Tuesday 17 September 2019

Best Practices for Search Friendly Content, Cisco Marketing Velocity Style

Cisco Online Exam, Cisco Tutorials and Materials, Cisco Learning, Cisco Guides, Cisco Study Materials

Before we begin writing rank-worthy content, let’s first confirm our topic. Not every topic is relevant to search and there’s no need to search optimize an article if no one is looking for it. Opinion pieces and news are two examples of formats that have inherent disadvantages in search. No one’s really searching for them.

So begin by checking your topic against a few basic criteria:

◈ Does the article answer a question?
◈ Does it explain how to do something?
◈ Is it an “evergreen” topic that won’t quickly go out of date?
◈ Is it suggested by Google?

That last criteria makes it a sure bet it has SEO potential. If you see that Google is suggesting the phrase when you begin typing, it’s vetted as a search-friendly topic.

Cisco Online Exam, Cisco Tutorials and Materials, Cisco Learning, Cisco Guides, Cisco Study Materials

You’ve picked your topic, so you’ve picked your target keyphrase. Now we’re ready to begin constructing a search friendly article.

Tip! Keep in mind that the longer the keyphrase, the easier it is the rank for. Only the very famous websites will rank for one- and two-word phrases. Virtually any website can rank for the six- and seven-word phrases! 

1. Search-Friendly Title and Headline


The title tag (<title>) and the header (<h1>) should both include the target keyphrase, ideally at the beginning.

The title and the header don’t need to be identical. Headers can be long, but for the title tag, keep the total length to 60 words. This will keep it from getting truncated when Google uses the title as the link in Google search results.

Cisco Online Exam, Cisco Tutorials and Materials, Cisco Learning, Cisco Guides, Cisco Study Materials

Consider using punctuation such as parentheses or a colon to create double headlines. The first half should use the target keyphrase. This helps the rankings. The second half should use numbers, specific benefits or unexpected words. This helps the clickthrough rate.

Here are a few examples:

◈ Video Conferencing Tips for Sales Teams: 5 tips for better remote meetings
◈ Career Tips for Tech Support Professionals (and how to jump to a senior role)
◈ How to Configure a Switch to Be a Root Bridge: 3 Steps for Manual STP Setup 

2. Semantically Related Phrases

It’s good to use the target keyphrase in the body text. It’s even better to use the semantically related phrases. Which phrases are semantically related to your topic? Look around and you’ll find them everywhere:

◈ Other words suggested by Google when you search for your target keyphrase
◈ Phrases in the “Searches Related to” box at the bottom of the search results page
◈ Questions in the “People also ask” box

As you write, work these into your article. It’s good for rankings because it’s good for quality. A great page on your topic should also cover these related subtopics. It should answer all of the related questions.

3. Format for Scan Readers

If the visitor clicks on your search listing, but leaves after just a few short seconds, Google sees this as an indication that your article isn’t high quality and isn’t rank-worthy. So getting the visitor to stick around is important for maintaining your rankings.

How can we get the visitor to engage? By making the content easy to scan. That starts with short paragraphs. No one wants to read a long, dense block of text. So keep your paragraph length down to three or four lines.

Next, use lots of formatting to keep the scan readers flowing.

◈ Subheads
◈ Numbered lists and bullet lists
◈ Bolding and italics
◈ Multiple images, diagrams, charts
◈ Contributor quotes from experts

We all have to accept that visitors aren’t going to read everything. Research shows that on a typical visit to a typical webpage, visitors have time to read 28% of the words at most (20% is more likely)

Cisco Online Exam, Cisco Tutorials and Materials, Cisco Learning, Cisco Guides, Cisco Study Materials
Source: NN Group

But visitors are more likely to keep reading, even if the article is very long, as long as it’s formatted to be easily consumed. So break it up, add white space, and help scanners get to the information they’re looking for quickly.

4. Research, Data, Statistics

Some assertions are backed by evidence. The rest are simply unsupported claims. When you add research data, you are instantly more credible. Your case is stronger. Your message is supported.

Example: The last section of this article made an assertion (formatting is important because visitors are scanning) that was supported by data (NN Group found that visitors aren’t reading everything) making the point stronger.

Bring data to your articles. It will give you the opportunity to add visuals and it will make your content more likely to be cited by others in their content.

5. Internal Links

Finally, search-friendly content is interconnected. It has links from other pages which give it authority. But it also creates deeper paths into other content, helping to prevent the visitor from going back to search results.

Here is a list of links that work:

◈ A link to an older article

Never miss the chance to connect your new articles to high value content you’ve already created.

◈ A link from an older article to your new article

You’re not done publishing something new until you’ve linked to it from something old!

◈ A link to a product or service page (on our site or on Cisco)

Ideally, this content drives demand. You can trigger this by gently guiding visitors toward offers that relate to your content. Anytime you mention a product or service, link.

◈ A link to a related article on another Cisco partner website

We should build relationships with other Cisco partners, let them know what we’re working on. We should find out what they’re publishing. And then link to each other whenever possible. This can do wonders for our search rankings long term.

Our content should work together, and we can work together to make it work harder. Our content should never be isolated and our teams shouldn’t work on islands.

Building interconnected hubs of content that links from one article to the next, on our site and on other partner sites can give us huge and durable benefits in SEO. Build a network of content creators and sync your publishing calendars. This, plus quality and persistence, is the key to winning the top spot in search.

To become a true SEO pro and learn even more about the tactics described above, be sure to check out my latest webinars in Marketing Velocity Learning. SEO Principles and Practices provides an introduction to creating high-ranking content and Advanced SEO takes you beyond the keyword for a practical approach to the future of search.

Saturday 14 September 2019

Cisco DNA Center Network Operations Center Dashboard

Background


One common request from customers is a Network Operations Center dashboard view for Cisco DNA Center.  They would like this to be open-authentication (no need for credentials) and automatically refresh.  Critical data from Cisco DNA Center, such as network device and user health can be displayed and updated for the operations team on a large screen.

Using common tools like Influx (time series), telegraf (agent) and Grafana (visualization) (TIG) it is trivial to build a small dashboard and expose it via HTTP.  Many customers are already using these tools for other dashboards.

Cisco DNA Center, Cisco Learning, Cisco Tutorial and Material, Cisco Online Exam
Telegraf-Influx-Grafana stack

The only real work I need to do is write a small python script to plug into telegraf to collect network and user health data from Cisco DNA Center and convert it to a simple JSON format.

For this script I am going to use the newly released Cisco DNA Center python SDK.

Getting started


The first step is to download the code from github and create a python virtual environment. The virtualenv is recommended, but optional.

git clone https://github.com/CiscoDevNet/DNAC-NOC.git
python3 -mvenv env3
source env3/bin/activate

Next install the python requirements (the dnacentersdk). It is a good idea to update pip first, as older versions may have issues installing the SDK.

pip install -U pip
pip install -r DNAC-NOC/requirements.txt

Now test the script to ensure it is working. By default the script will try to connect to the DevNet always on sandbox.  The data collected includes device health and counts as well as user (wired and wireless) health and counts.   There is more data that you can collect by modifying the script.

$ ./DNAC-NOC/dnac_assurance.py 
{"Core.count": null, "totalcount": 14, "WIRELESS-client.count": 80, "WLC.count": null, 
"WIRED-client.count": 2, "AP.count": null, "WIRED-client.value": 100, "Access.count": null, 
"totalscore": 100, "WIRELESS-client.value": 25, "AP.score": 100, "Router.score": 100, 
"ALL-client.value": 27, "Router.count": null, 
"Access.score": 100, "Core.score": 100, "WLC.score": 100, "ALL-client.count": 82}

Script Detail


There are two APIs used to get this data seen in the code below.

“get_overall_network_health” returns the health (and count) of the network devices. They are broken into categories (WLC, router,AP, access etc).  It requires a timestamp, but that can be left empty (returning the latest).

“get_overall_client_health” returns the health (and count) of clients.  In this case I need to provide a timestamp.  That is the current time (in epoch) converted to milli-epoch (i.e. multiply by 1000).

network_health= dnac.networks.get_overall_network_health(timestamp='')

timestamp = int(time.time() * 1000)
client_health= dnac.clients.get_overall_client_health(timestamp='{}'.format(timestamp))

Telegraf configuration


I am assuming you have telegraf setup and integrated into influxdb.  As there are many blogs outlining how to install these components, I will skip over these basic steps.

The custom python script above will be run every minute and update a time series database in influxdb.  The custom.conf file contains information on how to run the script.  You need to edit this file to change the path for the python virtual environment and the script.

Once you copy the script, restart telegraf so the custom script will be executed.  The script is called every minute as the client health score gets updated every minute.

sudo cp DNAC-NOC/telegraf.d/custom.conf /etc/telegraf/telegraf.d/
sudo systemctl restart telegraf

You will now see data being populated in influxdb.

$ influx
Connected to http://localhost:8086 version 1.7.8
InfluxDB shell version: 1.7.8
> use telegraf
Using database telegraf
> show field keys from "exec_dnac"
name: exec_dnac

fieldKey fieldType
ALL-client.count  float 
ALL-client.value  float 
AP.score  float 
Access.score  float 
Distribution.score  float 
Router.score  float 
WIRED-client.count  float 
WIRED-client.value  float 
WIRELESS-client.count  float 
WIRELESS-client.value  float 
WLC.score  float 
totalcount float 
totalscore float

Grafana configuration

The final step is to import a json definition of the DNAC dashboard into gafana.

First browse to gafana homepage (typically port 3000).  The select “+” -> create -> import

Cisco DNA Center, Cisco Learning, Cisco Tutorial and Material, Cisco Online Exam
Import Dashboard

Next select “upload .json file”

Cisco DNA Center, Cisco Learning, Cisco Tutorial and Material, Cisco Online Exam
Upload .json File

The select “grafana/dashboard.json” from the files you downloaded from GitHub.

Cisco DNA Center, Cisco Learning, Cisco Tutorial and Material, Cisco Online Exam
select dashboard.json from the “grafana” directory

Then select Import.

Cisco DNA Center, Cisco Learning, Cisco Tutorial and Material, Cisco Online Exam
import dashboard spec

Very soon you should see the dashboard being populated.

Cisco DNA Center, Cisco Learning, Cisco Tutorial and Material, Cisco Online Exam
First data

Friday 13 September 2019

New Threat Grid App for IBM QRadar SIEM

Two years ago, Cisco and IBM Security announced a strategic alliance to address the growing threat of cybercrime. This collaboration builds on each organization’s strengths and complementary offerings to provide integrated solutions, managed services and shared threat intelligence to drive more effective security for our joint customers. We continue to develop new applications for IBM’s QRadar security analytics platform and the Cisco Threat Grid app for QRadar with DSM was just released.

Cisco’s Threat Grid App integrates with IBM’s QRadar SIEM, enabling analysts to quickly identify, understand and respond to system threats rapidly through the QRadar dashboard. Downloadable via the IBM Security App Exchange, this powerful app combines advanced sandboxing, malware analysis and threat intelligence in one unified solution.

Threat Grid + QRadar enables analysts to quickly determine the behavior of possible malicious files, which have been submitted to Threat Grid, and rapidly drill down from QRadar into the Threat Grid unified malware analysis and threat intelligence platform, for deeper insight. This integration expedites the threat investigation process, with a dashboard view into the highest priority threats, delivered directly through QRadar versus having to pivot on disparate tools and interfaces.

Detailed results from the sandbox analysis of Threat Grid can be aggregated by QRadar to determine whether the potential threats within the organization are malicious or benign. Malware samples are then assigned a Threat Score, and displayed by hash value and the user which submitted the sample.

Cisco Tutorials and Materials, Cisco Certifications, Cisco Learning, Cisco Online Exam, Cisco Guides

This information displayed on the Threat Grid dashboard can be used to quickly resolve threats detected by QRadar. This results in improved efficiency and optimization for security analysts, by quickly identifying the top priorities for threat investigation.

With the QRadar DSM capabilities, you can see the analysis results over time.

Cisco Tutorials and Materials, Cisco Certifications, Cisco Learning, Cisco Online Exam, Cisco Guides

Also, under Log Activity, for suspicious IP addresses, you can use the right-click to see instant contextual threat intelligence from Threat Grid.

Cisco Tutorials and Materials, Cisco Certifications, Cisco Learning, Cisco Online Exam, Cisco Guides

Threat Grid also integrates with IBM Resilient Incident Response Platform (IRP) for automated response and X-Force Exchange for even greater threat intelligence enrichment. For example, analysts in the IRP can look up Indicators of Compromise (IoC) with Cisco Threat Grid’s threat intelligence, or detonate suspected malware with its sandbox technology. This empowers security teams to gain valuable incident data in the moment of response.

These technology integrations between Cisco Security and IBM Security enables a more extensive security architecture for greater speed and efficiency in identifying, investigating, and remediating threats. Together, we deliver the intelligence, automation and analytics required to provide data and insights that today’s security practitioners require.

Thursday 12 September 2019

Business Benefits of Segmentation with Software-Defined Access

The goal of moving applications to the cloud and integrating with SaaS platforms is to satisfy the growing demand for connectivity to data resources and applications at any time, from anywhere. However, achieving that goal with high levels of Quality of Experience (QoE) for applications depends on the enterprise wide area networks. Managing QoE connectivity among campus, branch, and cloud resources naturally increases network complexity. That translates into an increase in workload for IT teams to keep up with changing prioritization of traffic, network access rules, and data security policies.

Cisco Prep, Cisco Tutorials and Materials, Cisco Certification, Cisco Learning, Cisco Online Guides

But just because a network is complex doesn’t mean it has to be complicated. A Software-Defined Architecture (SDA) is the antidote for complicated. Separating data, control, and management planes makes networks both more flexible and manageable by automating many formerly manual tasks. A significant portion of those tasks are handled by Cisco Software-Defined Access (SD-Access) working at the controller plane level, reducing complexity and improving scalability and mobility of devices and the workforce.

Empowering IT with an Architecture for Access


When people, devices, and applications are located anywhere, automating the onboarding and provisioning of them with the correct access and security policies is paramount to maintaining control and security. SD-Access applies access and security policies generated by network intents. Translating intents into actions is the foundation of Intent-Based Networking, where higher-level business intents create network access and security policies that are automatically applied to devices and people to determine access rights and security privileges.

SD-Access simplifies network management, especially for segmentation and secure access policies, but also for operational consistency, increasing productivity, and a seamless experience. In this post, we will examine the business and security benefits of automating segmentation and access control.

Automation Simplifies Network Segmentation Management

To simplify the complexity of campus-branch-cloud connectivity, SD-Access shifts the workload from IT staff performing routine tasks of onboarding every individual device and managing network configurations, to building intelligence into the network itself. The network learns to manage itself by, for example, automatically onboarding specific device types with pre-ordained security and access policies that follow people and devices across the wired and wireless fabrics, from ground to cloud.

Automating access and segmentation is also critical for the successful integration and security of the Internet of Things (IoT) and the myriad types of devices that are being deployed throughout buildings, campuses, branches, and cloud edge. As sensors, cameras, and edge-processing applications proliferate, they need to be securely added to network segments with tight control over who and what can access them, and with which services they can communicate.

Video cameras, for example, should only communicate with a video server, not an application or web server. Placing cameras and their peer servers in one segment, isolated from other enterprise network assets, is a simple way to secure video devices. As additional cameras are connected, the network recognizes the device type and automatically adds them to the correct segment. Sudden changes in attempts to communicate with resources outside the segment can indicate a takeover attempt by malware, resulting in the network isolating the device  and thwarting the malware’s attempt to move laterally through the network.

The business benefits of automating onboarding of devices are plentiful: from eliminating the need to send technicians to remote locations to securely configure devices, denying access to unknown devices to prevent infections from spreading, and enabling IT to move from routine tasks to working on innovative projects.

Cisco Prep, Cisco Tutorials and Materials, Cisco Certification, Cisco Learning, Cisco Online Guides

Cisco SD-Access gives IT time back by reducing the effort it takes to manage and secure the network and improve the overall end-user experience.

Enforce Consistent Policies Across the Enterprise

Consistency is key to ensuring people, devices, and data resources all interact according to network policies. For enterprises with many regional locations, it’s common to have instances of Cisco DNA Center for each region to provide location-specific contextual insights for faster issue resolution and capacity planning. That could complicate the consistent application of policies. Fortunately, the regional Cisco DNA Centers can leverage a master instance of Cisco Identity Services Engine (ISE) so that SD-Access can apply access and segmentation policies across each region. With this capability, SD-Access ensures that security and access policies defined by corporate IT are implemented consistently across global networks, while enabling regional control over specific aspects of workforce and device rules.

Segmentation Eases Regulatory Compliance

With all the new privacy regulations coming online across the globe, being able to demonstrate compliance with these rules is paramount to avoiding legal battles and court fines resulting from data breaches. Employing SD-Access to define segmentation to keep private information strictly separated from other business data helps organizations prove they are in compliance.

Compliance with Payment Card Industry (PCI) regulations for protecting payment card information is an example of the business benefits of segmentation that SD-Access can manage. To comply with PCI standards, payment data must be kept separate from any other IT system and limit access to specific people and processes with no external internet connections—thus contained in a “PCI Island”. SD-Access creates microsegments that effectively isolate every device and application that “touches” payment data, effectively creating virtual PCI Islands where they are needed in a global network.

Building this level of segmentation would be difficult with a manual, case-by-case approach. Assigning people and compute resources to a PCI Island security group tag (SGT) simplifies segmentation, helping to maintain compliance, saving time and minimizing rigorous PCI testing. Securing payment and personal information this way also reduces the risk of exposing sensitive data in breaches.

SD-Access Directly Benefits Business Processes Across Industries


Every industry is moving applications and data to the cloud, some faster than others, but all driven by competitive pressures, operational changes, and regulatory demands.

◈ Healthcare organizations are methodically moving sensitive patient data to cloud platforms where it can be accessed by healthcare providers distributed across regions, while ensuring that access is strictly controlled and monitored for compliance.

◈ Pharmaceutical enterprises, which use acquisitions as a growth strategy, use SD-Access to simplify their network operations and the process of integrating IT operations by first segmenting resources during the acquisition process, and then uniting them by changing access policies across the board as the acquisition culminates.

◈ Government branches, consisting of dozens of agencies, use SD-Access to streamline, unite, and secure wired and wireless network operations among the distributed workforce in offices, branches, and in the field.

◈ Manufacturing facilities, which have a complex mix of IoT devices, mobile computing, and data center resources, use SD-Access to segment traffic to provide the appropriate SLAs for latency for time-critical manufacturing processes, keep malware from spreading should one device be infected, and provide secure workforce access to the appropriate applications.

◈ Financial institutions with highly distributed sites use SD-Access—along with SD-WAN—to securely connect branch and headquarter networks while ensuring that sensitive data is accessible only to employees with the appropriate access privileges.

While each industry has its own path for designing and building a software-defined architecture based on SD-Access, ISE, and Cisco DNA Center, most achieve breakeven results in about 14 months, an ROI of 300%, and cost savings of over 52%. In addition, business benefits often shared by Cisco customers are a 67% reduction in network provisioning costs, 48% reduction in the cost of a security breach, 80% reduction in cost to resolving networking issues, and 94% reduction in the cost to optimize policies.

It’s time for your organization to examine how to benefit from software-defined segmentation based on SD-Access.

Tuesday 10 September 2019

Automating Your Network Operations: Focus on Outcomes

When I started this blog series, I had intended to present a cohesive approach to automating your network operations, eventually leading to DevOps. The intent was to take you beyond simply automating ad-hoc tasks using contrived examples to a more systematic way of automating your network operations (hence the title). Unfortunately, I completely failed because I presented it in an ad-hoc way. So in this blog, I am going to go back to the beginning: What are we trying to achieve?

Before I do that, I want to introduce a new blogger, Jason King. Jason and I have a very similar background in operations and development. We’ve both spent a large part of our careers on the front lines designing, building, and operating large systems and networks and hope to leverage that experience in our blogs, repos, and other works. With his help, hopefully we can get the series moving more smoothly.

Automated Humans vs. Automated Business


Do we just want a human to be able to perform a single operation faster? If so, then we might not actually achieve that. Why is this? Automation is geared at deploying single or multiple changes across a large number of devices. However, many changes do not fall into this category.

Engineering vs. CRUD


There are basically two types of changes that are made to a network in steady state operations:

◈ Architectural/Engineering: These are changes to the architecture of the network (e.g. Routing, QoS, Multicast) that generally affect the entire network. It is also the architecture for how new services are deployed (e.g. tenants, remote sites, etc.)

◈ Create, Read, Update, Delete (CRUD): These are changes that deal with delivery of network services to a particular customer or application (e.g. putting a port in a VLAN, adding an ACE to an ACL, or adding a load balancing rule).

The rigor of DevOps is absolutely the way to make major architectural changes to a network because of the network-wide effect that these changes have and the relatively small number of changes that occur.

CRUD is often different, however. While making a single change (e.g. SNMP Community Strings) on thousands of devices is an operation for which the overhead of DevOps is justified, that same overhead may significantly slow down operations involving a single change on a single device (e.g. changing a port VLAN).

The DevOps overhead is not necessarily a bad thing, even for small changes. There are significant advantages in enforcing configuration management, revision control, code review, and testing on every change. It does not, however, always make network operations faster or easier. This increased friction can make it unpalatable to many network teams and hinder adoption.

Constraints-based IT


There is also the Theory of Constraints with states that “any improvements made anywhere besides the bottleneck are an illusion.” (Eliyahu M. Goldratt, 2014)

Cisco Tutorials and Material, Cisco Learning, Cisco Certifications, Cisco Online Exam

This means that if you are automating processes that are not slowing down your business, you are not having an effect on your business. The entire effort is potentially a waste of time and money. That is why automation should begin with a thoughtful process that identifies the most important outputs of your infrastructure and what the current bottlenecks are in producing those outputs.

In general, automation is going to provide your business two main improvements:

Cisco Tutorials and Material, Cisco Learning, Cisco Certifications, Cisco Online Exam

When your enterprise produces customer value faster (e.g. onboarding new customer and/or offering new services), the business generally brings in more revenue. Adding a faster time to remediation (e.g. less maintenance and quicker trouble resolution) reduces operating costs and increases customer satisfaction. When done right, it is a powerful combination proves the best outcomes for any automation project.

This is why we must focus on automating business processes and not just humans. In fact, the best way to automate a business is to remove the human from the process, at least from that value chain between the customer’s request and the delivery of that request.

“If it does not have an API, it does not exist”
– Mitchell Hashimoto

Automating Business Processes: API-Driven Automation


When we consider how to automate business processes, we must focus on reducing the time between the time a customer requests a new service and the time they receive that service. Humans, generally, are not the best way to reduce this time, which is where APIs come in. APIs allow each step of the process to be automated.

For example, when a user wants to add a firewall exception for a new server, they can go to a self service portal to make that request. That request can then go through the review process to make sure that it is aligned with business policies (hopefully automatically) and appropriately approved. Once it is approved, the ITSM pokes the automation framework through an API to begin the delivery of the service. The advantages of this approach is that:

1. It takes the network team out of the CRUD
2. It allows the network team to define and put checks around how changes to the network are performed

Cisco Tutorials and Material, Cisco Learning, Cisco Certifications, Cisco Online Exam


Hold the phone!


We are going to let a customer request a complex service with potentially harmful repercussions without having a human in the loop??? Well … yes. But even if you do need a human in the loop, you don’t need an entire team of them in the loop. And in either case, that is why DevOps is important. DevOps is not just automation, it is the development, testing, deployment, and validation of the artifacts that provide the service. If you properly develop and test these artifacts, you can be reasonably assured that the process does not go pear shaped. If you do the proper validation of deployed services, you can “fail fast” back to a previous version of the artifacts.

DevOps is the safety harness for automation, but that does not mean that you cannot start automating without it. In fact, very few organizations are able to implement a righteous DevOps pipeline in one go. The DevOps journey should be viewed as a stepwise approach to delivering business value. In this blog, we have provided some criteria for how to determine what to automate in order to achieve maximum value. You should not automate just to automate. Start with automation that addresses your critical business needs that fall into the categories outlined above, but always keep an eye on the end goal of building toward DevOps processes and, ultimately, business transformation.

Cisco Tutorials and Material, Cisco Learning, Cisco Certifications, Cisco Online Exam

What’s next?


Well, instead of writing blogs over the past 6 months, we’ve been working with a team of people to create a CI/CD pipeline for SD-WAN. Not a set of examples of what you could do, but a fully functional, operationally righteous framework that we and our customers use in their operations. To get there, we wrote Ansible modules for Viptela, VIRL, NFVIS, and PyATS that automate every step of the process. We’ll cover this in our next blog, followed by an in-depth treatment of each component and how to consume it individually on your stepwise path to DevOps.

Saturday 7 September 2019

How to Prepare for 200-105 exam on CCNA Routing and Switching?




Exam Name: Interconnecting Cisco Networking Devices Part 2

Exam Code/Number: 200-105 ICND2

Exam Overview: 

Cisco CCNA 200-105 Routing and Switching (ICND2) exam tests a candidate's knowledge and skills related to LAN switching technologies, IPv4 and IPv6 routing technologies, WAN technologies, infrastructure services, and infrastructure maintenance.


Sample Questions: Cisco 200-105 Sample Questions

Thursday 5 September 2019

Mobile Operators and 5G: Evolving into Digital Service Providers

5G is a revolutionary technology that’s expected to enable Industrial Digitization. It envisions a digital network that enables society to become mobile and connected, while driving value creation in sustainable business models. 5G implementation will have an impact in social and business developments some of them would be as:

◈ High-capacity or high-performance outdoor and indoor broadband access in high density spaces
◈ Increased user mobility
◈ Proliferation of Internet of Things (IoT) devices
◈ Extreme real-time communication
◈ Ultra-reliable and lifeline communications

With 5G technology powering the next wave of business ecosystems and capabilities, a new and diverse revenue mix will be created for mobile operators who can turn their mobile networks into platforms for deeper interaction with content and services. This transformation to digital service providers will facilitate the creation of new disruptive business models coupled with lean operational efficiency. While this evolution has the potential to drive revenue streams for service providers into enterprises and vertical solutions, it is a significant business and technology transformation that must be visualized in an end-to-end fashion. The technology transformation is underpinned by the Network as a Service (NaaS) model, which creates a slice in the network to carry various types of traffic and service SLAs over a single network.

The Business Proposition for 5G


Cisco Tutorials and Materials, Cisco Learning, Cisco Online Exam, Cisco Certifications

The new network infrastructure will address exponential bandwidth demands, massive logic scale, and the rise in low-latency requirements from new applications and services in an efficient, automated, and programmable manner using a flexible and agile network fabric.

Operators can grow Enterprise revenue streams through use cases like Fixed Wireless Access (FWA) and create varied business models as 5G enables IoT, machine-to-machine communication at scale, and low latency services, also known as ultra-reliable low-latency communication (URLLC).

The adoption of technology advancements in the radio domain also offers the potential for operators to accelerate the implementation and monetization of massive multiple-input and multiple-output (MIMO) technology. MIMO allows the dynamic transmission of data as highly focused beams to send and receive multiple data signals simultaneously over the same radio channel, with multiple users using the same time and frequency resources through millimeter wavelengths and small cells.

Bringing possibilities to life using Network as a Service (NaaS)


For operators to provide the use cases detailed above, the network must be used as a Service. There will be a need for a flexible, dynamic network configuration based on user-specific service requirements, as opposed to a one-size-fits-all architecture. To achieve the Network as a Service approach, network slicing – a critical service feature, is introduced in 5G technology. This feature, coupled with a slice orchestration engine, working in tandem and across various domains, as well as software-defined networking (SDN) controllers, allow operators to offer the NaaS solution to their enterprise customers.

Network slicing allows multiple logical networks to be run as virtually independent business operations on a common physical infrastructure. Network slicing provides a network with user-specific functionality without losing the economies of scale of a common infrastructure. Network slicing will be an end-to-end solution approach, traversing across the different layers of the packet network from access to core. For implementation, Network slicing will require platforms to be much more programmable, intelligent, and flexible in order to cope with heterogenous environments and requirements.

Cisco Tutorials and Materials, Cisco Learning, Cisco Online Exam, Cisco Certifications

The new services enabled by 5G will require that separate slices can be provisioned for different services based on the operator’s requirements, as well as those of the enterprise customer. Network slicing can be a combination of hard and soft slicing; hard slicing comprises the creation of separate planes or topologies with dedicated links, while soft slicing is a logical isolation and traffic classification using VPN and quality of service (QoS).

Cisco Tutorials and Materials, Cisco Learning, Cisco Online Exam, Cisco Certifications

In the 5G era, a single network infrastructure can meet diversified service requirements. A 5G E2E network architecture is envisaged to have the following attributes: Provides logically independent hard and soft network slicing on a single network fabric to meet diversified service requirements and provides Telco Cloud consisting of DC SDN fabric and virtualization stack, providing a platform to host 5G infrastructure services as well as business services. Radio disaggregation and virtualization will reconstruct radio access networks (RAN) to provide massive connections of multiple standards and implement the on-demand deployment of RAN functions required by 5G. This also simplifies the core network architecture to implement the on-demand configuration of network functions through control and user plane separation, on-demand distributed functions and workloads, and unified orchestration and management.

The key tenets of 5G network transformation


Traditionally, mobile operators have had network architectures that are complex, rigid, monolithic resulting in high operating costs. To be operationally efficient, agile and to deliver NaaS, Service Providers will have to transform to Network Cloud architectures for 5G. The key tenets of this transformation are as follows:

◈ Transport simplification 
     ◈ To reduce the number of devices from access to core, states and protocols on the IP transport layer with stringent timing considerations
◈ Network functions virtualization (NFV) 
     ◈ Benefits include virtualization, disaggregation, agility and the ability to drive Capex savings leveraging non-modified opensource technologies
◈ Distributed Edge Cloud 
     ◈ Hosting services at the network edge translates to bandwidth savings and a better user experience while reducing touchpoints for network operations and management if deployed correctly
◈ SDN and Orchestration 
      ◈ To build an automated network service and analytics framework visualized to a network management for reduced time to market and improve operational efficiency

Bringing it all together: Cisco 5G


Network as a Service is a key framework for operators to monetize 5G. Cisco’s approach is to build a programmable, packet-based network architecture with orchestration and closed-loop automation. This takes place across various domains of the 5G network like Transport networks, Central and Distributed Edge data centers to host cloud-native network functions in an agile manner. This approach empowers operators to transform holistically from the one-size-fits-all approach to a dynamic network slice architecture to capitalize on the opportunity 5G will bring.