Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 1
SP Cloud – M2M ServicesJean-Pierre Muzard
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
The NIST Definition of Cloud Computing identified cloud computing as a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
IP-VPN
Network as a Servicepublic internet
XaaS
3rd
partySaaSclouds
IP-VPN with
• security
• application Acceleration
• guaranteed SLAs
Infrastructure-aaS
Unified Communication - aaS
Software aaS
CRM -aaS
Scalable on-demand
computing resources
Software aaS
Access from any
devices, any places
End to e
nd S
LA
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Space, Power, B/W
Hosted / InfrastructureOn-PremiseServices
(Application Relevance)
Service ProviderInfrastructure
Consulting
Application Relevance
Service Provider Utility and or
Third Party SaaSInfrastructure
CustomerOperating System
CustomerInfrastructure Service Provider
Infrastructure
Computer, Storage,and Network
ConsultingBusiness Process
Integration(Business Relevance)
Co-location
IaaS
Business Continuity
CollaborationServices
SingleTenant
On demand compute storage
Voice Services
UnifiedMessaging Team
Spaces
IMPresence
WebConf.
ApplicationSurvivability
Storage -aaS
DRaaS
Application Visibility Control
Optimization VPN Cloud
extension
Consulting
Application Relevance
Service Provider Utility and or Third Party SaaSInfrastructure
Business ProcessIntegration
(Business Relevance)
BusinessApplications
Desktop-aaS
CRM ERP
EmailSecurity
Backup -aaS
Data Centers
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Public
Cloud
Virtual
Private
Cloud
Service-level commitments focus
on computing resources only:
• Server availability, typically 99.9%
• Successful HTTP transactions —
99.9%
• Apps query response time <300ms
• Local network availability
• Latency, jitter and packet loss
guarantee among servers
Service-level commitments
incorporate computing resources and
network:
• Server availability, >99.95%
• Network availability up to 99.99%
• Latency 30-300ms, jitter <10ms and
packet loss <1% guarantee across the
WAN
• Application response time across the
WAN, such a 30ms guaranteed
Vendor's business model
does not go beyond data
center
SP's business model
goes beyond data center
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
CloudApplications
/ Services
Cloud Based Services value-add to
Network Services
Cloud Services Secured and
Optimized by Network Services
Security
Performance
Availability
Cloud
Intelligent
Network
Customer
Customer
Customer IP-NGN
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
• What is it?
Connected things, not connected people.
Device data tracked and aggregated by some application on a server somewhere.
Fixed-line or mobile connectivity.
• Lot of industries …
Healthcare: providers can use M2M for remote patients monitoring
Security: M2M technology allows people to wirelessly monitor
Transportation: M2M communication works with GPS to track vehicle
Utility: M2M technology can help improve energy efficiency
• Benefits for companies that use M2M technology include:
Increase Revenue from delivering new service offerings
Greater efficiency from real-time monitoring and management
Reduce costs and Environmental benefits based on remote operations and less travel
M2M improves the lives of human, helps businesses thrive, and brings
communities together all over the world.
Telematics
Smart meters
Smart vending
mHealth
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Network
Connectivity, Transport
Software
Middleware and Application Infrastructure vendors
M2M
Ecosystem
AT&T, Cisco Systems, CrossBridge
Solutions, Iridium, Jasper Wireless,
KORE Telematics, Numerex,
Orbcomm, Orange Business Services,
Sprint, Telefónica, Telus, T-Mobile,
Verizon Wireless, Vodafone, Wyless
Accenture, Atos Origin,
Capgemini, CSC, Deloitte,
HP, IBM, Logica, Tata
Consultancy Services
Services- System Integrators
Business Process, Application Integration
Hardware
2G, 3G, 4G module/embedded device, GPS/ RFID sensors, actuators, etc.
Axeda, Echelon, ei3, GE,
Honeywell, IBM, MedApps,
Oracle, Qualcomm, SAP,
SensorLogic, Tridium, Trimble,
WebTech Wireless
AeroScout, Cisco Systems,
CinterionWireless, Coronis,
Crossbow Technology, Ember,
Honeywell, Intermec, Laird
Technologies, Lantronix,
Motorola, Navman Wireless,
SaviTechnology, Sierra Wireless,
SIMCom Wireless Solutions,
Sixnet, Texas Instruments
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Big Picture Architecture OverviewC
ell
ula
r
Op
era
tor
Ap
pli
ca
tio
ns
As
se
t
(Sen
so
r)Applications
mHealth/ Fleet
Management / Industrial
Automation
M2MCloud
Data Center/Virtual Servers/ Asset
Monitor/ Remote Management/ Storage /
Rule Engine/ Service Delivery Platform
Business Services
SAP/ Oracle
M2M
Clo
ud
Se
rvic
e
Mobile Operator
SIM Provisioning, Usage BillingSys
tem
s I
nte
gra
tors
3G/4G
3G/4G
3G/4GWiFi
WiFi
Thank you.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Cloud to Cloud
Connect
Cloud to
Customer
Connect
Network
Management
Optimized Interaction
Between Clouds
User Experience Assurance and
Security
Management Network and Automation
Public
Private
Cloud
Intelligent
Network
C
N S
C
N S
C
N S
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Motivation for LAN Extension & Technologies
• High Availability / Geo Clustering
• Active/Active DCs
• VM portability (Vmotion)
• Storage
• OptimizationSP DC1 SP DC2
EntDC1 EntDC2
SP NGNDCPE
DCPE
DCEDCE
PE PE
CE CE
Enterprise Data Centres inter-connect
Enterprise Data Centres to SP Data Centres
Provider Data Centres to SP Data Centres
VSS &vPC or FabricPath/TRILL
OTV
EoMPLS &A-VPLS & H-VPLS
Ethernet
IP / MPLS
MPLS
VLAN Extension Path OptimizationInbound: LISP or GSSOutbound: FHRP
Storage ElasticityNetApp FlexCacheEMC VPLEX Metro w/ MDS
Virtual NetworkingServicesNexus 1000VASA 1000VVSGVMWare ESXI
Data Replication OptimizationWaasVirtual Wass
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
MPLS VPN
Enterprise 2
Site 1
PE PEPE
CE CE CE• Internet is used from
Cloud Provider Data Center to customer MPLS VPN sites
• Cloud Service Router(CSR) in the Cloud Provider DC act as an IPSec endpoint.
• PE is performing IPSec to customer MPLS VPN mapping at the edge of the MPLS VPN network
Multi-Tenant On-Demand VPN service extension to Cloud Services
Enterprise 1
Site 1Enterprise 1
Site 2Enterprise 2
Site 2
CE
Virtual SW
ETH
CSR CSR
vNIC
vETHvETH
vNIC
Internet
PE
Cloud Provider Data Center
IPSec
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
MPLS VPN
Enterprise 2
Site 1
PE PEPE
CE CE CE
• End to end Cloud to Customer MPLS VPN
• Cloud Service Router is acting as CE router connected to the customer MPLS VPN, GET VPN can be offered as an option for encrypted MPLS traffic
• Alternatively CSR could act as a PE when inter AS would be needed
MPLS VPN End to end Multitenant Isolation
Enterprise 1
Site 1Enterprise 1
Site 2Enterprise 2
Site 2
CE
Virtual SW
ETH
CSR CSR
vNIC
vETHvETH
vNIC
PE
Cloud Provider Data Center
CE to PE
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
User Experience Assurance for Public, Private, and Hybrid
MSP Requirements
• Differentiate MSP’s cloud hosting service through better visibility, prioritization, and SLA
Cisco Solution
• Cisco Application Visibility & Control to provide visibility into Cloud services (MSP’s cloud and Customer private Cloud), application aware QOS.
• Application acceleration
• Integrate with MSP’s reporting and provisioning system
MSP Benefits
• Attract more customers to MSP cloud
• Better visibility into services and their performance to maintain SLA
MPLS
Branch Office Branch
OfficeBranch Office
Internet
MSP Cloud
MSP Customer Portal
Select High
Priority App
Top N App
App Transaction Time
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Single console for all VMware vSphere Hypervisors• Extend virtualization management from the data center to the branch
• Centralize control and visibility at every level of virtual infrastructure
• Streamline, standardize, and automate remote server infrastructure
Branch Office
UCS Express
Branch Office
UCS Express
Branch Office
UCS Express
Data Center
UCS
VMware vCenterTM
Server
Cisco UCS Express
Residual compute platform with all-in-one device convergence for hosting applications that defy centralization:
•Core Windows Services
•Mission Critical Business Applications
WAN/Internet
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Context-aware policies and enforcement
Trusted architecture
Secure cloud segmentation
Secure access and mobility
Secure application traversal
Context-Aware Security via SecureX for Public, Private, Hybrid
Secure Cloud-to-Customer Connect
Attributes
Integrated Threat Defense
Cisco TrustSec® Identity-Based
Control
Cisco®Security Intelligence Operations
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
CUBE-SP
(ASR 1000)
Predictable Quality of Experience and Service Survivability
PGW
AS5400
Cust A CustC CustB
Aggregation
Layer
UC
Layer
(DC)
HCS WAN HCS WAN
Survivability
Voice survivability
Voicemail survivability
On premises call control
Local PSTN breakouts
Performance
Metrics for voice/video traffic
Acoustic and noise cancellation
Local Voice/Video conferencing
Optimization of voice/video traffic
End to End QoS
Security
Session Border Controller/Firewall
Separation of voice traffic from other
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Applications /Desktop OS
MS Office
Unified Virtual Desktops, Voice, and Video Services differentiation
Virtualized Data Center Virtualized
Collaborative Workspace
Thin Client Ecosystem
ACEUnified
CM
Quad
ASA
Nexus
1000v
Virtual Security Gateway
WAAS
Cisco CollaborationApplications
Hypervisor
Desktop Virtualization Software
Storage
Cisco Clients
Cisco Virtualization Experience Clients
Cius Business Tablets
AnyConnect
Compute
UCS
WAAS
Virtualization-Aware
Network
Routing PoE
Switching
SiSi
CDN
End-to-End Security, Management and Automation
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Cisco® Management StackBroad Partner Support
Computing Network Storage Computing Network Storage
User Portal
Service Catalog
Orchestration
Operations
Workflow
Cisco Network Services Manager
Cisco Cloud
Portal
Service Catalog
Cisco Process
Orchestrator
Cisco Network Services Manager
Others
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Market Category M2M Solution Examples
Insurance (Telematics) GPS, wireless
modules
Building or Home Management
Smart Appliances
Industrial Monitoring and Automation
Industrial Asset Monitoring
Fleet Management
(Telematics)Vehicle Asset
Monitoring
Public Safety and Security
Environmental Asset Monitoring
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Market Category M2M Solution Examples
Oil and Gas Solutions
Equipment Monitoring
Healthcare and Life Sciences
Remote Diagnostics
Transportation (Telematics)
Vehicle Management
Retail Sector Point-of Sale, Vending
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Solution Components
The Cisco ISR 819 M2M Gateway, which comes in hardened and non-hardened versions and provides highly secure data, voice, and video communications to stationary and mobile network nodes across wired and wireless links. It supports up to 3.7G wireless WAN speeds and offers a cost-effective, rapidly deployable, reliable, and secure primary connection solution.
A scalable service management platformto manage M2M devices and the ―The Internet of Things‖ that encompasses not only mobile M2M, but M2M applications based on wireless sensor networking technologies, items with radio frequency ID (RFID) tags, and other wired and wireless technologies.
The external M2M endpoints, such as sensors and RFID tags that collect data and monitor status of environments.
M2M application software and infrastructure to address the specific needs of vertical markets, which service providers can obtain through partnerships with these vendors.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Compact Hardened Services-Rich
Built for Challenging Environment
– Shock and Vibration, Humidity,
Splash Water, Temperature, Dust
IOS-Based – ISR Compatible,
Secure native SMS Gateway with
GPS Support
Industry’s Most Compact
Hardened M2M Gateway with
Dual SIMs
BENEFITS: Flexible operations with ease of installation/deployment and lower TCO
Cisco ISR 819
Increased revenue with new business models
Greater efficiency with remote real-time monitoring with existing management
Mobile IP and IPv6Ready