Cisco Blogs


Cisco Blog > SP360: Service Provider

Cisco’s Visual Networking Index: Understanding the Evolution of Internet Users, Devices and Connections

Today’s networks are an essential part of business, education, government, and home communications. Many residential, business, and mobile Internet Protocol (IP) networking trends are being driven largely by the combination of video, social networking, and advanced collaboration applications, termed “visual networking.”  In fact, total Internet traffic has experienced dramatic growth in the past decade alone. Take a look at this interactive infographic from Cisco that shows key trends and forecasts the growth of global IP traffic from 2013 to 2018. You can choose a category and filter the geographic regions in the map to view the impact of global IP traffic. According to Cisco’s Visual Networking Index (VNI), globally, there will be 20.6 billion networked devices by 2018, up from 12.4 billion in 2013. VNI is part of Cisco’s ongoing effort to forecast and analyze the growth and use of IP networks worldwide. VNI also forecasts that global Internet Protocol (IP) traffic will increase nearly three-fold over the next five years due to more Internet users and devices, faster broadband speeds and increased video viewing. Global IP traffic for fixed and mobile connections is expected to reach an annual run rate of 1.6 zettabytes – more than one and a half trillion gigabytes per year by 2018.

So who and what are responsible for the projected increase in overall internet traffic?

Read More »

Tags: , , , , , , , , , , , , ,

Have Global IPv6 Deployments Really Slowed Down?

For those that are not closely involved with IPv6, it may seem like the emphasis on migration to the new addressing scheme is waning. But while the hue and cry over IPv6 may appear to have quieted down to a background noise since 2010-2011; a closer inspection would prove that perception to be quite false.

What is IPv6 and why does it even matter? Simply put, when a device is on the Internet, it has its own specific address that it uses to communicate with other devices and the Internet and to define its location. With the non-stop growth of devices connecting to the Internet and the “Internet of Everything” (IoE) becoming a reality, the need for unique addresses for each personal device and machine-to-machine (M2M) connections has increased exponentially. To put this in perspective, the Cisco Visual Networking Index (VNI) 2013-2018 forecast estimates that there will be about 4 billion Internet users by 2018, which is 52% of the world’s projected population (7.6 billion people). And for every person on the Earth in 2018, there will be about 3 global Internet connections — that’s more than 21 billion devices/connections by 2018.The current communication and address format IPv4 was just not equipped for this explosive growth of devices and connections and the need to define addresses for each device. Hence the need for a new communication protocol, IPv6.

2

(Source: Cisco Visual Networking Index (VNI) 2013-2018)

On 3 February 2011, the last batch of IPv4 address blocks was Read More »

Tags: , , , ,

3 Steps for Best-in-Class Wi-Fi

If you are a professional photographer or even an amateur like me, you want to have ready access to various control dials on your camera to capture the moment perfectly. Professional cameras provide high level of control to get the best outcome. But there are times when you want to put the camera and the lens in Auto mode or wish that the camera could automate some decisions that make your workflow easier.

Likewise, Cisco Wireless LAN products provides the level of quality, functionality and control that is unmatched and hands-down the best enterprise wireless networking portfolio in the industry. But there are scenarios where it is preferable to expedite wireless configuration with best practices automatically enabled and easy access to data to simplify monitoring and troubleshooting workflow. For example, a small business owner manages his own network or in a K-12 a librarian acting like a part-time IT administrator. This not only provides operational efficiencies for the IT organization but also improves end-user and partner experience.

Cisco WLAN Express Setup is an attempt in this direction. It is now available on 2500 Series Controller (CT2504) starting with software release 7.6.120.0.

It includes three components

  • Easy-to-use setup wizard: This eliminates the need for console cable and command line setup. Instead, 3-step web-wizard is used to quickly boot strap a Controller and configure employee and Guest WLAN out of the box.
    Day0 Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

The Summer Blockbuster You’ve Been Waiting For: Cisco Wireless Release 8.0

Cisco Wireless Release 8.0 is now available: Product Bulletin 

The Cisco VNI Global Mobile Data Traffic Forecast, 2013 – 2018 revealed some stunning trends with growth projections that are sure to have a dramatic impact on wireless networks worldwide.

In 2013, globally, there were nearly 22 million wearable devices generating 1.7 petabytes of monthly traffic. There were about 7 billion mobile-ready devices and connections with mobile network connection speeds that have more than doubled, to 1.4Mbps up from 526 Kbps in 2012.

By 2018, there will be more than 10 billion mobile-ready devices and connections. The average mobile connection speed will nearly double, from 1.4 Mbps in 2013 to 2.5 Mbps and over 4.9 billion devices will be IPv6-capable. There will be more traffic offloaded from cellular networks (on to Wi-Fi) than remain on cellular networks.

white_paper_c11-520862_4 Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Securing Mobile Data: What’s Your Plan?

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world.

This blog series, authored by Kathy Trahan, will explore the topic of enterprise mobility security from a situational level and provide insight into what leaders can do now to mitigate risk. To read the first post focused on securing device freedom, click here. The second post, available here, focused on the risks that come with mobile connections. – Bret Hartman, Chief Technology Officer (CTO) for Cisco’s Security Technology Group

The Cisco Visual Networking Index revealed an obvious truth that none of us can deny—mobile data traffic is on the rise and shows no signs of stopping:

  • By 2018, over half of all devices connected to the mobile network will be “smart” devices
  • Tablets will exceed 15 percent of global mobile data traffic by 2016
  • By the end of this year, the number of mobile-connected devices will exceed the number of people on earth, and by 2018, there will be nearly 1.4 mobile devices per capita

With the explosion in the number of smart mobile devices and employees increasingly taking advantage of BYOD, securing company and personal data in a world where the mobile endpoint is a new perimeter presents technical and legal challenges for organizational leaders.

What are some of the most prevailing challenges? The personal use of company-owned devices happens more frequently than IT may realize and a complex legal environment can leave both employees and IT confused on how personal privacy is being protected. It is important for human resources to weigh in here as well.

Read More »

Tags: , , , , , , ,