Cisco Blogs

Cisco Blog > SP360: Service Provider

Closing the Small Cell Loop


We are in the midst of exciting times. As the small cell industry gathers here in London for the annual Small Cells World Summit, I’m delighted to welcome the world-class team from Ubiquisys into Cisco.  At the same time, we’re announcing the formation of a new Small Cell Wireless Backhaul Ecosystem with the top vendors in the industry.

Let me start with an introduction, since this is my first SP 360 blog.  I’m the VP/GM of the new Cisco Small Cell Technology Group.  Cisco has been investing in both internal engineering development and external acquisitions in small cell technology for several years now, and this moment marks a milestone in our long-term strategic plan.

We have the industry leading carrier-grade SP Wi-Fi solution, and one of the largest residential femto deployments with over 1 million devices deployed by AT&T.  We’ve learned a great deal over the years about how to rapidly deploy licensed and unlicensed small cells with zero touch provisioning, keeping costs low and customer satisfaction high.

We’ve been partnering with Ubiquisys for quite some time because we see them as industry leaders and in fact one of the founders of the small cell industry.  Now that we have their expertise in-house, we’re able to rapidly roll out an expanding portfolio of licensed small cells to meet the widening array of deployment needs.  This also means that we are adding decentralized SON capability to our centralized SON proficiency gained through the recent Intucell acquisition.

In February we announced the ASR 901S, a small cell backhaul router that brings hardened network intelligence into some of the more challenging environments where small cells are being deployed.  Today we are announcing Read More »

Tags: , , , , , , , , , , , , , ,

Securing the Internet of Everything: An Architectural View

As a follow up to my introductory blog on Securing the Internet of Everything, I would like to discuss further the security implications that will comprise proposed framework. As the applications of the IoT/M2M affect our daily lives, whether it is in the Industrial Control, Transportation, Smartgrid or Healthcare, it becomes imperative to ensure a secure IoT/M2M system. As the use of IP networks are employed, IoT/M2M applications have already become a target for attacks that will continue to grow in both quantity and sophistication. Both the scale and context of the IoT/M2M make it a compelling target for those who would do harm to companies, organizations, nations, and people.

The targets are abundant and cover many different industry segments. The potential impact spans from minor irritant to grave and significant damage and loss of life. The threats in this environment can be similarly categorized as those in the traditional IT environments. It’s useful to consider general platform architecture when discussing IoT security challenges. Below is the platform architecture that uses to frame IoT/M2M discussions.

While many existing security technologies and solutions can be leveraged across this architecture, perhaps especially across the Core and Data Center Cloud layers, there are unique challenges for the IoT. The nature of the endpoints and the sheer scale of aggregation in the data center require special attention.

The architecture is composed of four similar layers to those described in general network architectures. The first layer of the IoT/M2M architecture is comprised of Read More »

Tags: , , , , , , , , , , , ,

The 2017 Internet: A Look at the Future, Courtesy of the Cisco VNI Forecast

Visualize this: nearly half the Earth’s population – 3.6 billion people – connected to the Internet for communication, commerce, education, information, and entertainment.  Think that’s too futuristic? Think again. By 2017, less than five years from today, that will be our reality.

This prediction is one of several key findings from the newly released Cisco Visual Networking Index, 2012-2017, a highly regarded annual forecast of global Internet Protocol (IP) traffic now in its seventh year.

Let’s explore further the Internet of 2017, as projected by the updated VNI Forecast.

By 2017, IP traffic volumes and regional growth will continue to impress: Read More »

Tags: , , , , , , , , , , , , , , ,

BYOD Spells Opportunity for Service Providers

There’s no doubt that BYOD—“bring your own device”—is a huge and growing phenomenon throughout the world. Recent research by the Cisco® Internet Business Solutions Group (IBSG) looked at BYOD and its economic impact in six countries: the United States, United Kingdom, Germany, China, India, and Brazil. In these countries alone, the number of BYOD devices is expected to more than double by 2016, to 405 million.

Clearly, introducing all those personal smartphones, tablets, and laptops into the workplace is causing complexity and uncertainty for many businesses. There is a strong appetite for BYOD, but our research shows that implementation has been largely reactive, resulting in a patchwork of ad-hoc capabilities and policies. Without a comprehensive approach, most companies are not realizing the potential value of BYOD—especially small or midsize businesses that do not have the IT resources or sophistication to manage all that complexity.

Enter the service provider (SP). BYOD opens the door to a number of SP opportunities: Read More »

Tags: , , , , , , , , , , ,

Summary: Securing the Internet of Everything: An Introduction

I recently kicked off a series about security and the Internet of Everything, a pivotal topic that starts with the roots of IoE, IoT and M2M, which I explore in more depth in the first post.

Machine-to-Machine connections make up a huge portion of the Internet of Things, both general concepts for the network infrastructures that link physical and virtual objects. These abstractions come together on IoE, making it possible for devices to orchestrate and manage the world we live in, as they become connected entities themselves.

But to fully discuss security on the Internet of Everything, we must first go back to the roots of IoE itself. The technology innovations that employ M2M and IoT were actually spun off from military and industrial supply chain applications. As IP became a more common communication protocol, IoT gained more traction, helped even more by the creation of IPv6 and other advancements in wireless technology. As ever-increasing data is captured and distributed on these networks, more intelligence is generated.

Read my full “Securing the Internet of Everything: An Introduction” blog post to learn more about this embedded intelligence that is a core architectural component of IoT, and how it informs the security for the Internet of Everything itself. And stay tuned! I have more for you to come in this series, including a look into IoE security framework.

Tags: , , , , , , , , , , ,