Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
Bridging the Unconnected with WiFi-6Rica LaiEnterprise Networking
Oct 2019
5G & Wi-Fi 6
WiFi6
High Efficiency4x Capacity
IoT Scale
Cellular like Determinism for high quality services
Higher power efficiency to accelerate IoT adoption
Better app. performance in high density deployments
Efficient Coverage
What is Wi-Fi 6 (or 11ax) ?
11B11A
11G
11AC
11AX
11NWi-Fi 1Wi-Fi 2
Wi-Fi 3
Wi-Fi 4
Wi-Fi 5
Wi-Fi 6
Wi-Fi 6 is happening now
Fixed
Wireless
begins
Fixed
Wireless in
curb to
home/ SMBs
(5G WAN)
Massive
mainstream
5G NR
roll-outs
Carrier
rollout in
select cities
in US,
Japan,
China
Ubiquitous
in all major
cities in US,
EMEA,
Japan, China
First clients
First APs
Full-featured APs
Massive
proliferation
of clients
Wi-Fi 6
5G
Timeline to reach technology & ecosystem maturity
2023 and beyond2018 20202019 2021 2022
Wireless Market Transition
mobile devices in business by 2022;
12% CAGR12.3B
Wireless Laptops
Tablets and Phones
Printers and Scanners
WearablesAR, VR, smart watches
IoTRobots, infusion pumps, sensors
Audio and Video Teleconferencing, VoIP
Growth in business mobile traffic5-7X
iPhone 11 & 11 Pro
Samsung Galaxy A50
Microsoft Surface Duo
Dell Latitude 7200
Wi-Fi 6 Clients are here Today!
Intel ax200
5G and Wi-Fi 6 are complementary, but Wi-Fi 6 will continue to be preferred & primary wireless access in the Enterprise
New wirelesstechnology
Target applications
Data and experienceownership Enterprise owned
Outdoor IndoorCoverage Capacity, density
Outdoor + Indoor
Wi-Fi 6(802.11ax)
5G
Carrier managed
Optimization for
Transportation Outdoor Wireless AR/VR Apps Massive IoT Indoor Enterprise Retail
WiFi6802.11ax
Increased
Speed
Greater
Range
Power
Efficient
Reduced
Latency
Higher
Density
& Capacity
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco PublicPSOEN-2405
OFDMA – Using Subcarriers more efficientlyMaximizing Client Count – Lowering Latency
t3 t7t6t5t1 t2 t4 t8
User 1 - TelemetryUser 2 - Voip
User 3 - Video
User 4 - VoipUser 5 - Data
User 6 - IoTUser 7 - Data
User 8 - Voip
OFDMAOFDM
Each subcarrier is a transport - Latency goes up when subcarriers go out “half empty”… OFDMA solves this by allowing multi-user packets to go out on one subcarrier
• Each User gets 1 time slot – whole channel bandwidth
• Each User must wait t8 before Next TXop• As more clients Join the cell, Latency – Jitter
Increases• QOS only manages TXop – someone has to wait
• Multi user Packet makes flight more efficient• Also provides much more regular and consistent
TX_op• Deterministic nature – miss this truck – no worries here
comes another - “meaning the truck” is always leaving “full”… net result is lower latency
t3 t7t6t5t1 t2 t4 t8
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
802.11ax (OFDMA) provides determinism at scale:Enabling high-quality voice/video/data services cost effectively
Consistent DATA throughput
Wi-Fi 6 is not only cost-effective & ubiquitous but is now capable of delivering SLAs
Source: Cisco sponsored research
Source: Cisco sponsored
research
Wi-Fi 6 (ax)Wi-Fi 5 (ac)CBP*
*Cisco Best Practice
Client Count
Late
ncy
(ms)
Source: Cisco sponsored research
Linear VOICE delay
Wi-Fi 6 (ax)Wi-Fi 5 (ac)
Thro
ughput
(Mbps)
Client Count
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
802.11ax provides higher VOICE/VIDEO capacityLower latency at increased density
Wi-Fi 6 can achieve up to 3x the VOICE capacity over 11ac in High-Density (HD)
• With 11ac, as density (Clients/AP) increase from 25 (e.g. class room) to 50 (e.g. conference hall), latency increases 4x from an acceptable 50ms (99%-ile) to an unacceptable 200ms – unusable service!
• By leveraging OFDMA, delay is bounded to 50ms up to 75 Clients/AP resulting in 2- 3x the VOICE user capacity with high quality
Source: Cisco sponsored researchWi-Fi 6 (ax)Wi-Fi 5 (ac)CBP*
*Cisco Best Practice
Client Count
Late
ncy
(ms)
Source: Cisco sponsored research
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential802.11ax/Wi-Fi 6 is much more than speeds and feeds
Wi-Fi 6 provides plenty of advantages nowBuilt on the same wireless foundation as 5G
Enable next generation applications such as 4K/8K & AR/VR Video
3-4x more throughput than 802.11ac
Reduced latency and greater reliability with hundred’s of devices per AP
Up to 3x more power efficient at conserving battery life
Higher Data-ratesIncrease in network
capacityIoT at scale
Faster Device Adoption
Support new applications &
outcomes
Support new applications &
outcomes
Support new applications &
outcomes
Support new applications &
outcomes
G loba l
Sa les T ra in ing
Cisco DNA Center
And Why Cisco for Wi-Fi 6?
Catalyst 9800 Wireless Controller
new
Catalyst 9100 Access Point
Resilient Secure Intelligent
Cisco DNA Spaces
Unprecedented throughput with C9800 appliances
2xThroughput option now
available with C9800-80 going upto 80 Gbps
Always-on:High availability and
seamless software updates
Accuracy with Encrypted Traffic Analytics
and Stealthwatch integration
Catalyst 9800 Series Wireless Controller Appliances
C9800-40 and C9800-80
Open standards based programmability with
model-driven telemetry
Scale options for your campus
Programmable multi-core network processor
Investment protection with modular uplinks
99%+
Industry’s 1st
100GE uplink100
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
New Cisco Catalyst 9100 Series Access Points
DNA Assurance withiCAP
Integrated or external antenna SKUsBluetooth 5 USB
Mission criticalIdeal for small to medium-sized deployments
9117AX(Wi-Fi 6 compatible)
• 8x8 + 4x4• MU-MIMO, OFDMA (only DL)• Spectrum intelligence• 1 x 5 mGig• TWT (Non Triggered)• Integrated Antenna only
9115AX(Wi-Fi 6 certifiable)
• 4x4 + 4x4• MU-MIMO, OFDMA• Spectrum Intelligence• 1 x 2.5 mGig• TWT
9120AX(Wi-Fi 6 certifiable)
• 4x4 + 4x4• Cisco RF ASIC for Next gen CleanAir• Dual 5GHz, HDX• RF signature capture• IoT ready (Zigbee, Thread)• Container support for IOT apps• 1 x 2.5 mGig• TWT
Powered by Cisco RF ASIC
Shipping Shipping Orderable
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco RF ASIC – A long Rich History of Innovation
CleanAir: interference
detection and mitigation
WSM Module
Flexible Radio Assignment (Dual 5GHz)
FastLocate and HyperLocation –
Third radio
2010 2014 2016 2018 2019
802.11n
802.11ac wave 1
802.11ac wave 2
AP3500 AP3600 AP3800 AP4800
2012 2015
AP3700 C9120AX
Wi-Fi 6
AP3600iAP3700i
CiscoRF ASIC
Hyperlocation
WSSI Module
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco RF ASIC
Optimizing and
Enriching the Wi-Fi Experience
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Catalyst 9100, supporting IoT at scaleSuperior battery life for IoT and mobile devices
App registry
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
What’s New in Cisco Wireless
Innovation Beyond the Standard
Wireless Ecosystem
OpenRoamingConsortium
Spectrum intelligence & Interference/Rogue Detection
Wireless intelligence: Device analyticsRF AnalyticsLocation analytics
1 Billion Users with Google and Facebook
End point interoperability
Built for IoT & Security
IoT segmentation
Multilingual Access Points
Layer 1 RF Snapshot
Powered by Next Generation Cisco Catalyst Wireless Access
Custom ASIC
9100 9200/9200L 9300 9400 9500 9800
The Catalyst 9K Family
9600
and we continue to innovate...
9300L
9300-B
9300 Fiber
91159117
9120
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential G loba l
Sa les T ra in ing
Speed transition with Cisco Catalyst 9000End-to-end leadership with Cisco Catalyst access portfolio
Access switchesAccess pointsCore/aggregation
switchesWireless controllers
Cisco Catalyst9200, 9300, and 9400
Series
Cisco Catalyst9500 and 9600
Series
Cisco Catalyst9800 Series
Cisco Catalyst9100
1G
40 G40G/100G
Scalability, reliability, and security across the network
Built from the ground up for intent-based networking Automation Security Analytics
10 G25G/40G
1GMulti-gigabit
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
A holistic access networking framework is neededEnd-to-end portfolio, built from the
ground up for Intent-based Networking
Unified operations and pervasive segmentation
Access Switches
Access Points
Agg/CoreSwitches
Wireless Controller
Identity & Policy
Automation & Analytics
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
SD-Access
Software Defined Access
SDADNAC
Automated Underlay ProvisioningNo More Spanning Tree
No Specific Per Port ConfigurationNo Complex IP and VLAN ACL Management
Policy Automation for Users, Devices and Things
Segmentation Policy Analytics
DESIGN POLICY PROVISIONDNA Center ASSURANCE PLATFORM
Dashboard Group Based Access Control IP Based Access Control Application Traffic Copy
CardiacDefibrillators
InsulinPumps
VRGoggles
Laptop
PC
Patient Camera
NU
Nurse
HR
HRM
MR
MRI
EM
EMR
Create Policy by selecting Source, Destination, and applying a Contract
Policy Name*
IoT-Device-Policy
Available Scalable Groups Source
Destination
Scalable Groups
Scalable Groups
BPM
CardiacDefibrillator
Laptop VRGoggles
InsulinPump
BPM
DESIGN POLICY PROVISIONDNA Center ASSURANCE PLATFORM
Dashboard Group Based Access Control IP Based Access Control Application Traffic Copy
CardiacDefibrillators
InsulinPumps
VRGoggles
Laptop
PC
Patient Camera
NU
Nurse
HR
HRM
MR
MRI
EM
EMR
Create Policy by selecting Source, Destination, and applying a Contract
Policy Name*
IoT-Device-Policy
Available Scalable Groups Source
Destination
Scalable Groups
Scalable Groups
BPM
CardiacDefibrillator
Laptop VRGoggles
InsulinPump
BPM
DESIGN POLICY PROVISIONDNA Center ASSURANCE PLATFORM
Dashboard Group Based Access Control IP Based Access Control Application Traffic Copy
CardiacDefibrillators
InsulinPumps
VRGoggles
Laptop
PC
Patient Camera
NU
Nurse
HR
HRM
MR
MRI
EM
EMR
Create Policy by selecting Source, Destination, and applying a Contract
Policy Name*
IoT-Device-Policy
Available Scalable Groups Source
Destination
Scalable Groups
Scalable Groups
BPM
CardiacDefibrillator
Laptop
VRGoggles
InsulinPump
BPM
Financial analyst
HR
Accountmanager
Loan agent
Clients
Guest
Client records
Internet
Billing
Point of sale
IoT
Door locks
Segmentation Policy Analytics: System Flow
Netflow
Stealthwatch
ISE/ACA
Profiles
SGTs
ISE
Policy Export
ERSHost Groups
Segmentation Policy Analytics Phase1Discovery
Segmentation Policy Analytics Phase1Discovery
AI Network AnalyticsDNA Assurance
Getting Smarter with Cisco AI Network Analytics
AI-Driven Issue Detection and Insights
Intelligent Issue Detection & Analysis
Trends and Insights Comparative Analytics
AI-Driven BaseliningDefine Normal for a Given Network
AI-Driven Anomaly DetectionFind + Root Cause Complex Issues
AI-Driven Proactive InsightsPatterns and Systemic Deviations
• Proactive Exploration• System Generated Insights
AI-Driven Peer ComparisonCompare with Peers
AI-Driven Site ComparisonCompare Across Sites
Cisco Advantage: Best Data, Best Knowledge Base
Accurate Insights
Improved Performance
Cisco DNA Center
High Volume of Data: client, network, application, security
IPAM
CMXAppD
IPSLA
SNMP
OID
Telnet
DNS
MIB
Ping
CLI
DHCP
Wireless
AAA
SyslogRouter
NetFlow
Traceroute
Your Network
High Quality Telemetry:curated, real-time
High Diversity of Networks:local and global
35years of top engineering knowledge
Communities
Distinguished Engineers
Cisco Fellows
CX TAC
WorldwideData Platform
Anonymized DataAI/ML
Knowledge Base
supervised vs unsupervised, reinforcement/active learning,
adversarial or ensemble methods, Convolutional Neural Networks
Security AnalyticsStealthWatch
Encrypted Traffic Analytics (ETA): Use CasesVisibility and malware detection without decryption
How much of my digital business uses strong encryption?
• Audit for TLS policy violations
• Passive detection ofCiphersuite vulnerabilities
• Continuous monitoring of network opacity
Is the payload within the TLS session malicious?
• End to end confidentiality
• Channel integrity during inspection
• Adapts with encryption standards
Malware in Encrypted Traffic Cryptographic compliance
DemonstrationETA Security Analytics
Rapid Threat Containment(Mind Stone)
Breaches Are Expensive!
Average cost per data breach: $3.8 million
17,000 alerts receivedon average per week
Current industryaverage detection time:
200 days
Security teams investigate just 4
percent of warnings
Speed Stealth Sophistication
Breach
Multiple Products Don’t Work Together
Too Many Point Products
Too Much Information
Too Much Effort
Too Little Time
Rapid Threat Containment in Action
Network as an Enforcer ThreatSecurity Intelligence
Stealthwatch
SIEM
Firepower
Firewall
Custom Detection
ISEpxGrid
Switch Router Wireless DC FW DC Switch
Network
Get Answers FasterUse Cisco® Platform Exchange Grid (pxGrid) partner technologies to find threats faster
Stop Attacks FasterUse the network to contain attacks manually or automatically
Protect Critical Data FasterDynamically restrict access permissions or remove a device as its threat score worsens
~5 Seconds
Automatic or Initiated by IT Admin
Business InsightsDNA Spaces
They use behavior data of people and things as a strategic advantage
Retail Hospitality Transportation
Carpeted Enterprise Education Manufacturing
Digitizing Physical Spaces: People and Things
Cisco wireless delivers connectivity + business insights
See
Act
Extend
how people and things behave on site
on insights through digitization toolkits
platform capabilities to drive business outcomes
Unlock the Physical SpaceBlind Spot
Cisco DNA Spaces for Retail Banking
Personalize customer experience
• Intelligent guest wireless experience
• Improved customer experience and NPS
• Contextual engagement
• Interactive digital signage
Empower branch staff
• In-branch customer insights
• Mobile sales engagement
• Improve customer engagement in and outside of branch through enterprise integration
• Impact Analysis (A /B test) understand how events, changes in layout, promotions, etc. impact behavior.
Streamline branch operations
• Optimized branch connectivity
• Optimize staffing based on peak hours and days
Personalize customer experience
Branch Intelligence & Customer AnalyticsEmpower
branch staff
© 2019 Cisco and/or its affiliates. All rights reserved.
Streamline branch operations
Branch Intelligence & Customer Analytics
• Accelerate digital transformation
• Customer-centric branch transformation
• Better utilization of branch real estate and space
Paige AdamsFirst Visit
Connects to ‘Francisco Finance’ Wi-Fi & sees a branded captive
portal with a targeted offer based on localized campaign, App promotion, assistance,
cross sell products, etc.
CustomerAcquisition
Personalized Customer Experience
Acquire customer identity (Name, Phone #) to enable targeted selling strategies
Customer Onboarding &Targeted Engagement
Business Outcomes:
• Enhanced bank brand and loyalty
• Higher engagement and profitability
• Improved customer experience and NPS
• Acquire identity to enable targeted selling strategies
Customer Journey - Entry
Personalized welcome on Cisco Vision Digital Signage followed by
an ad tailored to the profile
Paige AdamsExit
Mobile Engagement - Customer Sentiment & Satisfaction
Business Outcomes:
• Capture customer sentiment and satisfaction
• Contextual Engagement
Customer Journey – Exit
Alan SpencerBank Manager
Business Outcomes:
• Provide branch staff with contextual notifications to foster targeted, informed conversations
• Improve customer engagement outside of branch through enterprise integration
• Unlock branch insights and trends on customer behavior
• Improve branch space utilization and layouts through visitor insights
Bank Manager Journey
Personalized Customer Experience
As Paige enters and fills in details on the captive portal, a WebEx teams
trigger is sent to the branch manager so they can welcome the customer.
Digital-Physical Integration for a holistic customer profile
In-branch customer Insights
Paige’s details are posted into the bank’s enterprise software
such as Salesforce CRM
Bring visibility to branch managers/regional managers on
customer behavior at their branches as well as how their branch(s) behavioral trends
compare to their peers.
(NEW!)
OpenRoaming: Collection of Identity and Access Providers
OpenRoamingIdentity Federation
Access Providers Identity Provider
Seamless, zero touch Wi-Fi for
users
Significantly more users
on your Wi-Fi
Get your customers connected, seamlessly and securely
Cisco is connecting a group of identity and access providers to enable seamless and secure wireless
roaming and onboarding
Access Providers Identity Providers
Cloud ProviderService Provider
Device Manufacturer
EnterpriseConsumer
Large Venue
Secure authentication
on a secure SSID
Encrypted ThreatAnalytics (ETA),MACsec 256-bit,
Cisco TrustworthySystems, Full NetFlow
Catalyst 9KWireless & Switching Innovations
Enterprise IoT Convergence
AVB/UPoE/FastPoE/Perpetual PoE/
CoAP (RFC 7252),SD-Bonjour, IoT device
profiling
Advanced SecurityCapabilities
Future Proof
Industry-leading,optimized for Wave 2,mGig density, next-gen
Wi-Fi (IEE802.11ax)100W PoE (IEEE
802.3bt)
x86 CPU, 100%model-driven, software
patching, gracefulinsertion and restart,
secure container-basedapp hosting, ISSU
First in Enterprise
Centralized Administration, Secure Segmentation via Group-
based Policy, Proactive Monitoring and
Management, Automated no-touch configuration
SD-Access
Assurance
Base Automation
Assurance and Threat Detection
SD-Access& Cross Domain
Manual Operations
Enhance Security & Compliance, Reduce Risk
Improve Workforce, Customer Experience
Boost Operation Efficiency Futureproof Open Platform for Innovation
Futureproof Your NetworkShift IT Time to Business Focus
✓ ✓ ✓ ✓
Cisco DNAIntent Based Network