Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1 Northern Universities Network Event 3 – 5 Year View of Technology Chris Blenkhorn Consulting Systems Architect cjb@cisco.com Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2 Roles ??? Networking Data Centre, Servers, Apps Web and Web Apps Development Full depth and breadth of ICT Business Impact of ICT Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3 Market Discontinuities: The Impact of the Consumer and the Home on ICT Mainframe-Mini 1960 Presentation_ID Client-Server Web Database WAN Server LAN 1980 © 2006 Cisco Systems, Inc. All rights reserved. 1990 Cisco Confidential Consumer / Home 2005 4 Sustaining Innovation Create Better Products in an Established Market Disruptive Innovation Establish or Re-shape a Market Future Innovation Address Societies’ Future Imperatives Clayton Christensen Harvard Business School 2004 Innovation … Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5 Topics … Cisco Today Sustaining Innovation: Now Disruptive Innovation: Up to Five Years Future Innovation Q and A Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6 Cisco Today Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7 Now Does Cisco See Its’ Role in the Market? IT and Communications The ‘Network as the Platform’ for Life’s Experiences The Network as the Platform Leader in Next Generation IT & Communications Experiences Worldwide Leader in Networking Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8 Cisco Products and Services At Home Gaming Watching movies and TV Listening Playing to music games iTV Shopping online Digital Imaging At Home Movie Beam/DVR Audio Downloading songs Reading newspapers and magazines E-learning Video Conferencing Playing games Training/VOD/ Web Cast Sending e-mail Sending e-mail Mobile Electronics Talking to friends and co-workers Reading newspapers and magazines Digital Video Collaborating On-the-Go At Work PC Broadband Digital Stream Wireless Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential Mobile Electronics 9 Core (or Foundation) Technologies SWITCHING & ROUTING VIRTUALISATION INTELLIGENT SERVICES PROGRAMMABLE SILICON CORE TECHNOLOGIES Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10 10 Advanced Technologies UNIFIED COMMUNICATIONS WIRELESS DATA CENTRE NETWORKING OPTICAL SECURITY NETWORKED HOME ADVANCED TECHNOLOGIES Presentation_ID © 2003 Cisco Systems, Inc. All rights reserved. © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11 11 Emerging Technologies TELEPRESENCE AON PHYSICAL SECURITY IPICS DIGITAL SIGNAGE SERVER VIRTUALISATION EMERGING TECHNOLOGIES Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12 12 The Cisco Public Sector Strategy: Policy and Technology Drivers Unified Communications Skills, Standards, Governance Focus on skills Focus on ICT standards Architectural Blueprints Drive for best practise / non duplication of effort Improving the Utilisation of all Resources Communications independent of wired or wireless medium, location and end device Ubiquitous UK wireless Intelligent end devices Shared Services ICT consolidation within and between Public Sector organisations Consistent delivery for all applications and services Virtual Data Centres Increasing Cost Effectiveness Workforce Transformation Delivering Personalised Citizen Services New ways of working in the office Mobile workforce Maximum use of voice, video, collaboration and messaging Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Ensuring Ease of Access to Information Virtual compute and storage resources Intelligent information management GRID-style applications Intelligent Building Management Building automation using ICT techniques Small environmental footprints for buildings Changing behaviours of staff and citizens Cisco Confidential 13 Sustaining Innovation Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14 A Long List of Topics … Embedded Systems (and Intelligence) Virtualisation (of everything) and Grid Security (of Infrastructure) and Confidentiality (of Information) Unified Communications and Mobility Technologies Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15 Embedded Systems … A. Put it in Silicon … B. Maximise the Integration of Intelligent Services into the Network Core C. Migrate Application Processing (Middleware) from Servers into the Network – Cisco Application Oriented Networking (AON) Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16 A. Putting it in Silicon: Cisco Chipsets In Comparison Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17 B. Integrating Intelligence into the Network Foundation Applications Call Control Firewall Voice Apps AntiEncryption SPAM SBC SSL Caching RFID Patch Backup Updates Email Replication Database ERP Mobile Multicast Email Voice VPN Mail CRM NASB WAFS IPS Wireless AV Mgmt OS and Middleware TDM Voice Systems Message Disk Management Handling I/O Termination Load Balancing Web File Virtualisation Acceleration QoS TDM Systems Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. IP Network Cisco Confidential 18 C. Cisco Application Oriented Networking (AON) APPLICATIONS, PROCESSES, PEOPLE APPLICATION ORIENTED NETWORKING WEB ERP CRM MFG FIN SCM MESSAGE ROUTING EVENT CAPTURE APPLICATION SECURITY PACKET NETWORK The next stage in the evolution of the network: Process at application message level Able to natively understand the content and context of application messages Enable application to focus on business logic and user interaction while offloading application overhead aspects to the network with no changes to the existing systems Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19 Virtualisation … A. Enterprise Networks Virtual Networks - IP VPN Technology B. Data Centre Infrastructure Virtual LANs and Virtual Switches Virtual SANs Virtual Firewalls Virtual Server Load Balancers Virtual Compute and Storage Resources Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20 Data Centre Infrastructure Evolution: From Silos to Service Oriented Pools Current Infrastructure APPLICATION 1...N Business Challenges TCO Under-utilised Resources Operational Complexity and Inefficiency DEDICATED DEDICATED STORAGE COMPUTING RESILIENCE Inconsistent Security Inconsistent DR DEDICATED NETWORK TCO Controlling Costs Application Service Levels Business Responsiveness Information Management AGILITY Isolated Application Silos © 2006 Cisco Systems, Inc. All rights reserved. Highly-utilised Pooled Resources Standard Operating Environment POOLED POOLED Dynamic Provisioning STORAGE COMPUTING RESILIENCE INTELLIGENT INFORMATION Integrated, multi-layer NETWORK security Tiered Storage and VIRTUALISATION Business Continuance AGILITY Compliance and Resilience Rigid Infrastructure Silos USERS Presentation_ID Future Infrastructure APPLICATION 1...N Cisco Confidential Service Oriented Architecture and USERS Infrastructure 21 Dedicated Data Centre Solution Core • Core Routers • WAN Interfaces • Full BGP Routing • LAN Switches • High availability • Density of Interfaces • High Performance Forwarding • Server Load Balancers • L4-7 HTTP Inspection • Firewalls • Secure Mission Critical Backend Services Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22 22 Consolidated and Virtualised Data Centre Core Data Flow Campus Core Routed Interface Firewall Load Balancer SSL Termination Load Balancer Servers Firewall Backend Servers Core 7680_03_2003_c1 © 2003, Cisco Systems, Inc. All rights Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Ciscoreserved. Confidential 23 23 Virtualised Data Centre Services in Separate Logical Domains Web Servers Application Servers Database Servers Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24 MPLS Network Feeding ‘Virtual Data Centre’ Common VLAN IPX Routing Voice VLAN Voice VRF 10G WAN to Data Centre Trunk Core WAN Cat6500 Presentation_ID Dept #1 VLAN Dept #1 VRF (Separate VPNs / VLANs) © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential Dept #1 Virtual Firewall Dept #N VRF Dept #N Virtual Firewall Cat6500 MSFC Cat6500 FWSM Dept #N VLAN Common IP Server Common IPX Server Dept #1 Server Dept #N Server 25 Virtual Switching Deployment Scenarios: Traditional Multilayer Campus Virtual Switch in the Distribution Layer Si Si Improved scalability since MEC to core cut # of routing peers in half Virtual Switch SSO across switches improves resiliency and eliminates need for HSRP Si Si Double effective bandwidth to any access switch with Multichassis Etherchannel (MEC) Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26 Virtual Switching Deployment Scenarios Data Centre Virtual Switch in Aggregation Virtual Switch in Access DC Core Virtual Switch Aggregation STP blocking MEC to servers simplifies NIC teaming and doubles available bandwidth Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential Access 27 SANS and Storage Virtualisation Mainframes (Ficon) Storage Virtualisation • Presents logical view of storage that is different than physical storage Capabilities • Concatenation • Striping • Mirroring • Snapshots • CDP • CDR • Remote Replication Leverages Intelligent Features • VSANs • Multi-protocol • Remote Tape Acceleration • Write Acceleration • SANTap Standards and Partner Approach • FAIS • IBM, Veritas, EMC Unix/NT Servers FC FC SATA Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential FC 28 Catalyst 6500: Intelligent Service Modules and Virtualisation Flexible VLAN Deployment MPLS / VRF-Lite at the MSFC VLAN Routing at the MSFC Virtual Firewall Services Virtual Server Load Balancing ‘Build Once, Use Many Times’ Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29 Virtual Compute Resources Massive proliferation of server resources CRM ERP SCM Virtual Server Virtual Server Virtual Server • Server manager configures pools of compute, storage and I/O Stand-By Virtual Server Intelligent Interconnect Fabric • Based on application, process, or business objectives Applications Server Processing I/O Storage Resource Pool Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30 Vertical Service Provisioning using VFrame Policies VFrame™ APIs APIs Management App/OS •Virtualisation •Orchestration •Provisioning App/OS App/OS Management Compute Management Security Management Storage Networking Management Network Application Services Management Network Connectivity Services Result: An Application-Centric, Service Oriented Data Centre Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31 Security … A. Wireless Security – Restricted Wireless B. Adaptive Threat Defence C. Automated Monitoring, Analysis and Response Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33 A. Wireless Security: Providing Security at Each Step Secure Mobile Client Components Secure Mobile Infrastructure AP X.509 Certificate Authentication Mobile IP Home Agent VPN Client Mobile Client 802.1x + WPA2/AES VLAN-1 VPN Gateway Controller H/W AES for Backhaul Links IPSec VPN Dynamic WLAN VLAN assignment + 802.11i WPA/WPA2 security Identity-based networking for VLAN assignment 16 MBSSIDs for various authentication types HW-based AES encrypted backhaul links AP authentication protects against “imitation APs” Encrypted control traffic between AP and controller IPSec VPNs for “confidential” mesh client traffic Security Presentation_ID Client and AP Authenticated © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34 B. Adaptive Threat Defence Access Control, Packet Inspection Application Intelligence, Content Inspection, Virus Mitigation Identity, Virtualisation, QoS Segmentation, Traffic Visibility Firewall Services IPS & NW-AV Services Network Intelligence App Inspection, Use Enforcement, Web Control Malware/Content Defence, Anomaly Detection Traffic/Admission Control, Proactive Response Application Security Anti-X Defences Containment & Control Catalyst CSA Cisco Router Cisco DDoS VPN Cisco Router VPN Access Catalyst Quarantine VLAN NAC Presentation_ID Identity-Based Networking Cisco IPS CSA CSA © 2006 Cisco Systems, Inc. All rights reserved. PIX Cisco Confidential 35 C. Automated Security Mitigation, Analysis, and Response: Cisco CS-MARS Leverage YOUR Existing Investment to Build “Pervasive Security” Correlate Data from Across the Enterprise NIDS, firewalls, routers, switches, CSA Syslog, SNMP, RDEP, SDEE, NetFlow, endpoint event logs, multivendor Rapidly Locate and Mitigate Attacks Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential Key Features: Determines security incidents based on device messages, events, and “sessions” Incidents are topologically aware for visualisation and replay Mitigation on L2 ports and L3 chokepoints Efficiently scales for real-time use across the Enterprise 36 Unified Communications … Virtualisation Speech Unified Operations Mgr Any time, anywhere Voice access to services Unity Messaging Mobile Connect Mobility Wired and wireless Presence Unified CallManager Intelligence in the network Unified IP Contact Centre Unified MeetingPlace Rich Media Voice, video & Web collaboration Presentation_ID Policy & Preference IP Phones Service and Support © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential Unified Communicator Find me, follow me, hide me 37 … And Mobility Technologies A. Office Wireless and ‘Wireless Cities’ B. Remote Access Capabilities Day Extender and Tele-working C. Fixed / Mobile Convergence D. Single Number Reach Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38 Disruptive Innovation Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39 A(nother) Long List of Topics … A. Enterprise Architectures B. Intelligent Building Management Physical Security and Analytics C. Web 2.0 and Personalisation D. Virtual Worlds – Second Life Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40 A. Enterprise Architectures An architecture is the fundamental organisation of a system: the relationships between its components and the environment, and the principles governing its design and evolution Business / Industry Architecture: provides customers with a framework to more effectively implement and align business processes to technology capabilities Technology Architectures: provides customers with a framework for optimising their technical resources in support of their business and technical requirements Architecture: Components, Relationships, Principles Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41 The Open Group Architectural Framework (TOGAF) View Qualities Business Applications Infrastructure Applications • Application or Software Developer View of Architecture • Shows the Communications Infrastructure as a thin non-intelligent layer • However similarities to the Cisco Reference Architecture … Application Programming Interface Qualities Graphics and Image Data Management Data Interchange International Operations User Interface Location and Directory Transaction Processing Sys and Net Management Security Software Engineering Qualities Qualities Operating System Services Network Services Communications Infrastructure Interface Communications Infrastructure Qualities Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43 NETWORKED INFRASTRUCTURE LAYER Presentation_ID HR Document E-Learning Management Business Applications Procurement Finance COLLABORATION LAYER Line of Business Instant Messaging Voicemail & Rich Media Unified Conferencing Messaging Collaboration IP VoiceApplications & IP Contact Presence Video Telephony Centre Services Remote File Access Application Enhancing Services Content Delivery Acceleration Web Application Acceleration Voice & Infrastructure Collaboration Services MobilityInfrastructure Services Compute Services Enhancing Enhancing Services Storage Services Identity Services Services Security Services MANAGEMENT, ANALYSIS AND DECISION SUPPORT INTERACTIVE SERVICES LAYER APPLICATION LAYER The Cisco SONA Reference Architecture Network Virtualisation Services IPFoundationand Physical Network, Virtualisation Enabling Services Physical Network Templates Services Services Foundation © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44 B. Intelligent Building Management: Physical Workplace Transformation Delivering space, technology and services differently Transformation Converging information, communication and building technologies Convergence IP - the 4th Utility Foundation LIFECYCLE Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45 Cisco’s Vision for the Intelligent Converged Environment Legacy Cisco Disparate Building Networks Intelligent Converged Environment IP Communications Fire Lighting Physical Security Elevator Visitor Access 24 / 7 Monitor Energy HVAC WAN Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential PORT 46 Cisco Video Surveillance (and Analytics) IP Camera Analog Fixed / PTZ Cameras Cisco Switch Cisco Service Platform with Stream Manager S/W for Local or Remote Digital Recording Cisco IP Gateways Analog to IP Encoders with Stream Manager Virtual Matrix S/W Any to Any Remote Monitoring Cisco IP Gateways IP to Analog Decoders Cisco Stream Manager Configuration and Monitoring S/W CCTV Keyboards / Monitors Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47 C. Web 2.0: The Rise of the Empowered Citizen (or Consumer or Learner) Driving New Types of Interactions with Friends, Colleagues and Organisations Rich Content Creation, Personalisation and Sharing Interaction with Web Content to Increase Richness Combining different sources of content to create an integrated experience Personalisation of web sites using linked advertising and search engines Driving Social Computing and Networking into the Professional Workplace Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48 “http://tim.oreilly.com/news/2005/09/30/what-is-web-20.html” Tim O’Reilly What is Web2.0 September 2005 Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49 Web 2.0 Meme Map Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50 Should You Use Commercial Tools to Create and Share Rich Content? Driving New Types of Interactions with Friends, Colleagues and Organisations Rich Content Creation, Personalisation and Sharing Driving Social Computing and Networking into the Professional Workplace Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51 Should You Encourage Online Citizen (or Learner) Feedback on its’ Services? Driving New Types of Interactions with Friends, Colleagues and Organisations Interaction with Web Content to Increase Richness Driving Social Computing and Networking into the Professional Workplace Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 52 Should You Personalise Your Web Sites with Advertisements? Driving New Types of Interactions with Friends, Colleagues and Organisations Personalisation of web sites using linked advertising and search engines Driving Social Computing and Networking into the Professional Workplace Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 54 Cisco Announces Agreement to Acquire Five Across Inc. Five Across technology to help enhance Cisco customers' website experience SAN JOSE, Calif., February 9, 2007 - Cisco Systems, Inc., (NASDAQ: CSCO) today announced a definitive agreement to acquire privately held Five Across, Inc. of San Francisco, Calif., a leading vendor in the social networking marketplace. The Five Across platform, Connect Community Builder, empowers companies to easily augment their websites with full-featured communities and user-generated content such as audio/video/photo sharing, blogs, podcasts, and profiles. These user-interaction functions help companies improve the interaction with their customers and overall customer experience on their websites. Social networking functions are of unique interest to media companies, sports leagues, affinity groups and any organisation wishing to increase its interaction with its online constituency Cisco Announcement of Five Across Acquisition News@Cisco 9th February 2007 Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 55 “For Cisco, it is about the Human Network. Part of that is becoming part of communities in Real Life, and now, in Second Life. We opened the Cisco campus to better explain and show who we are, what we are about, and how we are powering the Human Network. And, that means more than just showcasing products (or, giving away T-shirts and virtual Cisco phones in Second Life). It means working with the community, becoming part of the community” http://slurl.com/secondlife/Cisco%20Systems/132/132/34/ Cisco Second Life Announcement News@Cisco 1st December 2006 Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 56 Future Innovation Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 57 The Big Issues: Society’s Future Strategic Imperatives …. Demographic and Socio-Economic Change Cross-Border Economic Competition Pressures on Natural Resources and Global Climate Global Uncertainty and Poverty Acceleration in Innovation and Technological Diffusion Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 58 Issues Demographic and Socio-Economic Change Presentation_ID ► Increasing Age of Population ► Retirement Age Raised ► Increased Healthcare Needs ► Social Inclusion © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 59 In the News … Aging Population Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 60 Presentation_ID Issues ► Increasing Age of Population ► Retirement Age Raised ► Increased Healthcare Needs ► Social Inclusion ICT Solutions Demographic and Socio-Economic Change ► Flexible Working ► Connected Health ► Personalised Learning ► Lifelong Learning © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 61 Issues Increasing Pressure on Natural Resources and Global Climate Presentation_ID ► Price and Availability of Fossil Fuels ► Climate Change … is the greatest long term threat facing the world today © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 62 In the News … Climate Change Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 63 ICT Solutions Issues Increasing Pressure on Natural Resources and Global Climate Presentation_ID ► Price and Availability of Fossil Fuels ► Climate Change … is the greatest long term threat facing the world today ► Mobility ► TeleWorking ► Networked Workplaces ► Equipment Efficiency © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 64 Power Supply Efficiency and Power Per Module Catalyst 6500 Power Supply Efficiency has improved from 70%-80% since introduction in 1999. High end power supplies are better than 90% efficient. Catalyst 6500 10GbE w/ DFC 20 Pwr Per port Pwr per port 150 100 50 6802 5 6816 Catalyst 6500 SLB Pwr per FC Port Pwr per Gbps 10 67041st Qtr6708 100 50 0 CSM Presentation_ID 15 0 0 150 Catalyst 6500 GbE w/ DFC © 2006 Cisco Systems, Inc. All rights reserved. ACE Cisco Confidential 14 12 10 8 6 4 2 0 9016 6516a 6724- 6748SFP SFP MDS9500 9124 9148 65 Power Consumption Reduction through Service Integration Application servers typically have multiple appliances associated with them. For Cisco IT this equaled an additional: With ACE and FWSM deployed in a Catalyst 6500 these services reside in the network fabric, eliminating the appliances and their associated load 2.7kW per server Savings = 2.7kW x total servers x kW/hr Cisco IT Estimates $23.5M over 3 Years • Firewall • Load Balancer • SSL Offload Reduces complexity, increase manageability, reduces latency, and eliminates single points of failure Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 66 Thank You Chris Blenkhorn Consulting Systems Architect cjb@cisco.com Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 67 Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 68