Cisco Blogs


Cisco Blog > SP360: Service Provider

Cisco Continues Market Share Leadership in Mobility – First in Mobile IP Infrastructure, Packet Core, Mobile Backhaul, and Mobile IP Core

Over the summer, we shared with you the results of an ACG Report showing Cisco as the market share leader in Mobility.

Then and today the usage of mobile devices has been on the rise. Unequivocally.

The average smartphone user is accessing 26.8 apps every month for about 30.25 hours, an increase of 65 percent from two years ago. On their first weekend of offering the iPhone 6, Apple sold more than 10 Million units. Global smartphone market is forecasted to rise by around 20% to 1.2 billion units during 2014.

ACG Research came out with a new report recently the highlights of which I want to share with you. In this report Ray Mota notes that the Worldwide Mobile IP Infrastructure Market continues to rebound in Q2, 2014. It actually grew in Q2, increasing to $1.25 billion, a 9.6 percent quarter over quarter. Evolved Packet Core (MME, PGW, SGW, and PCRF) also grew this quarter to $123 million, a 7.2 per cent quarter over quarter.

ACG Research maintains its views that online video continues to fuel mobile data traffic and the industry expects a tenfold increase in five years.  Mobile spending continues and is increasing globally as carriers in developed countries vie for top billing for fastest carrier, fueling LTE spending. 3G remains strong and continues to grow as developing economies upgrade and invest in this technology. Mobile infrastructure will continue to be a highly dynamic market for the next several years as vendors and carriers work through new technologies.

Cisco maintains its position of market share leader. The Read More »

Tags: , , , , , , , , , , , , , , ,

A Cisco Customer Solutions Architecture (CSA) Use Case in How to Manage Threat Defense

This is part 4 of the “Your Business Powered By Cisco Customer Solutions Architecture (CSA)” blog series.

Enabling & Delivering Cloud-based Security Services -- Managed Threat Defense

Many enterprises (30%) have been leveraging cloud services cautiously or only in an internal (private) cloud manner. The reasons for this vary but these are the most common:

  • IT applications (~80%) are not cloud enabled i.e. traditional client server apps or non-x86 apps
  • Perceived security and performance concerns
  • Perceived lack of control and loss of IT governance and policy

While these reasons are valid, the evolution of cloud services and the ability to transform traditional IT services, governance, and policy controls mean this Cisco CSA can now address these reasons.

This use case example focuses on Security because it is a major consideration for most customers.  The market growth for security is driven by increased demand for security applications such as network security and “confidentiality” of services.  Security services are seen as an emerging market and are expected to grow to $40B by 2017.  Managed Threat Defense is projected to be $3.7B of that $40B. Read More »

Tags: , , , , , , , ,

Cisco Succeeded in Network Functions Virtualization System Trial

I’ve had the opportunity this year to meet with mobile operator leaders from around the globe. Whether they are large or small, focused on consumer services or businesses, or engaged in video or mobility, their ambitions are much in line with our strategy: to help them monetize and optimize their networks, while accelerating their ability to deliver their services.

As mobile operators are deploying new technologies to help achieve their business outcomes, “virtualization” is often touted as the answer, and, in part, that is correct. At Cisco, we believe it is important to frame the discussion properly in order to reap the full benefits of what’s possible in networking.

The network is increasingly becoming virtualized, and virtualization is increasingly becoming networked. Virtualizing applications is an initial step that can provide some advantages. However, Read More »

Tags: , , , , , , , , , , , , , ,

Intelligent Transportation Systems Require Intelligent Mobile Networks

At the ITS World Congress last month in Detroit, we saw a wide range of intelligent transportation solutions and concepts. The most popular solutions on display –presented by several Auto Manufacturers, ITS suppliers, and Cisco along with partner Cohda Wireless – were simulated and live Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) demonstrations, which showed how vehicles will communicate to each other and to roadside infrastructure in the not-too-distant future. A key goal of V2V and V2I is safety, for drivers and pedestrians, as vehicles will be able to synchronize their movement with traffic lights, roads, toll plazas, rail crossings and of course other cars.

Cisco also showed how Connected Transportation solutions can leverage the intelligent – and virtualized – mobile core network. We demonstrated a [fictional] after-market connected car application (“CarConcierge”) that enables users to remotely start or unlock their car, do a car “health check,” and extract car-sourced analytics over an LTE mobile network. The demonstration showed how the Connected Transportation market will see an explosion of innovative new applications that mobile operators can monetize by providing secure, intelligent, and cost-effective connectivity and process automation to devices and vehicles.

Watch a video summary of the Cisco demonstration: Read More »

Tags: , , , , , , , , , ,

A Deep Dive in the Role of Each of the Cisco Customer Solutions Architecture (CSA) Layers

This is part 3 of the “Your Business Powered By Cisco Customer Solutions Architecture (CSA)” blog series.

Physical Infrastructure Layer

The physical infrastructure layer is where the physical resources reside. This includes equipment typically used in a data center such as network devices (switches, routers, firewalls, and load balancers), computing resources, storage and facilities.  Physical infrastructure products and the connectivity to the cloud, customer networks, partners and cloud brokers are secured in this layer.

Virtual Infrastructure Layer

The main purpose of this layer is to abstract the underlying physical resources into pools of logical resources with attributes and service assurance parameters. In addition, it greatly simplifies management processes, accelerates service delivery to market, and reduces operating expenses.  Simplicity of provisioning and management along with security can be obtained by creating many logical networks from one physical network.  The physical infrastructure layer is virtualized using various methods (hypervisor technology, Application Centric Networks, etc.) into a virtualized infrastructure layer. This is analogous to creating VLANs within a physical LAN.  The Resource Abstraction and Control functionality in this layer views the physical layer in a more holistic fashion by allowing the orchestration, network and security controllers to enforce appropriate policies to the traffic and the underlying network infrastructure.

Service Layer

The Services Layer is Read More »

Tags: , , , ,