1 / 22

Not Just “Why the Network?” Also “Where? … NCO must address Web 2.0 and on . . .

Not Just “Why the Network?” Also “Where? … NCO must address Web 2.0 and on. Terry Morgan Director Net Centric Strategy Global Government Solutions Group Cisco. The reality. All information going digital. Accuracy, Fidelity, Storage and Retrieval

odele
Download Presentation

Not Just “Why the Network?” Also “Where? … NCO must address Web 2.0 and on . . .

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Not Just “Why the Network?”Also “Where? … NCO must address Web 2.0 and on . . . Terry Morgan Director Net Centric Strategy Global Government Solutions Group Cisco

  2. The reality . . . • All information going digital. • Accuracy, Fidelity, Storage and Retrieval • Searching, Analysis, Information Management • All devices becoming network nodes. • Access, Transmission, Distributed Systems • Scaling, Fault Tolerance, Management, Flexibility • Video, Voice, and Instantaneous information will become more prevalent

  3. OBJ 1 The Battle of Dots Not Defeat in Detail as some have planned but Victory Through Sharing the Details !!!!

  4. 'Read-only' to 'Participatory' ... 'Editorial' to "Peering and Sharing' ... Winning the 'Eyeballs' and 'Clicks' to 'Collaboration', 'Open Platforms" and 'Collective Intelligence' - Reilly Media Source: What is Web 2.0 Design Patterns and Business Models for next Generation Software, Tim O’Reilly 09/30/2005 Web 2.0 O’Reilly: “Web 2.0 is the network as platform, spanning all connected devices; Web 2.0 applications are those that make the most of the intrinsic advantages of that platform…” Om Malik: "a collection of technologies - be it VoIP, Digital Media, XML, RSS, Google Maps… whatever …. that leverage the power of always on, high speed connections and treat broadband as a platform... not just a pipe to connect." John Hagel: “an emerging network-centric platform to support distributed, collaborative and cumulative creation by its users.”

  5. "I believe we are entering the second phase of the Internet, where the next major market transition will be driven by collaboration, enabled by Web 2.0 technologies. This is the foundation of what we are calling "Cisco 3.0" - John Chambers, 2007 Why Cisco? “Across broad sectors of the economy, dominant competitors such as Cisco Systems …, Federal Express …, Charles Schwab … Wal-Mart … are successfully employing information-based strategies to create competitive advantage”NCW Developing & Leveraging Information Superiority 1998

  6. Collaboration Tools For Different Process Needs TelePresence Complex Decisionmaking ApplicationSharing Video Conferencing Email & Voicemail groups Remote Access Audio Conferencing Synchronous Asynchronous Web Broadcasts Collaboration space Virtual team rooms Calendar Instant Messaging Communities & discussion boards Information feeds & repositories Simple Information Sharing

  7. Rich-Media Communications at Cisco Today Video Conferencing Web Conferencing Video on Demand TelePresence Web TV • On-demand video sync’ed with slides and transcripts • Available anytime, anywhere there is a network connection • Live streaming video delivered to user’s desktop • Interactivity via question function • Real-time video to facilitate live meetings and information exchange • Real-time information exchange, collaboration and file sharing • Virtual presence experience with ultra high-definition video, audio and interactive capabilities

  8. Social Tagging . . . • An integrated and enterprise-wide application for managing bookmarks • Allows management of personal bookmarks and leveraging the bookmarks of other employees, or groups • of employees, in the larger Cisco community. • Community bookmarks and tags that employees create can then be leveraged across the enterprise to enhance community and individual connections, in addition to sharing knowledge. • My Profile … • Essentially a "MySpace" for the enterprise, enabling employees to share information and learn about others. • Solves the problem of “you and who you are and what you can do” by providing a single starting point for self-service profile information • Allows you to view or manage personal information, professional information, roles/expertise, groups, personal networks, reporting structure, and preferences. And the Future

  9. Secure Information Systems Architecture The Challenge How can agencies share information in a secure and cost effective manner that allows effective Inter-Agency collaboration?

  10. SISA . . . Access Protection Services Manages and controls access of network, client, and server endpoints Content Protection Services Collaboration services with protection against inadvertent disclosure of files, documents, and e-mails Data Protection Services Provides management, encryption, continuity, scalability, and separation to protect stored data from external and internal threats Watchdog Services Supports dynamic changes in mission and structure of organization

  11. We’ve only begun to exploit the “packet” NCO 3.0 begins here 01001001 0011101000110100101100000100100100100010011101010110001001110101010100011011000001001001 Preamble Dest. IP @ ToS/DSCPi.e. QoS Protocoli.e. VoIP Others Source IP @ Payload 1011010 1011010 1011010 1011010 1011010 1011010 1011010 1011010 Fire Request 35InfBn Request for Info 35InfBn Singleton Fire Mission BN 3 Chg 7 GB He/VT Fire Request Moving Beyond Packet ForwardingPurposed Information Becomes Multi-purposed Simple Forwarding Paradigm with Optimized Performance… 010010010011101000110100101100010011101010110001001110101010100011011000001001001 100000100100100 Payload Preamble Destination IP @ Others Source IP @ Intelligent Forwarding Paradigm, Optimized for Service Creation 010010011001110101010100011011000001001001 001110100011010010110000010010010010001001110101011000 Preamble Dest. IP @ ToS/DSCPi.e. QoS Protocoli.e. VoIP Others Source IP @ Payload e.g., HTTP/NBAR Deep Payload InspectionAggregating Message-Level InformationApplying Policies and Security Network Enforces Rules Automatically and Transparently According to Business Policy

  12. The Data Center

  13. ON-DEMANDINTERACTIVITY RELIABILITYAND QUALITY MORE CONTENT What’s Driving Network Development? The Service Providers Quad Play Broadcast Source Redundancy (Anycast) DDoS protection No Unauthorized Senders Scalable Dynamic Multicast of Live TV Integrated Video Admission Control Cost Efficient Video-optimizedAsymmetric Networking IPv6

  14. Service Exchange Framework Multimedia Service Control for Wireline / Wireless Convergence IDENTITY MANAGEMENT User / Device ID Location / Presence Service Registration Audit / Logging Assured Authentication POLICY MANAGEMENTSubscriber Policy Application Policy Per-Sub Service WHO? WHAT? SERVICE EXCHANGE MOBILITY MANAGEMENT Device Roaming Service Mobility User Mobility DYNAMIC SESSION MANAGEMENTSession Initiation & Call Control Rich-Media Control Bandwidth & QoS per Session Accounting / Billing WHERE? HOW?

  15. A Fundamental Decision for the Military • RED Service ArchitecturePros: • Maintains hierarchical architecture of today • Allows for centralized traffic inspection and accounting • MPLS services (VPN, TE) possible at the red PE • Simplifies access HAIPE devices • (reduces state, simplifies routing) • Cons: • Supporting Multiple Classifications requires separation of traffic at decrypt points.. • Likely requires high-performance HAIPE solution (10GE or stacks of 1GE) for aggregation and inter-hub connectivity Black Core Pros: • Decreases need for separate hardware for security levels in the core Cons: • End to End encryption limits visibility/intelligence services in the core • Still need service islands for centralized services • Requires lots of state on the access HAIPE devices • Requires scalable HAIPE discovery solution

  16. By Kurzweil's Numbers - An 8 year procurement started today will be ...? “Unfortunately, . . . . The trends for advances in technology, often (correctly or incorrectly) related to Moore’s Law and derivative theories, such as the Law of Accelerating Returns proposed by Ray Kurzweil in his 2001 essay, dictate that we must move quickly. Warfighting in Cyberspace, Keith B. Alexander, JFQ / issue 46, 3d quarter 2007 Accelerating Rate of Technology Change After realizing the potential of the air domain Mitchell, Claire Chennault, and their contemporaries had 20 years to develop the strategy, tactics, and doctrine and “sell” aviation . . . Ray Kurzweil, “Law of Accelerating Returns,” 2001, http://lifeboat.com/ex/law.of.accelerating.returns

  17. Thank You

  18. More WEB 2.0

  19. Web 2.0 Defined: The Network as a Platform O’Reilly: “Web 2.0 is the network as platform, spanning all connected devices; Web 2.0 applications are those that make the most of the intrinsic advantages of that platform…” John Hagel: “an emerging network-centric platform to support distributed, collaborative and cumulative creation by its users.” Om Malik: "a collection of technologies - be it VoIP, Digital Media, XML, RSS, Google Maps… whatever …. that leverage the power of always on, high speed connections and treat broadband as a platform... not just a pipe to connect."

  20. Web 2.0 Technologies • RSS is an XML-based format for syndicating Web content. • The Atom Syndication Format is an XML language used for Web feed • Ajax (Asynchronous JavaScript and XML) is the name given to a disparate collection of programming techniques that involve browser-side technologies such as JavaScript, Document Object Model, and background transfers between server and client of XML data and JavaScript objects. • Representational state transfer (REST) is an architectural style that (among other attributes) relies on a minimal set of actions (verbs) to interact with items (representations) on the Web • A mashup is a lightweight tactical integration of multisourced applications or content into a single offering • Folksonomy is social tagging — a way to obtain user-created metadata via Web sites. Laypersons (that is, information users, not necessarily information professionals), such as librarians, maintain folksonomies via a collaborative "bottom up" categorization using individually chosen keywords. • A wiki is a simple, text-based collaborative system for creating and maintaining hyperlinked collections of Web pages. It usually enables users to change pages or comments created by other users.  Published on O'Reilly (http://www.oreilly.com/)http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html

  21. Service Oriented Architecture • “A paradigm for organizing and utilizing distributed  capabilities that may be under the control of different ownership domains.” – OASIS Open • “An approach to designing, implementing, and deploying information systems across the network such that… … the system is created from components implementing discrete business functions. These components, called “Services”, can be distributed across geography or across enterprises… … and can be reconfigured into new business processes as needed.” – from“A New SOA Maturity Model”

  22. Services Oriented Networking Architecture “SONA is an architectural approach to connect Network Servicesto Applications to deliver Business Solutions.”

More Related