slides with more
Grey:
Disconnected
AP
Yellow: AP w/
unresolved
non-critical
alarms
Red: AP
w/ critical
alarms
Active
rogue
APs
802.11u
location
specific
service
Zoom &
Pan
controls
Next-Gen Maps
• Reduced Clutter
• Faster Loading
• Better Navigation
• Scalable Vector
Graphics
• High quality
images with zoom
in/out
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
ExperienceAnalysis
Server
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Control and Visibility for IT—Predictability for Users
Access Switches
Compact 3750-X/3560-X2960-S 4500E
Core Switches
6500 Series
Access Points
600 Series
Teleworker
3600 Series
Density
1550 Series
Outdoor
1600
2600
2600e
3600
Indoor
Mobility Services Engine
3310 and 3355
Physical or Virtual
Wireless LAN Controllers
2500 Series WLC on SRE
5500 Series WiSM2
7500
Identity and Policy
Data Integration
ISE
PI
Physical
or Virtual
8500
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
BEFORE
Wireless Interference Decreases
Reliability and Performance
AFTER
Cleanair Mitigates RF Interference
Improving Reliability and Performance
Wireless Client
Performance
Chip Level Proactive and Automatic Interference
Protection
Improves Performance and Predictability
Air Quality Performance
Air Quality Performance
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
High Resolution Interference Detection,
Classification, and Mitigation at Chip Level
Detect | Classify | Locate | Mitigate
• CleanAir radio ASIC
• Detect Wi-Fi
and non-Wi-Fi
interference sources
• Assess impact to
Wi-Fi performance
• Proactively change
channels when
interference occurs
• Monitor air quality
35
100
63
97
2090
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Identify, Analyze, and Optimize Application Traffic
AFTER
Network Based Application Recognition –
NBAR2 Deep Packet Inspection and App ID
Provides Unparalleled Visibility and Control
BEFORE
Application View and ControL Based
On L4 Firewall Sessions
NBAR2 LIBRARY
Deep Packet Inspection
Real Time
Interactive
Non-Real Time
Background
POLICY
Packet Mark
and Drop
First Generation
Firewall
Visibility to the port level interaction but not
the applications running within the port
View, Control and
Troubleshoot – End User Application ExperienceFW L4 Session Visibility and Control
HTTP = 75%
SMTP = 15%
FTP = 2%
Telnet = 1%
SNMP = 3%
Wireless LAN Controller
Traffic
Improved
Visibility and
Control
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Reduces Coverage Holes/Improves Both
Upstream and Downstream
Improves Predictability and Performance
ClientLink Disabled ClientLink Enabled
450 Mbps
300 Mbps
150 Mbps
65 Mbps
6 Mbps
450 Mbps
300 Mbps
150 Mbps
65 Mbps
6 MbpsBeacon Rate
Connection Rate
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
600
Mbps
450
Mbps
802.11
1999 2003 2007
2
Mbps
11
Mbps
802.11b
54
Mbps
802.11ag
24
Mbps
300
Mbps
65
Mbps
802.11n
6900
Mbps
1300
Mbps
870
Mbps
290
Mbps
6900
Mbps
3500*
Mbps
1730*
Mbps
290
Mbps
2013
Wave 1
802.11ac
2014
Wave 2
802.11ac
* Assumes 160MHz channel width is available and usable
802.11ac = game changer
802.11n 802.11ac
Band 2.4GHz & 5.0GHz 5.0GHz only
PHY Rate 65 Mbps – 600 Mbps 290 Mbps – 6.9 Gbps
MAC
Throughput
45 Mbps – 420 Mbps 194 Mbps – 4.8 Gbps
Spatial Streams 4 8
Modulation 64 QAM 256 QAM
Channel Width 20 or 40 MHz
20, 40, 80, *80+80, 160
MHz
1
Spatial
Streams
3
Spatial
Streams
8
Spatial
Streams
Key benefits:
• Increased speed
• Improved battery life
GigabitEthernetUplink
2GigabitEthernetUplinks
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Wired-Like Video Delivery over Wireless
AFTER
Dynamic RF Management
Improves Predictability and Performance
BEFORE
Manual RF Management
High School
Superintendent | Classroom | K12Superintendent | Classroom | K12
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Apple Bonjour and other consumer protocol service gateway.
BEFORE
Isolated Apple Bonjour Network
AFTER
Bonjour Discovery, Advertisement & Policy
Bonjour Services Directory
Apple Bonjour discovery, advertisement and policy
Enterprise / Higher
Education / K-12
Isolated
Services
No Network
Policy
L2
Only
Service
Cache and
advertise
VLAN and
WLAN Policy
Enforcement
Services
Across L3
boundary
Routed
Network
Apple TV Apple TV
Printer
WLAN
X
mDNS & Bonjour
Services NOT Routed
Routed
Network
Apple TV Apple TV
Printer
WLAN
WLAN
Controller
mDNS Profiles
Policy & Control
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Sub Second Recovery / Convergence for
Both WLAN and LAN
AFTER
WLAN and LAN Recovery / Convergence
Times Are Both Sub Second
Improves Predictability
BEFORE
WLAN and LAN Recovery / Convergence
Times Significantly Different
×

WLAN 30+ second recovery / convergence
LAN Sub second recovery / convergence
AP
State
Sync
AP Failover
N+1 Redundancy


WLAN Sub second recovery / convergence
LAN Sub second recovery / convergence
AP Resiliency
High AvailabilityProvide Mission
Critical Support
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Simplify IT Operations with One Policy –
One Management – One Network
Visualize and control what applications
are running on the network
Make sure that policy follows the user
wherever they go on the network?”
Easily manage onboarding and access rights
for students, faculty, staff and guests
Enables you to “say yes” to BYOD
without increasing your IT staff
Delivers the most predictable
user experience in the industry
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Thank You

Más contenido relacionado

La actualidad más candente

Farooq Razzaque - Network Specialist
Farooq Razzaque - Network SpecialistFarooq Razzaque - Network Specialist
Farooq Razzaque - Network SpecialistFarooq Razzaque
 
Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012Jiunn-Jer Sun
 
Cisco Ccna Certification
Cisco Ccna CertificationCisco Ccna Certification
Cisco Ccna Certificationdkaya
 
Ccna security
Ccna securityCcna security
Ccna securitydkaya
 
Power Distribution Feeder Automation - Application Story 2012
Power Distribution Feeder Automation -  Application Story 2012Power Distribution Feeder Automation -  Application Story 2012
Power Distribution Feeder Automation - Application Story 2012Jiunn-Jer Sun
 
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom ReportWireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom ReportCisco Mobility
 
Aerohive BR100 Branch Router
Aerohive BR100 Branch RouterAerohive BR100 Branch Router
Aerohive BR100 Branch RouterAerohive Networks
 
AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016
AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016
AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016Ahmed Morsy
 
Meraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopMeraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopCisco Canada
 
Byod and guest access workshop enabling byod carlos gomez gallego_network ser...
Byod and guest access workshop enabling byod carlos gomez gallego_network ser...Byod and guest access workshop enabling byod carlos gomez gallego_network ser...
Byod and guest access workshop enabling byod carlos gomez gallego_network ser...Aruba, a Hewlett Packard Enterprise company
 
General questions help you realize cisco aironet 1250 series access point
General questions help you realize cisco aironet 1250 series access pointGeneral questions help you realize cisco aironet 1250 series access point
General questions help you realize cisco aironet 1250 series access pointIT Tech
 
Datasheet EnGenius EGS5212FP
Datasheet EnGenius EGS5212FPDatasheet EnGenius EGS5212FP
Datasheet EnGenius EGS5212FPEnGenius Europe
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesCisco Mobility
 
Raman-Network Engineer
Raman-Network EngineerRaman-Network Engineer
Raman-Network EngineerRaman Kumar
 

La actualidad más candente (20)

Access point
Access pointAccess point
Access point
 
CV
CVCV
CV
 
Resume_Susheel Jain
Resume_Susheel JainResume_Susheel Jain
Resume_Susheel Jain
 
Farooq Razzaque - Network Specialist
Farooq Razzaque - Network SpecialistFarooq Razzaque - Network Specialist
Farooq Razzaque - Network Specialist
 
Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012
 
Cisco Ccna Certification
Cisco Ccna CertificationCisco Ccna Certification
Cisco Ccna Certification
 
Ccna security
Ccna securityCcna security
Ccna security
 
Power Distribution Feeder Automation - Application Story 2012
Power Distribution Feeder Automation -  Application Story 2012Power Distribution Feeder Automation -  Application Story 2012
Power Distribution Feeder Automation - Application Story 2012
 
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom ReportWireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
 
Aerohive BR100 Branch Router
Aerohive BR100 Branch RouterAerohive BR100 Branch Router
Aerohive BR100 Branch Router
 
AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016
AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016
AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016
 
Meraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopMeraki Cloud Networking Workshop
Meraki Cloud Networking Workshop
 
UPDATED_CV_
UPDATED_CV_UPDATED_CV_
UPDATED_CV_
 
Byod and guest access workshop enabling byod carlos gomez gallego_network ser...
Byod and guest access workshop enabling byod carlos gomez gallego_network ser...Byod and guest access workshop enabling byod carlos gomez gallego_network ser...
Byod and guest access workshop enabling byod carlos gomez gallego_network ser...
 
General questions help you realize cisco aironet 1250 series access point
General questions help you realize cisco aironet 1250 series access pointGeneral questions help you realize cisco aironet 1250 series access point
General questions help you realize cisco aironet 1250 series access point
 
Datasheet EnGenius EGS5212FP
Datasheet EnGenius EGS5212FPDatasheet EnGenius EGS5212FP
Datasheet EnGenius EGS5212FP
 
ClearPass Policy Manager 6.3 User Guide
ClearPass Policy Manager 6.3 User GuideClearPass Policy Manager 6.3 User Guide
ClearPass Policy Manager 6.3 User Guide
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best Practices
 
Acmx study guide
Acmx study guideAcmx study guide
Acmx study guide
 
Raman-Network Engineer
Raman-Network EngineerRaman-Network Engineer
Raman-Network Engineer
 

Destacado

Bootstrapping Profits
Bootstrapping ProfitsBootstrapping Profits
Bootstrapping ProfitsTodd Garland
 
Visual Gold! The New Revolution of Content Marketing [Infographic]
Visual Gold! The New Revolution of Content Marketing [Infographic]Visual Gold! The New Revolution of Content Marketing [Infographic]
Visual Gold! The New Revolution of Content Marketing [Infographic]marketo12
 
Aleluia ao senhor
Aleluia ao senhorAleluia ao senhor
Aleluia ao senhorIMQ
 

Destacado (7)

Learning Without Limits – Cambodia Service-Learning Trip
Learning Without Limits – Cambodia Service-Learning TripLearning Without Limits – Cambodia Service-Learning Trip
Learning Without Limits – Cambodia Service-Learning Trip
 
USDA in the USA
USDA in the USAUSDA in the USA
USDA in the USA
 
Bootstrapping Profits
Bootstrapping ProfitsBootstrapping Profits
Bootstrapping Profits
 
Visual Gold! The New Revolution of Content Marketing [Infographic]
Visual Gold! The New Revolution of Content Marketing [Infographic]Visual Gold! The New Revolution of Content Marketing [Infographic]
Visual Gold! The New Revolution of Content Marketing [Infographic]
 
Brochure Youncta English
Brochure Youncta EnglishBrochure Youncta English
Brochure Youncta English
 
Aleluia ao senhor
Aleluia ao senhorAleluia ao senhor
Aleluia ao senhor
 
上網學習計劃簡介及受助家庭個案分享
上網學習計劃簡介及受助家庭個案分享上網學習計劃簡介及受助家庭個案分享
上網學習計劃簡介及受助家庭個案分享
 

Similar a 如何用建構校園網絡迎接e-Learning時代v2.10

Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Cisco Russia
 
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Canada
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco merakiCisco Canada
 
Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning Cisco Russia
 
BRKIOT-2108.pdf
BRKIOT-2108.pdfBRKIOT-2108.pdf
BRKIOT-2108.pdfJokaTek
 
Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01RoutecoMarketing
 
Deploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless CampusDeploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless CampusRassul Ismailov
 
Cisco Prime infrastructure 3.0
Cisco Prime infrastructure 3.0 Cisco Prime infrastructure 3.0
Cisco Prime infrastructure 3.0 solarisyougood
 
Service Provider Wi-Fi
Service Provider Wi-FiService Provider Wi-Fi
Service Provider Wi-FiCisco Canada
 
Cisco IWAN – Intelligent Connectivity for Today’s Reality
Cisco IWAN – Intelligent Connectivity for Today’s RealityCisco IWAN – Intelligent Connectivity for Today’s Reality
Cisco IWAN – Intelligent Connectivity for Today’s RealityCisco Canada
 
Eficiencia y productividad
Eficiencia y productividadEficiencia y productividad
Eficiencia y productividadschangan1
 
Cloud networking workshop
Cloud networking workshopCloud networking workshop
Cloud networking workshopCisco Canada
 
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...Nur Shiqim Chok
 
PRABA_GLOBAL_NOC
PRABA_GLOBAL_NOCPRABA_GLOBAL_NOC
PRABA_GLOBAL_NOCpraba karan
 
The Changing Data Center Landscape
The Changing Data Center LandscapeThe Changing Data Center Landscape
The Changing Data Center LandscapeCisco Canada
 
WiFi – Mobile BNG Offload Deployments
WiFi – Mobile BNG Offload DeploymentsWiFi – Mobile BNG Offload Deployments
WiFi – Mobile BNG Offload DeploymentsCisco Canada
 

Similar a 如何用建構校園網絡迎接e-Learning時代v2.10 (20)

Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
 
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
 
Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning
 
My CV-1
My CV-1My CV-1
My CV-1
 
BRKIOT-2108.pdf
BRKIOT-2108.pdfBRKIOT-2108.pdf
BRKIOT-2108.pdf
 
Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01
 
Deploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless CampusDeploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless Campus
 
Cisco Prime infrastructure 3.0
Cisco Prime infrastructure 3.0 Cisco Prime infrastructure 3.0
Cisco Prime infrastructure 3.0
 
Service Provider Wi-Fi
Service Provider Wi-FiService Provider Wi-Fi
Service Provider Wi-Fi
 
2500 controller
2500 controller2500 controller
2500 controller
 
Cisco IWAN – Intelligent Connectivity for Today’s Reality
Cisco IWAN – Intelligent Connectivity for Today’s RealityCisco IWAN – Intelligent Connectivity for Today’s Reality
Cisco IWAN – Intelligent Connectivity for Today’s Reality
 
Eficiencia y productividad
Eficiencia y productividadEficiencia y productividad
Eficiencia y productividad
 
2012 ah vegas unified access fundamentals
2012 ah vegas   unified access fundamentals2012 ah vegas   unified access fundamentals
2012 ah vegas unified access fundamentals
 
Cloud networking workshop
Cloud networking workshopCloud networking workshop
Cloud networking workshop
 
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
 
mohamed sanad cv
mohamed sanad cvmohamed sanad cv
mohamed sanad cv
 
PRABA_GLOBAL_NOC
PRABA_GLOBAL_NOCPRABA_GLOBAL_NOC
PRABA_GLOBAL_NOC
 
The Changing Data Center Landscape
The Changing Data Center LandscapeThe Changing Data Center Landscape
The Changing Data Center Landscape
 
WiFi – Mobile BNG Offload Deployments
WiFi – Mobile BNG Offload DeploymentsWiFi – Mobile BNG Offload Deployments
WiFi – Mobile BNG Offload Deployments
 

Más de eLearning Consortium 電子學習聯盟

AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位eLearning Consortium 電子學習聯盟
 
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?eLearning Consortium 電子學習聯盟
 
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and PrinterseLearning Consortium 電子學習聯盟
 

Más de eLearning Consortium 電子學習聯盟 (20)

AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
 
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
 
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
 
1. How Data Analytics Transforming Digital Marketing - Saron Leung
1. How Data Analytics Transforming Digital Marketing - Saron Leung1. How Data Analytics Transforming Digital Marketing - Saron Leung
1. How Data Analytics Transforming Digital Marketing - Saron Leung
 
HKTVMall: Leading Technology Evolution for eCommerce Industry
HKTVMall: Leading Technology Evolution for eCommerce IndustryHKTVMall: Leading Technology Evolution for eCommerce Industry
HKTVMall: Leading Technology Evolution for eCommerce Industry
 
How Blockchain affecting us - Dr Sin.pdf
How Blockchain affecting us - Dr Sin.pdfHow Blockchain affecting us - Dr Sin.pdf
How Blockchain affecting us - Dr Sin.pdf
 
5-Hot-Chain Bento.pdf
5-Hot-Chain Bento.pdf5-Hot-Chain Bento.pdf
5-Hot-Chain Bento.pdf
 
4-Herbal ID.pdf
4-Herbal ID.pdf4-Herbal ID.pdf
4-Herbal ID.pdf
 
3-VisualSonic.pdf
3-VisualSonic.pdf3-VisualSonic.pdf
3-VisualSonic.pdf
 
2-kNOw Touch.pdf
2-kNOw Touch.pdf2-kNOw Touch.pdf
2-kNOw Touch.pdf
 
1-C-POLAR Air Filter.pdf
1-C-POLAR Air Filter.pdf1-C-POLAR Air Filter.pdf
1-C-POLAR Air Filter.pdf
 
3 - Interaction between Cyber Security and School IT Policy .pdf
3 - Interaction between Cyber Security and School IT Policy .pdf3 - Interaction between Cyber Security and School IT Policy .pdf
3 - Interaction between Cyber Security and School IT Policy .pdf
 
2 - ELC學校網絡安全與防護.pdf
2 - ELC學校網絡安全與防護.pdf2 - ELC學校網絡安全與防護.pdf
2 - ELC學校網絡安全與防護.pdf
 
1 - HKT Reporting.pdf
1 - HKT Reporting.pdf1 - HKT Reporting.pdf
1 - HKT Reporting.pdf
 
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
 
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
 
07 2020 網絡安全趨勢和安全小貼士
07 2020 網絡安全趨勢和安全小貼士07 2020 網絡安全趨勢和安全小貼士
07 2020 網絡安全趨勢和安全小貼士
 
06 網絡安全挑戰與防衛
06 網絡安全挑戰與防衛06 網絡安全挑戰與防衛
06 網絡安全挑戰與防衛
 
04 提升網絡安全 - 為電子學習打造先決條件
04 提升網絡安全 - 為電子學習打造先決條件04 提升網絡安全 - 為電子學習打造先決條件
04 提升網絡安全 - 為電子學習打造先決條件
 
03 學校網絡安全與防衛
03 學校網絡安全與防衛03 學校網絡安全與防衛
03 學校網絡安全與防衛
 

Último

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Último (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

如何用建構校園網絡迎接e-Learning時代v2.10

  • 1. Clement Tam How to build Campus Network to embrace e-Learning Era 2.10 UnifiedAccess for Education One Policy – One Management – One Network Andy Lam 15th June, 2013
  • 2. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Internet Floor 4 Floor 3 Floor 2 Floor 1 Core Switch & Wireless Controller One Management Tool for Wired and Wireless Identity Services Engine Hall (High Density AP) Building / Classroom Playground (Outdoor AP) Application Firewall Perfect Campus Infrastructure Edge Switches Access Point (AP)
  • 3. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Preparing students for success in the global economy Keeping students fully engaged – Adaptive Learning Obsoleting traditional textbooks for E-Textbooks Implementing mandated Online Testing Protecting student and school district data Providing safe learning environments BYOD for faculty, staff, students, and parents Tech savvy students
  • 4. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Wish List Authentication Services I only want to allow the “right” users and devices on my network Authorization Services I want user and devices to receive appropriate network services Guest Lifecycle Management I want to allow guests into the network and control their behavior Profiling Services I need to allow/deny iPads in my network (BYOD) Posture Services I want to ensure that devices on my network are clean Secure Groups Access I need a scalable way of enforcing access policy across the network Identity Services Engine Simplified Policy Management
  • 5. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 Wired+Wireless+WAN Policy/Guest Management AFTER Unified Context-based Policy Management for Employees and Guests Across The Network Account for every device and block unwanted devices AAA + profiling, provisioning, and posturing = secure BYOD Simple | Unified | Automated Who? What? When? Where? How? Provides Unparalleled Control BEFORE Separate Policy And Guest Management Wired | Wireless | WAN Improved Control
  • 6. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 Policy Guest Student Faculty Personal Device Personal Device Faculty Device Personal Device Wireless Classrooms Captive Portal DMZ Guest Tunnel Faculty VLAN 5 Dimensions of Policy and Provisioning Anytime Anytime Student VLAN Student ACL Wired Wireless VPN Faculty ACL Guest VLAN M–S 8 am–6 pm TimeLocation Access Method DeviceUser Anywhere Anywhere Anytime Anytime Anytime Anywhere Anywhere Wired Wireless IF $Identity AND $Device AND $Access AND $Location AND $Time THEN $Policy Library
  • 7. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 Account Sponsorship Account Notification Credentials Automatically Provided to Guest Via Email, SMS, or Printed Receipt Web Browser Redirects to Login Screen User Can Manage Access for Their Own Device Successful Authentication • Isolated Guest Network on DMZ • Role Based Policy Applied • User granted access to Internet Example K-12 Education Walkthrough—Guest Approved Sponsor Creates Account. Captive Portal Access Granted ISE Policy / Guest Engine Internal WLC Anchor WLC Guest User on DMZ DMZ Internet
  • 8. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 Wish List Planning Services I want clear visibility in to the RF environment Discovery Services I want to discover and inventory any and all devices attached to the network Deployment Services I want flexible and easy to use templates and deployment tools Monitoring Services I want to monitor the LAN, WLAN, and WAN with a single application Troubleshooting Services I want to troubleshoot the LAN, WLAN, and WAN from a single application Compliance Services I need to monitor and audit system-wide configurations for compliance purposes Prime Infrastructure Simplified Network Management
  • 9. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Single Pane of Glass View and Management of WLAN – LAN - WAN AFTER Comprehensive User and Unified Access Network Visibility and Advanced Troubleshooting Provides Unparalleled Visibility BEFORE Separated management Improved Visibility WLAN LAN WAN + Identity    Simple Improves IT efficiency Unified Single view of all user access data Advanced Troubleshooting Less time and resources consumed × × × Siloed Inefficient operational model Repetitive Manual correlation of data Error Prone Consumes time and resources WLAN LAN WAN
  • 10. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 • You can use to column grid for laying out slides with more Grey: Disconnected AP Yellow: AP w/ unresolved non-critical alarms Red: AP w/ critical alarms Active rogue APs 802.11u location specific service Zoom & Pan controls Next-Gen Maps • Reduced Clutter • Faster Loading • Better Navigation • Scalable Vector Graphics • High quality images with zoom in/out
  • 11. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 ExperienceAnalysis Server
  • 12. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 Control and Visibility for IT—Predictability for Users Access Switches Compact 3750-X/3560-X2960-S 4500E Core Switches 6500 Series Access Points 600 Series Teleworker 3600 Series Density 1550 Series Outdoor 1600 2600 2600e 3600 Indoor Mobility Services Engine 3310 and 3355 Physical or Virtual Wireless LAN Controllers 2500 Series WLC on SRE 5500 Series WiSM2 7500 Identity and Policy Data Integration ISE PI Physical or Virtual 8500
  • 13. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 BEFORE Wireless Interference Decreases Reliability and Performance AFTER Cleanair Mitigates RF Interference Improving Reliability and Performance Wireless Client Performance Chip Level Proactive and Automatic Interference Protection Improves Performance and Predictability Air Quality Performance Air Quality Performance
  • 14. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 High Resolution Interference Detection, Classification, and Mitigation at Chip Level Detect | Classify | Locate | Mitigate • CleanAir radio ASIC • Detect Wi-Fi and non-Wi-Fi interference sources • Assess impact to Wi-Fi performance • Proactively change channels when interference occurs • Monitor air quality 35 100 63 97 2090
  • 15. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 Identify, Analyze, and Optimize Application Traffic AFTER Network Based Application Recognition – NBAR2 Deep Packet Inspection and App ID Provides Unparalleled Visibility and Control BEFORE Application View and ControL Based On L4 Firewall Sessions NBAR2 LIBRARY Deep Packet Inspection Real Time Interactive Non-Real Time Background POLICY Packet Mark and Drop First Generation Firewall Visibility to the port level interaction but not the applications running within the port View, Control and Troubleshoot – End User Application ExperienceFW L4 Session Visibility and Control HTTP = 75% SMTP = 15% FTP = 2% Telnet = 1% SNMP = 3% Wireless LAN Controller Traffic Improved Visibility and Control
  • 16. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 Reduces Coverage Holes/Improves Both Upstream and Downstream Improves Predictability and Performance ClientLink Disabled ClientLink Enabled 450 Mbps 300 Mbps 150 Mbps 65 Mbps 6 Mbps 450 Mbps 300 Mbps 150 Mbps 65 Mbps 6 MbpsBeacon Rate Connection Rate
  • 17. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 600 Mbps 450 Mbps 802.11 1999 2003 2007 2 Mbps 11 Mbps 802.11b 54 Mbps 802.11ag 24 Mbps 300 Mbps 65 Mbps 802.11n 6900 Mbps 1300 Mbps 870 Mbps 290 Mbps 6900 Mbps 3500* Mbps 1730* Mbps 290 Mbps 2013 Wave 1 802.11ac 2014 Wave 2 802.11ac * Assumes 160MHz channel width is available and usable 802.11ac = game changer 802.11n 802.11ac Band 2.4GHz & 5.0GHz 5.0GHz only PHY Rate 65 Mbps – 600 Mbps 290 Mbps – 6.9 Gbps MAC Throughput 45 Mbps – 420 Mbps 194 Mbps – 4.8 Gbps Spatial Streams 4 8 Modulation 64 QAM 256 QAM Channel Width 20 or 40 MHz 20, 40, 80, *80+80, 160 MHz 1 Spatial Streams 3 Spatial Streams 8 Spatial Streams Key benefits: • Increased speed • Improved battery life GigabitEthernetUplink 2GigabitEthernetUplinks
  • 18. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 Wired-Like Video Delivery over Wireless AFTER Dynamic RF Management Improves Predictability and Performance BEFORE Manual RF Management High School Superintendent | Classroom | K12Superintendent | Classroom | K12
  • 19. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 Apple Bonjour and other consumer protocol service gateway. BEFORE Isolated Apple Bonjour Network AFTER Bonjour Discovery, Advertisement & Policy Bonjour Services Directory Apple Bonjour discovery, advertisement and policy Enterprise / Higher Education / K-12 Isolated Services No Network Policy L2 Only Service Cache and advertise VLAN and WLAN Policy Enforcement Services Across L3 boundary Routed Network Apple TV Apple TV Printer WLAN X mDNS & Bonjour Services NOT Routed Routed Network Apple TV Apple TV Printer WLAN WLAN Controller mDNS Profiles Policy & Control
  • 20. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 Sub Second Recovery / Convergence for Both WLAN and LAN AFTER WLAN and LAN Recovery / Convergence Times Are Both Sub Second Improves Predictability BEFORE WLAN and LAN Recovery / Convergence Times Significantly Different ×  WLAN 30+ second recovery / convergence LAN Sub second recovery / convergence AP State Sync AP Failover N+1 Redundancy   WLAN Sub second recovery / convergence LAN Sub second recovery / convergence AP Resiliency High AvailabilityProvide Mission Critical Support
  • 21. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
  • 22. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 Simplify IT Operations with One Policy – One Management – One Network Visualize and control what applications are running on the network Make sure that policy follows the user wherever they go on the network?” Easily manage onboarding and access rights for students, faculty, staff and guests Enables you to “say yes” to BYOD without increasing your IT staff Delivers the most predictable user experience in the industry
  • 23. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25 Thank You