© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 1 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.

Slides:



Advertisements
Similar presentations
The leader in session border control for trusted, first class interactive communications.
Advertisements

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 © 2010 Cisco and/or its affiliates. All rights reserved. 1 BYOD: Security, Policy.
Network Systems Sales LLC
The Business Solutions Revolution Xavier Villegas Chief Business Market Officer September 17, 2013.
1 UCaaS Subscription Detail FunctionalitySupported Devices / Endpoints Types of UCaaS subscriptions EssentialBasicFoundationP1Professional Maximum # of.
UDgateway WAN Optimization. 1. Why UDgateway? All-in-one solution Value added services – Networking project requirements Optimize IP traffic on constrained.
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Partner Summit 2011 Padmasree Warrior CTO and SVP/GM, Enterprise, Commercial.
VoIP: Full Lifecycle Management Russell M. Elsner APM Technology Director OPNET Technologies, Inc.
Lync Like You’ve Never Seen It Before. 3+ mobile devices per user - BYOD Unpredictable Voice, Video and UC traffic over mobile devices Sticky clients.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Catalyst Smart Operations Automates the trivial and repetitive tasks.
1 © 2004 Cisco Systems, Inc. All rights reserved. Cisco IOS IP SLAs, Technical, 11/04 Cisco IOS IP Service Level Agreements An Overview Assuring the Delivery.
QoS: Don’t try VoIP without it Jonathan Zarkower Director, Product Marketing.
Company LOGO Virtual Master Control.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Adding WAN Optimisation to Boost Storage Sales Success Blue Coat in a Virtual World.
POLYCOM CONFIDENTIAL Polycom enables Alcatel Instant Video Solution by combining the power Alcatel IP Telephony with Polycom Unified Collaboration Solutions.
Wireless Solution Training for the (Enterprise) Carpeted Office February 2004 Tina Herrera
IETF 63 - Paris VOIPPEER BoF A Broadband Service Provider’s Perspective on VoIP Peering August 5, 2005 Presented by Jason Livingood.
Cisco Confidential 1 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Prime™ Collaboration Manager Simplified Management of End-to-End Video.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Routing and Switching in the Enterprise – Chapter 1 Networking.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
CCNP RS 7.0 Course Overview
Hosted by Gain Maximum WAN and LAN Performance Michael Hoch Research Director Aberdeen Group.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
November th Diego Requirements for delivering MPLS services over L3VPN draft-kumaki-l3VPN-e2e-mpls-rsvp-te-reqts-02.txt Kenji Kumaki KDDI,
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
© 2013 Avaya Inc. All rights reserved Avaya UC Collaboration Solution A complete solution for midsize companies Mobility Video SecurityNetworking.
Ryan Lackey Dynamic Locations: Secure Mobile Services Discovery and Dynamic Group Membership Ryan Lackey
Existing PBX Existing Phone Handsets Numbering Plan to digit Internal extensions 9 for an outside line 3 digits.
Your Business Challenges
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
Video Communication Market Trends Rafi Anuar Director, Product Management.
Draft-khan-ip-serv-peer-arch-03.txt SPEERMINT Peering Architecture IETF-66, Montreal, Canada Sohel Khan, Ph.D. Technology Strategist.
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Grow with Cisco’s Made-for-Midmarket Portfolio Inspire Growth, Productivity,
WebEx Cloud Connected Audio Enterprise
VPN. What is VPN An arrangement that provides connections between: An arrangement that provides connections between: –Offices –remote workers and –the.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 3: Introduction to IP QoS.
VCS to UCM Migration Program. Cisco Confidential 2 © Cisco and/or its affiliates. All rights reserved. Customers with VCS and UCM Customers.
Routing Opportunity Creation: WAN Conversation with customer.
Leading provider of secure mobility for the enterprise Aruba MOVE Architecture Industry’s most secure WLAN Easiest BYOD & Guest Access Zero-touch.
Mr. Mark Welton.  Quality of Service is deployed to prevent data from saturating a link to the point that other data cannot gain access to it  QoS allows.
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 The New Collaboration Experience Name | Title.
NDA What is it? A personal workspace that provides drag and drop communication services and information access Initially available on the Avaya Desktop.
How to Sell: Errol Hayward, Marketing Manager January 2015 Cisco CCNA Collaboration and CCNP Collaboration Training.
Richard Gurdak International Development Blue Ridge Networks Service Providers and Lawful Intercept.
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
Cisco Confidential 1 C © 2013 Cisco and/or its affiliates. All rights reserved. Revision: Draft 3 September 2013.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Vasanth Matamudra, Patricia Costa October 2012.
The Next Level Welcome Damien McCann
Implementing Cisco Video Network Devices (CIVND)
© 2015 LiveAction, Inc., All Rights Reserved. 1 AUTOMATION VISUALIZATION CONTROL LIVEACTION MANAGEMENT FOR CISCO INTELLIGENT WAN March 6, 2015.
Technology Requirements for Online Testing Training Module Please refer to the revision log on the last slide of this presentation, updated August.
Virtual Private Networks
Cisco Exam CCNP Collaboration
Instructor Materials Chapter 6: Quality of Service
SDN and SD-WAN Real Time before East/Westbound Interfaces
Advanced Borderless Network Architecture Sales Exam practice-questions.html.
Dumps4download Exam Question - 100% Passing Assurance
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Quality of Service Connecting Networks.
Network Optimizer Optimize Your Business & Cloud Networks
The Business Value of MPLS VPNs
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Dynamic WAN Selection Optimize Your Business & Cloud Networks
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
Presentation transcript:

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 1 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 High Intensity Low Intensity live Meetings Customer Interaction Organizational Communications Training / Education Events Advertising on demand Safety & Security

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Endpoints Infrastructure Network MEDIANET Endpoints / Apps work better on our Infrastructure & Network Endpoints / Apps work better on our Infrastructure & Network Portfolio of systems works better together Applications

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 mDNS SDP SIP RTSP H.323 H.245

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 NETWORK Media Services Proxy Identify, prioritize, protect Camera: set QoS policy Camera: Reset QoS Camera: Acknowledge I see a camera, auto-configure & announce to the network

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 Performance Monitor Each Element becomes a 'Probe’ Mediatrace Dynamic Troubleshooting IPSLA Video Operation Pre-deployment Assessment

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 Private MPLS and GETVPN 1) Collect QoE metrics from endtpoins to identify or verify sites with issues Gain visibility into Quality-of-Experience – How are your critical meetings performing? Get in front of the problem Recurring issues in branch x and you are not able to reproduce the problems Medianet Enabled The Customer View 2) Prioritize Perfmon and Mediatrace to trouble spots/sites Prime Collaboration Public IP DMVPN Bottleneck ! ! ! 3) Visibility localizes problems

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 2) BOYD device / unknown traffic put in the best effort Queue (Enterprise policy: in order to support BYOD device, MSI is mandatory) 1) Encrypted Jabber traffic prioritized in alignment with Business priority Leverage the MSI to provide support for business applications running on BYOD devices The Customer View Jabber Window announces along the path Medianet Enabled Jabber but without MSI Unknown traffic type: best effort Jabber: Remark QoS

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 2) Add desktop video traffic without bandwidth upgrade by leveraging the backup link 1) SP A is the only link that is being used. All traffic including voice are prioritized according to business priorities SP A Jabber announces itself SP B Medianet Enabled Bandwidth is expensive, are there ways to minimize bandwidth upgrade costs? Unlikely to be able to support HD video for all users all the time, need to prioritize video services in alignment with business priorities Jabber: set QoS & send to B Voice: trust QoS marking & send to A The Customer View

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Thank you.