The next big wave is going to be around the internet of everyting. It will be implemented by combining things with processes, with business changes, with people. And, it will drive a productivity number, and a financial number, that is just mind-boggling. John Chambers, former CEO, Cisco Systems
Hard drives come pre-installed on most desktop or laptop computers. These devices store data on magnetic platters. They can store large amounts of data, 1 terabyte or more. |
Infastructure as a Service: Hardware and software to the power servers, storage, networks and operating systems. |
This [the IoE] is not about technology at all. It’s about how we change people’s lives. John Chambers, former CEO Cisco Systems
IP operates at this layer encapsulating each segment into a packet with source and destination addressing information. | |||
Existing power lines in a house can be used to connect devices to an Ethernet LAN. |
This is a communications protocol owned by a single organisation or individual. |
Near field communication (NFC) is a standard for communicating between things in very close proximity, usually within a few inches. For example, NFC works at point of sale between an RFID tag and the reader. |
Sensors measure idle times, fuel usage, engine faults, and engine load. |
Cisco 500 Series Wireless Personal Area Network (WPAN) Industrial Routers (IR500) provide unlicensed 915 MHz industrial, scientific, and medical (ISM) band WPAN communications. They help to enable a diverse set of Internet of Things (IoT) applications. These include smart metering, smart grid, distribution automation, supervisory control and data acquisition (SCADA), and street lighting. | The Cisco CRS (Career Routing System) Multichassis System is the most widely deployed multichassis router, with over 1000 systems operating at many of the world's largest network operators. |
Sector | Connections | Impacts |
Retail | Energy optimisation |
|
Manufacturing | ||
Public sector | ||
Service providers |
Sector | Connections | Impacts |
Retail | ||
Manufacturing | ||
Public sector | ||
Service providers |
Sector | Connections | Impacts |
Retail | ||
Manufacturing | Remote Expertise Collaborative Product Development Mobile collaboration on factory floor | |
Public sector | ||
Service providers |
Step 1 | Step 2 | Step 3 | Step 4 | Step 5 |
Customers talk to companies through purchase habits and online feedback. | Companies talk to supply chain management channels. | Supply chain management systems talk to machines on the factory floor. | Machines on the factory floor talk to the suppliers of raw materials. | Suppliers of raw materials inform supply chain management channels of the shipment of raw materials. |
Standardisation | Equipment | Network scalability | Security | Network management | Programming | Data processing and access |
What technology is required to allow these systems to communicate to IT systems, or to convert these systems to use IP? | What new equipment is required? Are sensors needed to track information? What devices are needed to aggregate information and help with information management? | How does the existing infrastructure need to be modified to support the new technical requirements and data load? | What security measures need to be implemented on IT systems, OT systems, and end devices? | Does the new device integration create a more complex network environment? If so, what new services and applications need to be installed to simplify the management of these updated systems? | What are the programming requirements needed to support non-IP-enabled and IP-enabled devices? | When is it necessary to forward data to the Cloud for processing, and when does data need to be processed closer to the source, for example, in the Fog? |
Budget | Legacy systems | Technical expertise | Policies | Culture |
Limited resources may require some compromises in design due to the costs of equipment, software, or other components. | Businesses may have large capital investments in existing systems. | The lack of trained personnel to implement an IoE solution is a major constraint. | The design must account for existing policies regarding protocols, standards, vendors, and applications. If necessary, these policies need to be refined or removed. In some cases, new policies must be created to facilitate the IoE implementation. | The change over to an IoE implementation requires a collaborative environment with open communications between traditionally segmented departments. |
Application layer | Platform layer | Infastructure layer |
This layer provides automated, dynamic, application-centric responses to changing traffic and usage demands. The application layer includes the intelligence needed to improve user experiences. It allows for the integration of traditional IT apps, and the use of collaboration applications and industry-specific applications. | This refers to Cisco solutions that provide orchestration, management, and policy adjustments based on changing demands, to accelerate service delivery. It allows applications and users to receive the resources they need, when they need them, without manual or complicated IT tasks and configuration changes. The platform layer creates business agility by implementing new services and new analytical applications that can handle Big Data needs. | This layer integrates power, security, core networks, access architectures, and storage with physical and virtual resources. It includes the right mix of hardware and software across enterprise, Cloud, and service provider networks. It converges all connections, both OT and IT, into IP and accounts for Cloud computing and mobile connectivity. |
Standard infastructure | Responsive software | Holistic security |
This refers to establishing and implementing standardised protocols and coordinating services in an end-to-end IP environment. This helps reduce, or eliminate, the costs associated with legacy systems. It also creates seamless integration across autonomous departments, which allows for increased collaboration, rapid delivery of information, and end-to-end management and security. | This requires, through an application-centric approach, enabling the infrastructure to automatically and rapidly detect, and adapt to, traffic demands and flows. This allows the infrastructure to react to changing conditions and potential issues, without compromising security or availability. A large part of an application-centric approach is establishing what information is virtualised, what moves into the Cloud, and what stays within the Fog. | This refers to securing a network infrastructure from end-to-end. It includes enabling technologies that can monitor network operations and automatically detect and mitigate threats. It simultaneously ensures confidentiality, integrity, and availability of any information that is transmitted across the network. |
Adaptable and real-time security | Secure and dynamic connections | Protecting customer and brand trust |
Prepare to handle security as you grow by deploying adaptable and real-time security. As business evolves, adjust security levels to minimize risk. | Ensure that the right level of security is in place for all connections all the time. Advanced security measures and protocols help achieve regulatory and privacy compliance. All valuable assets including intellectual property, data, employees, and buildings are protected. | Reduce the impact and cost of security breaches with a seamless security strategy. Security breaches erode customer confidence and brand integrity. The security strategy must detect, confirm, mitigate, and remediate threats across the entire organisation. |
Access Control | Context-aware policies | Context-aware inspection and enforcement | Network and global intelligence |
Access control provides policy-based access for any user or device seeking access to the distributed network. Users are authenticated and authorised. End devices are also analyzed to determine if they meet the security policy. Non-authenticating devices, such as printers, video cameras, sensors, and controllers are also automatically identified and inventoried. | Context-aware policies use a simplified descriptive business language to define security policies based on the full context of the situation: who is sending, what information, when, where and how. These security policies closely align with business policies and are simpler to administer across an organisation. They help businesses provide more effective security and meet compliance objectives with greater operational efficiency and control. | Context-aware inspection and security enforcement use network and global intelligence to make enforcement decisions across the network. Flexible deployment options, such as integrated security services, standalone appliances, or cloud-based security services bring protections closer to the user. | Network and global intelligence uses the correlation of global data to ensure that the network is aware of environments that have a reputation for malicious activity. It provides deep insights into network activity and threats for fast and accurate protection, and policy enforcement. |
Remote access policy | Information privacy policy | Computer security policy | Physical security policy | Password policy |
Defines who can connect, how they can connect, when they can connect, and what devices can be used to connect to a system remotely. This policy also defines the assets that are accessible to a remote user. | Defines what methods are used to protect information depending on the level of sensitivity. Generally, the more sensitive the information, the greater the level of protection used to secure it. | Defines the way in which users are allowed to use computers. This policy might define who can use certain computers, what programs must be used to protect a computer, or if a certain storage media is allowed to be used. | Defines how physical assets are secured. Some assets may need to be locked away at night, kept in a locked area at all times, or specifically designated not to leave the property. | Defines what password will be used to access specific resources and the complexity of the password. Often, this policy will control how often a password must be changed. |
Volunteered data | Inferred data | Oserved data |
Volunteered data is created and explicitly shared by individuals, such as social network profiles. | Inferred data, such as a credit score, is based on analysis of volunteered or observed data. | Observed data is captured by recording the actions of individuals, such as location data when using cell phones. |
Symbol | Name | Description |
|
Data | This symbol represents data. It is not intended to be specific as to the type of medium for the data |
|
Stored data | This symbol represents stored data, which is intended as data that is ready for processing. It is not intended to be specific as to the type medium for the stored data |
|
Process | This symbol represents a processing function. For example, it may indicate a single, defined operation that changes the value of information. Alternatively, it may indicate a group of operations that change the value or form of information. It may also represent the determination of one of several directions to be followed in a flow |
|
Line | This symbol represents the flow of data or control. It may include solid or open arrowheads to indicate direction of flow where necessary or to enhance the readability. |
CompTIA A+ | CCENT | CCNA Routing and Switching | CCNA Security |
The CompTIA A+ certification for computer support technicians demonstrates competence in areas such as installation, preventive maintenance, networking, security, and troubleshooting. IT technician, IT administrator, and field service technician are examples of jobs that students can pursue using the CompTIA A+ certification. | The Cisco CCENT certification for entry network technicians validates the ability to install, operate, and troubleshoot a small branch network and perform basic network security tasks. Support desk technician and network support technician are examples of jobs that students can pursue using the Cisco CCENT certification. | The Cisco CCNA Routing and Switching certification validates the ability to install, configure, operate, and troubleshoot medium-sized routed and switched networks, and implement and verify connections to remote sites in a wide-area network (WAN). Examples of jobs that the CCNA Routing and Switching certification can help students to find are network administrator, network installer, and network engineer. | The Cisco CCNA Security certification for network security professionals validates the knowledge needed to install, troubleshoot, and monitor Cisco network security devices; develop a security infrastructure; recognise network vulnerabilities; and mitigate security threats. Students who gain CCNA Security certification would be well qualified for a position as a network security specialist. |
Certification tracks | Entry | Associate | Professional | Expert | Architect |
Collaboration | CCIE Collaboration | ||||
Data Center | CCNA Data Center | CCNP Data Center | CCIE Data Center | ||
Design | CCENT | CCDA | CCDP | CCDE | CCAr |
Routing & Switching | CCENT | CCNA Routing and Switching | CCNP | CCIE Routing & Switching | |
Security | CCENT | CCNA Security | CCNP Security | CCIE Security | |
Service Provide | CCNA Service Provider | CCNP Service Provider | CCIE Service Provider | ||
Service Provider Operations | CCENT | CCNA Service Provider Operations | CCNP Service Provider Operations | CCIE Service Provider Operations | |
Video | CCNA Video | ||||
Voice | CCENT | CCNA Voice | CCNP Voice | ||
Wireless | CCENT | CCNA Wireless | CCNP Wireless | CCIE Wireless |