As more and more users and devices are connecting to the network via WiFi, Cisco has been focused on creating the best wired network to enable mission critical wireless:
In 2013, we introduced Catalyst 3850 & 3650 Stackable Converged Access Switches for wired & wireless networks. These switches simplified networks by combining separate wired and wireless networks into a single platform. This simplification makes IT agile. These switches also enabled a better user experience through deeper application visibility across wired and wireless with Cisco Flexible NetFlow. Click here to see an interactive demo showing the other benefits of our converged access switches.
In 2014, we expanded the converged access portfolio by introducing Converged Access on Catalyst 4500E, our lead modular access platform.
Today, we take the next big step in our wireless strategy by introducing Cisco Catalyst Multigigabit technology across several campus switches: Catalyst 4500E, 3850 and 3560-CX.
So, what problem does Cisco Catalyst Multigigabit technology solve? Read More »
Networking environments can be harsh. Outdoor environments are often harsher!
Do not try this at home. When testing your Cisco switches for high availability capabilities, we recommend not setting them on fire, crashing into, or flooding them with water. However, we do have some experience with these situations and our switches keep running.
The network must operate 24 hours a day. With many devices and applications running on the network, oftentimes a few seconds of downtime can mean tens of thousands of dollars in financial loss. And yet, none of these usual measures for uptime take into account an actual physical disaster. Indeed, seldom do people think about what could happen to their switches in the physical environment that they are being deployed.Read More »
Cisco will host a live webcast on Wedn November 13, 2013 to discuss BYOD, mobility, security and how Cisco access switching address these customer needs. If you are reading this blog, there is a good chance that your work is somehow related to these critical areas. To test how widely BYOD, mobility and security impact IT professionals, I’ve used an unscientific way to check it out on several popular online IT web sites. I want to see if they consider at least one of these areas to be their main focus. Here’s what I’ve found – many of them (although not every single one) are devoted to at least one area. Read More »
In my previous blog, we looked at how Catalyst switches can be used to assess video application readiness in the network before rolling out a video based collaboration application. In this blog, let us take a look at available tools on the Catalyst switches to monitor and troubleshoot video problems in the network.
As we know, fundamentally, video traffic is different from data traffic. Video traffic is more dynamic and bandwidth intensive and even small changes in delay or loss can cause visible disruptions to user experience. Routinely, IT trouble tickets are opened by users that are faced with degraded video experience. To add to that, interactive video is real time. Any delay in troubleshooting will make IT miss the window to rectify the problem. For a firm with many locations and buildings, finding the problem can be complex and time consuming without the right tools.
What is Flexible NetFlow and why should you use it? In this blog post, let’s take a look at the basics of Application Visibility in the network for capacity planning and security.
In an enterprise, hundreds of applications are accessed by users from different locations within the campus and remotely from a branch or home. The application usage is usually not known beforehand and increases non-uniformly over time. This non-uniform app usage translates to non-uniform increases in traffic across the network which complicates capacity planning. Another complexity to capacity planning is that there can be sudden spikes in the traffic due to security issues such as internal security breaches, viruses, Denial of Service attacks, or network-propagated worms. IT administrators should not wait for these incidents to happen in order to tackle them. Instead, administrators must have the ability to see the usage pattern in advance for capacity planning and security incident detection and remediation.