Cisco Blogs


Cisco Blog > The Platform

The 2017 Internet: A Look at the Future, Courtesy of the Cisco VNI Forecast

Visualize this: nearly half the Earth’s population – 3.6 billion people – connected to the Internet for communication, commerce, education, information, and entertainment.  Think that’s too futuristic? Think again. By 2017, less than five years from today, that will be our reality.

This prediction is one of several key findings from the newly released Cisco Visual Networking Index, 2012-2017, a highly regarded annual forecast of global Internet Protocol (IP) traffic now in its seventh year.

Let’s explore further the Internet of 2017, as projected by the updated VNI Forecast.

By 2017, IP traffic volumes and regional growth will continue to impress: Read More »

Tags: , , , , , , , , , , , , , , ,

Setting Up an IPv6 Testing Plan

May 28, 2013 at 1:30 pm PST

In my previous blog, I talked about building out a lab to help with IPv6 integration testing.  It cannot be understated how important it is to test any new feature that is going to be deployed on the network.  This statement is true independent of the feature involved.  In this case, we are talking about IPv6, but we could just as easily be talking about virtualization or BYOD.

So now that we have the lab build up in progress, what’s next?  Read More »

Tags: , , ,

Summary: Securing the Internet of Everything: An Introduction

I recently kicked off a series about security and the Internet of Everything, a pivotal topic that starts with the roots of IoE, IoT and M2M, which I explore in more depth in the first post.

Machine-to-Machine connections make up a huge portion of the Internet of Things, both general concepts for the network infrastructures that link physical and virtual objects. These abstractions come together on IoE, making it possible for devices to orchestrate and manage the world we live in, as they become connected entities themselves.

But to fully discuss security on the Internet of Everything, we must first go back to the roots of IoE itself. The technology innovations that employ M2M and IoT were actually spun off from military and industrial supply chain applications. As IP became a more common communication protocol, IoT gained more traction, helped even more by the creation of IPv6 and other advancements in wireless technology. As ever-increasing data is captured and distributed on these networks, more intelligence is generated.

Read my full “Securing the Internet of Everything: An Introduction” blog post to learn more about this embedded intelligence that is a core architectural component of IoT, and how it informs the security for the Internet of Everything itself. And stay tuned! I have more for you to come in this series, including a look into IoE security framework.

Tags: , , , , , , , , , , ,

Setting up an IPv6 Lab

May 20, 2013 at 4:31 am PST

I’ve blogged (a lot) about planning for the integration of IPv6 into your network, and I even threw in some thoughts about how to go about doing the integration.  Some of the procedures discussed in earlier posts included:

Equally important is the task of setting up a lab and (in our next post) developing a test plan. Read More »

Tags: , ,

Securing the Internet of Everything: An Introduction

Towards developing a Secure Architecture for the Internet of Everything, I plan to kick off a series of blogs around this pivotal topic.

In discussing security and the Internet of Everything, the first question that comes to mind is, “Which segment of “everything” is one referring to?”. A reasonable approach has been to understand the common attributes that crosses vertical segments such as Intelligent Transportation, Smart Utilities, Industrial Automation and so on. The Internet of Things (IoT) and Machine-to-Machine (M2M) are general abstractions for the network infrastructure that links physical and virtual objects. In Cisco, we now refer to these abstractions as the Internet of Everything, IoE. The IoE describes a world where billions of objects have sensors to detect, measure and assess their status; all connected over public or private networks using standard and proprietary protocols.

Until a point in time around 2008/2009, there were more human beings in the world than devices connected to the Internet. That is no longer the case.  Read More »

Tags: , , , , , , , , , , ,