Cisco Blogs


Cisco Blog > SP360: Service Provider

Have Global IPv6 Deployments Really Slowed Down?

For those that are not closely involved with IPv6, it may seem like the emphasis on migration to the new addressing scheme is waning. But while the hue and cry over IPv6 may appear to have quieted down to a background noise since 2010-2011; a closer inspection would prove that perception to be quite false.

What is IPv6 and why does it even matter? Simply put, when a device is on the Internet, it has its own specific address that it uses to communicate with other devices and the Internet and to define its location. With the non-stop growth of devices connecting to the Internet and the “Internet of Everything” (IoE) becoming a reality, the need for unique addresses for each personal device and machine-to-machine (M2M) connections has increased exponentially. To put this in perspective, the Cisco Visual Networking Index (VNI) 2013-2018 forecast estimates that there will be about 4 billion Internet users by 2018, which is 52% of the world’s projected population (7.6 billion people). And for every person on the Earth in 2018, there will be about 3 global Internet connections — that’s more than 21 billion devices/connections by 2018.The current communication and address format IPv4 was just not equipped for this explosive growth of devices and connections and the need to define addresses for each device. Hence the need for a new communication protocol, IPv6.

2

(Source: Cisco Visual Networking Index (VNI) 2013-2018)

On 3 February 2011, the last batch of IPv4 address blocks was Read More »

Tags: , , , ,

3 Steps for Best-in-Class Wi-Fi

If you are a professional photographer or even an amateur like me, you want to have ready access to various control dials on your camera to capture the moment perfectly. Professional cameras provide high level of control to get the best outcome. But there are times when you want to put the camera and the lens in Auto mode or wish that the camera could automate some decisions that make your workflow easier.

Likewise, Cisco Wireless LAN products provides the level of quality, functionality and control that is unmatched and hands-down the best enterprise wireless networking portfolio in the industry. But there are scenarios where it is preferable to expedite wireless configuration with best practices automatically enabled and easy access to data to simplify monitoring and troubleshooting workflow. For example, a small business owner manages his own network or in a K-12 a librarian acting like a part-time IT administrator. This not only provides operational efficiencies for the IT organization but also improves end-user and partner experience.

Cisco WLAN Express Setup is an attempt in this direction. It is now available on 2500 Series Controller (CT2504) starting with software release 7.6.120.0.

It includes three components

  • Easy-to-use setup wizard: This eliminates the need for console cable and command line setup. Instead, 3-step web-wizard is used to quickly boot strap a Controller and configure employee and Guest WLAN out of the box.
    Day0 Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

The Summer Blockbuster You’ve Been Waiting For: Cisco Wireless Release 8.0

Cisco Wireless Release 8.0 is now available: Product Bulletin 

The Cisco VNI Global Mobile Data Traffic Forecast, 2013 – 2018 revealed some stunning trends with growth projections that are sure to have a dramatic impact on wireless networks worldwide.

In 2013, globally, there were nearly 22 million wearable devices generating 1.7 petabytes of monthly traffic. There were about 7 billion mobile-ready devices and connections with mobile network connection speeds that have more than doubled, to 1.4Mbps up from 526 Kbps in 2012.

By 2018, there will be more than 10 billion mobile-ready devices and connections. The average mobile connection speed will nearly double, from 1.4 Mbps in 2013 to 2.5 Mbps and over 4.9 billion devices will be IPv6-capable. There will be more traffic offloaded from cellular networks (on to Wi-Fi) than remain on cellular networks.

white_paper_c11-520862_4 Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Securing Mobile Data: What’s Your Plan?

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world.

This blog series, authored by Kathy Trahan, will explore the topic of enterprise mobility security from a situational level and provide insight into what leaders can do now to mitigate risk. To read the first post focused on securing device freedom, click here. The second post, available here, focused on the risks that come with mobile connections. – Bret Hartman, Chief Technology Officer (CTO) for Cisco’s Security Technology Group

The Cisco Visual Networking Index revealed an obvious truth that none of us can deny—mobile data traffic is on the rise and shows no signs of stopping:

  • By 2018, over half of all devices connected to the mobile network will be “smart” devices
  • Tablets will exceed 15 percent of global mobile data traffic by 2016
  • By the end of this year, the number of mobile-connected devices will exceed the number of people on earth, and by 2018, there will be nearly 1.4 mobile devices per capita

With the explosion in the number of smart mobile devices and employees increasingly taking advantage of BYOD, securing company and personal data in a world where the mobile endpoint is a new perimeter presents technical and legal challenges for organizational leaders.

What are some of the most prevailing challenges? The personal use of company-owned devices happens more frequently than IT may realize and a complex legal environment can leave both employees and IT confused on how personal privacy is being protected. It is important for human resources to weigh in here as well.

Read More »

Tags: , , , , , , ,

NTT Docomo Virtualizing the Mobile Packet Core with Cisco

1Did you know in Japan, 90% of mobile phones are waterproof because youngsters use them even in the shower?

Did you know that Japan consists of over 6,800 islands?

Did you know Japan suffers 1,500 earthquakes every year.

In Japan Mobile data traffic grew 92% in 2012 and 66% from 3Q 2012 to 3Q 2013, according to Japan’s Ministry of Internal Affairs and Communications.

According to the GSMA estimates for Machine-To-Machine (M2M), ten countries account for 70% of all M2M connections as of year-end 2013, comprising China, the US, Japan, Brazil, France, Italy, the UK, Russia, Germany and South Africa.

So what is the problem? Well as you can see the people of Japan will take and use their mobile devices anywhere and at any time. The country is geographically dispersed, and earthquakes occur all of the time (mostly very small). All along the amount of mobile traffic is growing at an astounding rate with no signs of slowing down, with the M2M industry just beginning. So what is an operator like NTT Docomo supposed to do?

What’s the solution? NTT Docomo has Read More »

Tags: , , , , , , , , , , , , , ,