SlideShare a Scribd company logo
Oct 2017
Why Cloud Managed Networking?
2
An integrated solution for new IT challenges
3
Billions of
mobile devices
A complete solution out-of-the-box:
No extra hardware, software, or complexity
HD video and rich
media
New business
opportunities
Integrated mobility
management
Layer 7
application shaping
Analytics and user
engagement
The cloud increases IT efficiency
4
Manageability Scalability Cost Savings
Turnkey installation and
management
Secure out-of-bound
management—no user
traffic flows through the
cloud
Scales from small
branches to large
networks
Reliable: the network
stays up, even if
connection to the cloud is
lost
Reduces operational
costs
Integrated, always up-to-
date features
Bringing the cloud to enterprise IT
5
MR
Wireless LAN
Systems Manager
Mobility Management
MS
Ethernet Switches
MX
Security Appliances
MC
Communications
MV
Security Cameras
6© 2015 Cisco and/or its affiliates. All rights reserved.
Meraki Overview
6
Simplifying across IT with cloud management
7
A complete cloud managed networking solution
Wireless, switching, security, communications,
EMM, and security cameras
Integrated hardware, software, and cloud services
Leader in cloud-managed networking
Among Cisco’s fastest growing portfolios
Over 140,000 unique customers
Over 2 million Meraki network devices online
Trusted by thousands of customers worldwide:
© 2016 Cisco and/or its affiliates. All rights reserved.
80,000 active Orgs
260,000 Networks
870,000 Nodes
… 200M page views per day
… 1.5B clients detected
… 740M connected
Intuitive web-based dashboard
9
Sitewide
search
Client
location
Application
QoS
Real-time
control
Client
fingerprints
Single pane
of glass
management
SaaS feature delivery, quarterly updates
10
User/device fingerprinting
Application firewall
Content filtering
Network access control Location Analytics
Mobile application deployment
Demo
11
Distributed networks
12
Centralized cloud
management scales to
thousands of sites
Multi-site visibility and
control
Map-based dashboard; configuration sync; remote diagnostics; automatic monitoring
and alerts
Zero-touch provisioning Devices easily provisioned from the cloud, no staging required
Traffic acceleration Web caching reduces bandwidth usage; application-aware QoS and SD-WAN
capabilities prioritize business critical apps
High capacity edge networks
13
RF optimization and
application-aware QoS for
high-throughput, high
density WLAN
Layer 7 application and
traffic shaping
Throttle, block, or prioritize application traffic with DPI-based fingerprinting; set user and
group-based traffic shaping rules
Cloud-based RF
optimization
Dynamically avoid interference, optimizing channel selection and power levels
Density-optimized
WLAN
RF platform tuned for airtime fairness and performance in dense performance-critical
environments
Mobility management
14
Security, management, and
capacity for BYOD-ready
deployments right out of
the box
Device-aware security Device-aware firewall and access control; antivirus scan; LAN isolation; Bonjour
Gateway; content and security filtering
Integrated EMM Enforce encryption, passcodes, and device restrictions; deploy enterprise applications;
remotely lock or wipe devices
Simplified onboarding Flexible authentication with Active Directory integration, SMS authentication, hosted
splash pages, and automatic EMM enrollment
User analytics and engagement
15
Built-in location analytics
dashboard
Optimize marketing and
business operations
Analyze capture rate, dwell time, and new/repeat visitors to measure the impact of
advertising, promotions, site utilization, etc.
Built-in location
analytics
Integrated in the WLAN; no extra sensors, appliances, or software
Extensible API Integrate location data with CRM, loyalty programs, and custom applications for targeted
real-time offers
Flexible authentication and access control
16
Flexible built-in
authentication mechanism
Flexible authentication Secure 802.1x and Active Directory authentication; Facebook Authentication for
branding and targeted social marketing; SMS self-service authentication; and hosted
sign-on splash pages
Dynamic access control Assign clients layer 3 / 7 firewall rules, VLANs, and application-aware quality of service
by identity, group, location, or device type
Simplified enterprise security
17
Enterprise-class security
features for security-
conscious environments
Air Marshal
WIDS/WIPS
Detect wireless attacks; contain rogue APs; cloud-based alerting and diagnostics
User and device aware
security
User, device, and group-based firewall rules (layer 3 / 7) with Active Directory integration
UTM and content
security
Application firewall; content filtering matching 1B+ URLs; antivirus/anti-malware filtering;
Google safe-search
Bonus
18
© 2010 Cisco and/or its affiliates. All rights reserved. 19
Detect Engage Drive
19
Cisco Cloud
Networking Presence
Shopper Presence
(associated or non-associated)
Deep Analytics & Engagement
• Targeted Offers
• CRM Correlation
• Location Services
• Omni-channel Selling
• Online Cannibalization
Cisco Cloud Networking: Out of Box Analytics
Engage
Shoppers
Location Tracking Approaches
• Real-time location tracking and positioning systems can be classified by the
measurement techniques they employ to determine mobile device location
• Approaches differ in terms of the specific technique used to sense and
measure the position of the mobile device in the target environment
• Real-Time Location Systems (RTLS) can be grouped into four basic
categories of systems that determine position on the basis of the following:
20
Cell of origin (nearest cell) Distance based (lateration) Angle based (Angulation) Location patterning
BRKEWN-2650
Cell of Origin
• One of the simplest mechanisms of estimating approximate location in any
system based on RF cells is the concept of ‘cell of origin’ (or ‘associated
access point’ in Wi-Fi 802.11 systems)
• When receiving cells, provide received signal strength indication (RSSI)
for mobile devices; the use of the highest signal strength technique can
improve
location granularity over the cell of origin.
21BRKEWN-2650
Distance-Based (Trilateration) Techniques
• Trilateration can be performed by using received signal strength (RSS)
• Measured by either the mobile device or the receiving sensor
22
10dB
The closer the distance the greater
the rate of change in RSS in
relationship to distance
The change in RSS in
relationship to distance flattens
out at greater distances
BRKEWN-2650
Angle-Based (Angulation) Techniques
• The AoA locates the mobile station by
determining the angle of incidence at which
signals arrive at the receiving sensor
• Requires two receiving sensors for location
estimation, with improved accuracy coming
from at least three or more receiving sensors
(triangulation)
23BRKEWN-2650
Location Patterning (Fingerprinting)
• Location patterning is based on the sampling
and recording of radio signal behaviour
patterns in specific environments
• Each potential device location ideally
possesses a distinctly unique RF "signature”
24
Because of fading and other phenomena, the observed signal
strength of a mobile device at a particular location is not static but
is seen to vary over time. As a result, calibration phase software
typically records many samples of signal strength for a mobile
device during the actual sampling process.
BRKEWN-2650

More Related Content

PDF
Cisco Connect Halifax 2018 Cisco Meraki -let simple work for you
PDF
Meraki overview sales deck inside sales
PDF
Ngfw overview
PPTX
Transform your enterprise branch with secure sd-wan
PDF
Cisco Meraki- Simplifying IT
PPTX
Monetizing The Enterprise: Borderless Networks
PPT
Managed IP solution
Cisco Connect Halifax 2018 Cisco Meraki -let simple work for you
Meraki overview sales deck inside sales
Ngfw overview
Transform your enterprise branch with secure sd-wan
Cisco Meraki- Simplifying IT
Monetizing The Enterprise: Borderless Networks
Managed IP solution

What's hot (18)

PDF
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
PDF
Cisco Meraki Overview | Voyager Networks
PDF
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
PDF
CyberoamVirtualSecurityBrochure
PPTX
Isf 2015 continuous diagnostics monitoring may 2015
PPTX
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
PPT
PPTX
Secure Access Architecture
PPT
What You Cant See Can Hurt You
PDF
Protect your guest wifi - NOW
PDF
Cisco Meraki Portfolio Guide
PDF
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
PDF
Cisco Meraki Product Launch Q1 2017
PPT
Palo alto networks next generation firewalls
PDF
Palo Alto Networks Portfolio & Strategy Overview 2019
PPT
S5068 Presentation Live
PDF
Meraki Cloud Controller
PDF
Palo alto-review
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
Cisco Meraki Overview | Voyager Networks
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
CyberoamVirtualSecurityBrochure
Isf 2015 continuous diagnostics monitoring may 2015
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
Secure Access Architecture
What You Cant See Can Hurt You
Protect your guest wifi - NOW
Cisco Meraki Portfolio Guide
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Cisco Meraki Product Launch Q1 2017
Palo alto networks next generation firewalls
Palo Alto Networks Portfolio & Strategy Overview 2019
S5068 Presentation Live
Meraki Cloud Controller
Palo alto-review
Ad

Similar to Cloud managed networking (20)

PDF
Cisco Meraki Overview
PDF
Cisco's Cloud Networking Powered by Meraki
PDF
Meraki Overview
PDF
PLNOG15: Find the location of your superhero with 802.11 - Sebastian Pasternacki
PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
PDF
TEUNO Summit - Presentaciones
PDF
Meraki overview 2011 general (2) (1)
PPTX
Cisco Mobility - IBM & IDC event
PPTX
Cisco connect winnipeg 2018 a look at network assurance in dna center
PPTX
Innovations in Mobility
PDF
Cisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For You
PDF
Корпоративные сети через 5 лет: что нас ждет?
PDF
Cisco Meraki: Let Simple Work For You
PDF
Cisco Meraki - Let Simple Work for You
PDF
Unified industrial wireless networks (cisco)
PPT
È l'ora del Cloud Managed IT
PPTX
CMX (Connected Mobile Experience) for Higher Education
PDF
Cisco Meraki Solution Brochure 2014
PDF
Next Generation Service Station
PDF
Cisco connect winnipeg 2018 simply powerful networking with meraki
Cisco Meraki Overview
Cisco's Cloud Networking Powered by Meraki
Meraki Overview
PLNOG15: Find the location of your superhero with 802.11 - Sebastian Pasternacki
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
TEUNO Summit - Presentaciones
Meraki overview 2011 general (2) (1)
Cisco Mobility - IBM & IDC event
Cisco connect winnipeg 2018 a look at network assurance in dna center
Innovations in Mobility
Cisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For You
Корпоративные сети через 5 лет: что нас ждет?
Cisco Meraki: Let Simple Work For You
Cisco Meraki - Let Simple Work for You
Unified industrial wireless networks (cisco)
È l'ora del Cloud Managed IT
CMX (Connected Mobile Experience) for Higher Education
Cisco Meraki Solution Brochure 2014
Next Generation Service Station
Cisco connect winnipeg 2018 simply powerful networking with meraki
Ad

More from Telematika Open Session (9)

PPTX
Learning netconf yang from scratch
PDF
PPTX
ceph software defined storage
PDF
SDN Onboarding: Open vSwitch CLIs, OpenDaylight
PDF
Learning OpenFlow with OVS on BPI R1 and Zodiac FX
PDF
Network security
PPTX
DevOps Introduction - Why Network Engineer Should Learn Programming
PDF
From network beginner to network programmer.v2
PDF
Paving your way to become a network engineer
Learning netconf yang from scratch
ceph software defined storage
SDN Onboarding: Open vSwitch CLIs, OpenDaylight
Learning OpenFlow with OVS on BPI R1 and Zodiac FX
Network security
DevOps Introduction - Why Network Engineer Should Learn Programming
From network beginner to network programmer.v2
Paving your way to become a network engineer

Recently uploaded (20)

PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Geodesy 1.pptx...............................................
PDF
composite construction of structures.pdf
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
Digital Logic Computer Design lecture notes
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Welding lecture in detail for understanding
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPT
Project quality management in manufacturing
PDF
Well-logging-methods_new................
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Geodesy 1.pptx...............................................
composite construction of structures.pdf
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Digital Logic Computer Design lecture notes
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Welding lecture in detail for understanding
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Project quality management in manufacturing
Well-logging-methods_new................
CYBER-CRIMES AND SECURITY A guide to understanding
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Foundation to blockchain - A guide to Blockchain Tech
CH1 Production IntroductoryConcepts.pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
Arduino robotics embedded978-1-4302-3184-4.pdf
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Operating System & Kernel Study Guide-1 - converted.pdf
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx

Cloud managed networking

  • 2. Why Cloud Managed Networking? 2
  • 3. An integrated solution for new IT challenges 3 Billions of mobile devices A complete solution out-of-the-box: No extra hardware, software, or complexity HD video and rich media New business opportunities Integrated mobility management Layer 7 application shaping Analytics and user engagement
  • 4. The cloud increases IT efficiency 4 Manageability Scalability Cost Savings Turnkey installation and management Secure out-of-bound management—no user traffic flows through the cloud Scales from small branches to large networks Reliable: the network stays up, even if connection to the cloud is lost Reduces operational costs Integrated, always up-to- date features
  • 5. Bringing the cloud to enterprise IT 5 MR Wireless LAN Systems Manager Mobility Management MS Ethernet Switches MX Security Appliances MC Communications MV Security Cameras
  • 6. 6© 2015 Cisco and/or its affiliates. All rights reserved. Meraki Overview 6
  • 7. Simplifying across IT with cloud management 7 A complete cloud managed networking solution Wireless, switching, security, communications, EMM, and security cameras Integrated hardware, software, and cloud services Leader in cloud-managed networking Among Cisco’s fastest growing portfolios Over 140,000 unique customers Over 2 million Meraki network devices online Trusted by thousands of customers worldwide:
  • 8. © 2016 Cisco and/or its affiliates. All rights reserved. 80,000 active Orgs 260,000 Networks 870,000 Nodes … 200M page views per day … 1.5B clients detected … 740M connected
  • 10. SaaS feature delivery, quarterly updates 10 User/device fingerprinting Application firewall Content filtering Network access control Location Analytics Mobile application deployment
  • 12. Distributed networks 12 Centralized cloud management scales to thousands of sites Multi-site visibility and control Map-based dashboard; configuration sync; remote diagnostics; automatic monitoring and alerts Zero-touch provisioning Devices easily provisioned from the cloud, no staging required Traffic acceleration Web caching reduces bandwidth usage; application-aware QoS and SD-WAN capabilities prioritize business critical apps
  • 13. High capacity edge networks 13 RF optimization and application-aware QoS for high-throughput, high density WLAN Layer 7 application and traffic shaping Throttle, block, or prioritize application traffic with DPI-based fingerprinting; set user and group-based traffic shaping rules Cloud-based RF optimization Dynamically avoid interference, optimizing channel selection and power levels Density-optimized WLAN RF platform tuned for airtime fairness and performance in dense performance-critical environments
  • 14. Mobility management 14 Security, management, and capacity for BYOD-ready deployments right out of the box Device-aware security Device-aware firewall and access control; antivirus scan; LAN isolation; Bonjour Gateway; content and security filtering Integrated EMM Enforce encryption, passcodes, and device restrictions; deploy enterprise applications; remotely lock or wipe devices Simplified onboarding Flexible authentication with Active Directory integration, SMS authentication, hosted splash pages, and automatic EMM enrollment
  • 15. User analytics and engagement 15 Built-in location analytics dashboard Optimize marketing and business operations Analyze capture rate, dwell time, and new/repeat visitors to measure the impact of advertising, promotions, site utilization, etc. Built-in location analytics Integrated in the WLAN; no extra sensors, appliances, or software Extensible API Integrate location data with CRM, loyalty programs, and custom applications for targeted real-time offers
  • 16. Flexible authentication and access control 16 Flexible built-in authentication mechanism Flexible authentication Secure 802.1x and Active Directory authentication; Facebook Authentication for branding and targeted social marketing; SMS self-service authentication; and hosted sign-on splash pages Dynamic access control Assign clients layer 3 / 7 firewall rules, VLANs, and application-aware quality of service by identity, group, location, or device type
  • 17. Simplified enterprise security 17 Enterprise-class security features for security- conscious environments Air Marshal WIDS/WIPS Detect wireless attacks; contain rogue APs; cloud-based alerting and diagnostics User and device aware security User, device, and group-based firewall rules (layer 3 / 7) with Active Directory integration UTM and content security Application firewall; content filtering matching 1B+ URLs; antivirus/anti-malware filtering; Google safe-search
  • 19. © 2010 Cisco and/or its affiliates. All rights reserved. 19 Detect Engage Drive 19 Cisco Cloud Networking Presence Shopper Presence (associated or non-associated) Deep Analytics & Engagement • Targeted Offers • CRM Correlation • Location Services • Omni-channel Selling • Online Cannibalization Cisco Cloud Networking: Out of Box Analytics Engage Shoppers
  • 20. Location Tracking Approaches • Real-time location tracking and positioning systems can be classified by the measurement techniques they employ to determine mobile device location • Approaches differ in terms of the specific technique used to sense and measure the position of the mobile device in the target environment • Real-Time Location Systems (RTLS) can be grouped into four basic categories of systems that determine position on the basis of the following: 20 Cell of origin (nearest cell) Distance based (lateration) Angle based (Angulation) Location patterning BRKEWN-2650
  • 21. Cell of Origin • One of the simplest mechanisms of estimating approximate location in any system based on RF cells is the concept of ‘cell of origin’ (or ‘associated access point’ in Wi-Fi 802.11 systems) • When receiving cells, provide received signal strength indication (RSSI) for mobile devices; the use of the highest signal strength technique can improve location granularity over the cell of origin. 21BRKEWN-2650
  • 22. Distance-Based (Trilateration) Techniques • Trilateration can be performed by using received signal strength (RSS) • Measured by either the mobile device or the receiving sensor 22 10dB The closer the distance the greater the rate of change in RSS in relationship to distance The change in RSS in relationship to distance flattens out at greater distances BRKEWN-2650
  • 23. Angle-Based (Angulation) Techniques • The AoA locates the mobile station by determining the angle of incidence at which signals arrive at the receiving sensor • Requires two receiving sensors for location estimation, with improved accuracy coming from at least three or more receiving sensors (triangulation) 23BRKEWN-2650
  • 24. Location Patterning (Fingerprinting) • Location patterning is based on the sampling and recording of radio signal behaviour patterns in specific environments • Each potential device location ideally possesses a distinctly unique RF "signature” 24 Because of fading and other phenomena, the observed signal strength of a mobile device at a particular location is not static but is seen to vary over time. As a result, calibration phase software typically records many samples of signal strength for a mobile device during the actual sampling process. BRKEWN-2650