Wednesday 4 November 2020

Protecting Our People

Cisco Executive Platform, Cisco Exam Prep, Cisco Certification, Cisco Guides, Cisco Study Materials

You might have read about a claim brought against Cisco by California’s Department of Fair Employment and Housing (DFEH) on behalf of a current Cisco employee, claiming that the employee (we’ll call him “G.,” not his real initial) was denied opportunities by his manager on the basis of G.’s Indian caste. Because the claim of caste discrimination is novel in the American legal system, it has received a lot of attention. This blog is to update you about this case and what we’ve learned.

For those not familiar with the concept of caste, caste refers to a system of dividing society into hereditary classes, some of whom inherit exclusive privileges. While caste is most frequently used to refer to distinctions in Indian society, the concept is a useful one for understanding many different kinds of discrimination based on hereditary characteristics. Isabel Wilkerson, whose Warmth of Other Suns helped me understand the insidious nature of anti-Black racism in the US, has written a magnificent new book applying the concept to US racism, entitled Caste: The Origin of Our Discontents. To understand the analysis more fully, you may want to read the book, or read Harvard Law Professor Ken Mack’s great Washington Post review.

Cisco has a long history of zero tolerance for discrimination. We began pay equity reviews more than five years ago, and have extended that to promotions and the full spectrum of compensation, beyond base pay. With our roots in California, Cisco has long taken an expansive view of workplace discrimination and, even before the US adopted legal protections based on sexual orientation, we pledged to and did investigate (and where needed remediate), any case raising issues of discrimination based on LGBTQ status. We also are committed to transparency. Unlike many companies, we are fully transparent with our employees and our Board about the number of internal complaints raised by employees alleging bias, discrimination, harassment, or bullying and bad behavior.

Our conscious culture is a big part of the reason that we recently were selected for the second year in a row as Global #1 in the “Great Places to Work” survey. The results are based on our own employees’ own responses to the survey. Part of being a great place to work means honestly confronting challenges and pushing ourselves to do better. When G.’s complaint came to our Employee Relations Department, it was indeed novel – we had never encountered a claim of casteism. Nevertheless, Employee Relations management instructed that it be investigated as would be any complaint of discrimination, even though there is no law, federal or state, defining caste as a protected classification. Here’s what we learned:

☉ G. was hired by Cisco approximately five years ago as a Senior Engineer working on highly coveted, advanced projects. G. was recruited and hired to the role by someone G. had known since they had attended university together in India. That person became G.’s manager at Cisco.

☉ In keeping with the special role working on advanced technologies for which he was recruited, G. received from his manager special bonuses to come to Cisco. Even within that special projects team, G. was among the highest compensated members.

☉ G. claims that shortly after he started at Cisco, the same manager who recruited and hired him for this selective engineering position, and knew his caste when he did so, had told another team member the year before that G. was not on the “main list” at their university, which G. feels revealed G.’s caste to his coworker. G. does not allege that he suffered any discrimination in this first year even though his caste was apparently known to some of his coworkers. G claims that he spoke to his manager about this alleged statement and that his manager thereafter retaliated by failing to give him a leadership position in the aftermath of a team restructuring, and isolating him from the team.

☉ G. also alleges that his subsequent manager continued the alleged acts of retaliation and discrimination. And he alleges that another coworker of Indian origin (whose caste G. doesn’t mention) received a management role that he wanted.

☉ The manager against whom the vast majority of these allegations were made, is the same manager who hired, gave leadership opportunities, provided top compensation, including special bonuses, to G., all the while allegedly having knowledge of G.’s caste because of their relationship that dated back to their studies together.

The Cisco investigation was thorough and complete. We found no evidence that G. was discriminated or retaliated against on the basis of caste. G. also had the opportunity to seek a thorough second-level review of the outcome of the initial investigation, which was conducted, and the initial findings of no caste discrimination or retaliation were confirmed. Given our principles, had we found discrimination or retaliation, we would have remediated it, regardless of the fact that there is no legal basis in the US for a claim of caste discrimination.

Ultimately G. sought out, was offered, and accepted a lateral role on another engineering team at Cisco, where G. still works, with no degradation of compensation.

Given this history, we were surprised the California DFEH decided to file a complaint. Concerned that G. might be discriminated against further were his caste publicly known, DFEH and G. have insisted on keeping G.’s identity confidential, a courtesy neither he nor the DFEH extended to G.’s former managers. Instead, they publicly named the managers, resulting in harassment and abuse on social media with no chance to be heard and defend themselves.

We must of course respond to the DFEH complaint. G. signed an arbitration agreement when his employment at Cisco commenced, and once we informed the DFEH that we would be asking the court to refer the case to arbitration, the DFEH voluntarily dismissed the case from federal court and refiled in state court. Even now that we are in state court, we are asking the court to refer the case to arbitration. We have a workforce in the US of over 30,000 employees. And, in the past five years, we’ve only had 14 employee-initiated claims proceed to arbitration.

Cisco Executive Platform, Cisco Exam Prep, Cisco Certification, Cisco Guides, Cisco Study Materials
We are well aware of the concerns about arbitration that have been raised in the context of the #MeToo movement. To ensure those concerns are addressed for all claims of unfair treatment by our employees, we’ve taken intentional steps to ensure that all arbitrations arising from claims brought by Cisco employees address these concerns:

◉ We don’t ask that employees keep the results of arbitration confidential (even though we are bound to do so if the employee requests);

◉ Employees choose the site of arbitration, so employees aren’t forced to pursue their claim in a far off or inconvenient place;

◉ Cisco pays for the costs of the arbitration;

◉ The employee is a coequal partner in selecting the arbitrator – this isn’t our decision alone; and

◉ If we enter into a settlement agreement, we do not require confidentiality regarding the facts of the case.

Given G.’s reputation concerns and desire for privacy, arbitration should be G.’s preferred forum as he will be able to control whether it is public or not.

We thoroughly examined G.’s concerns and continue to believe that he was treated fairly. We also don’t believe we should be subject to claims either in court or in an arbitration for a form of alleged discrimination that is not legally recognized. We would however fully support the Legislature adding caste to the list of categories having protection against discrimination. Until that happens, we will continue to treat caste as an unacceptable form of discrimination for purposes of our internal reviews – as we did in G.’s case.

Source: cisco.com

Tuesday 3 November 2020

Bolstering Cyber Resilience in the Financial Services Industry: Part One

Cisco Prep, Cisco Tutorial and Material, Cisco Learning, Cisco Exam Prep

Today’s Security Environment

As we review the impact of COVID-19 on major industries at a global level, it is heartening to know that the financial services industry as a whole, has been able to withstand the immediate pressures arising from the pandemic.

The post COVID-19 era for the financial services industry will be rife with low interest rates, low profitability and increased non-performing assets (mortgages, business loans etc.).  At the same time, customer confidence and trust on financial services firms will be put to the test as sophisticated cyber-attacks continue to target the firm’s digital products and services infrastructures as well as remote workers.

A 2020 Accenture report – ‘Securing the Digital Economy: Reinventing the Internet for Trust’– forecasts that nearly $350 billion could be lost by the financial services industry to cybercrime by 2025.

Therefore, financial services firms will need to prioritize their investments and accelerate the implementation of cyber resilience strategies to avoid increased business loss and brand damage due to sophisticated cyber-attacks. Knowing this, we put together a two-part blog series to help you assess and improve your financial institution’s security.

Cisco Prep, Cisco Tutorial and Material, Cisco Learning, Cisco Exam Prep

Look for a Long-Term Solution


With remote working being the new normal in the post COVID-19 era, cyber criminals are tirelessly focusing their efforts to steal data from the financial firm’s remote workers and third party partners through advanced malware and social engineering methods. While most financial firms have rushed to plug the gaps that exist in their security policies to support this new normal, this is a just a short term solution.

The focus should also be on building cyber resilience against emerging threats that could severely damage a financial service firm’s brand and lead to financial market disruption, like data manipulation. Financial firms have been using data to gain insights and deliver competitive services. Data driven decision-making has been an important strategy adopted by most financial firms to deliver exceptional customer experience and gain operating model efficiencies. Emerging attacks will shift from data theft to data manipulation. These attacks will be led by highly skilled adversaries with advanced Tactics, Techniques & Procedures (TTPs) such that detection will be a challenge. Manipulation of credit scores, market data, KYC (Know Your Customer), customer account data, and many others will threaten the financial firm’s brand as well as severely impact customer trust.

As per the Reserve Bank of New Zealand “Cyber resilience is the ability to withstand, contain, and rapidly recover from a cyber incident by anticipating and adapting to cyber threats and other relevant changes in the environment.”

It is crucial that a holistic approach to cyber resilience be adopted taking current and emerging threats into consideration. Our recommendation to financial services firms is to augment their current cyber security practice with a five-point strategy which would help them bolster cyber resilience. This blog encompasses the first two points, check out next week’s blog for the final three points.

Cisco Prep, Cisco Tutorial and Material, Cisco Learning, Cisco Exam Prep

#1) Secure by Design


As financial services firms accelerate digital transformation, security has to be more than a department or set of loosely-integrated solutions to keep up. It has to be a total philosophy – driven by the CEO and implemented throughout the entire product lifecycle. This includes using a secure development lifecycle, embedding security into product design and manufacturing, delivering products securely, and ensuring a corporate culture of transparency and continuous innovation. Cisco’s Trustworthy technologies are an evolving range of security technologies designed into Cisco solutions for financial services customers to tap into as they develop their digital products and services. Security by design and trustworthiness must never be afterthoughts; they must be designed, built, and delivered from the ground up.

#2) Cisco Zero Trust


Cisco Zero Trust offers a comprehensive solution to secure all access across a financial services firm’s applications and environment, from any user, device, or location allowing the firm to consistently enforce policy-based controls while gaining visibility into users, devices, components, and more.

Cisco implements zero trust with a three-step methodology across the workforce, workloads and workplace by:

1. Establishing trust of a user, device, application, etc. – before granting access or allowing connections or communications.

2. Enforcing trust-based access policies with granular controls based on changing context – such as the security posture of devices and the behavior of applications

3. Continuously verifying trust by monitoring for risky devices, policy noncompliance, behavior deviations and software vulnerabilities

This complete zero trust security model allows the firm to mitigate, detect, and respond to risks across their entire environment.

Saturday 31 October 2020

Design Thinking Leads to Innovative Solutions

Cisco’s most passionate customers agree with experts inside our company: Design Thinking is a powerful tool to leverage the benefits of software and a programmable infrastructure.

We believe Design Thinking is so important that we developed a framework and toolset around it. It takes the best research-based methodologies from this discipline and can help you become proficient in using it in your own projects.

Design Thinking is a tool for creative problem solving. It’s for everyone who is building products or services. And that includes network engineers and software developers. I’ve long been a proponent of Design Thinking, and I recently joined the Cisco Champions podcast to talk about what it means in the world of software and programmability.

Listen to the Podcast: Design Thinking for Innovative Solutions – a discussion with Cisco Champions Jose Bogarin, Altus Consulting; Matyas Prokop, Natilik; Paul Giblin, Presidio; Edwin Zhang, Cisco; Lauren Friedman, Cisco.

Cisco Prep, Cisco Tutorial and Material, Cisco Certification, Cisco Learning, Cisco Study Material

Know Your Customers

The core of Design Thinking is empathy. The better we know our users and customers, the greater the chance we can serve them with the right products and services.

Nearly all business and technology problems are complex and require expertise from people in multiple disciplines. Design Thinking is a crucial tool for helping people on multi-disciplinary teams build understanding – for the other people on the team and for the users. From a foundation of empathy and understanding, it is much easier to move forward effectively.

Inside Cisco, we use Design Thinking in cross-functional teams that include developers, product managers, designers, business development managers, community managers, developer support personnel, and so on.

Cisco Prep, Cisco Tutorial and Material, Cisco Certification, Cisco Learning, Cisco Study Material

Design Thinking and Programmability

Design Thinking takes on a critical role when you’re building automated solutions, or using Cisco software and APIs to extend open platforms into new areas of business. When you embark on these projects, it’s even more important that you include all stakeholders in the project scoping process. As Cisco Champion Matyáš Prokop, Principal Architect at Natilik, says, “Design Thinking is an important tool to better understand and serve customers.” Natilik is a Cisco partner that has used Cisco software and APIs to find new ways to engage with their customers and grow their business.

For engineers and developers, APIs make it easier to develop business solutions quickly. (For multiple examples of this, check out the automation solutions developer have posted on Cisco DevNet Automation Exchange.) Design Thinking is one great tool our developers use to make sure they are building the right solution for the customers — to address solutions to the right stakeholders, to understand their pain points.

And If you have a useful automation innovation, you too can share your code with other developers, on the DevNet Automation Exchange.

Cisco Prep, Cisco Tutorial and Material, Cisco Certification, Cisco Learning, Cisco Study Material

Design Thinking and software are playing critical roles in the digital transformation of businesses. Our Cisco Champions are as excited about these new opportunities as I am.

Source: cisco.com

Thursday 29 October 2020

Ace Cisco 350-501 Certification with Actual Questions

Cisco 350-501 spcor Exam Description:

This exam tests a candidate's knowledge of implementing core service provider network technologies including core architecture, services, networking, automation, quality of services, security, and network assurance. The course, Implementing and Operating Cisco Service Provider Network Core Technologies, helps candidates to prepare for this exam.

Cisco 350-501 Exam Overview:

Cisco 350-501 Related Articles:

Transforming Data Center Operations with Nexus Dashboard

Cisco Exam Prep, Cisco Learning, Cisco Tutorial and Material, Cisco Guides, Cisco Certification

Transformation is definitely top of mind in many IT, business, and personal conversations I have these days with customers and partners. We used to focus primarily on the need for more agile and flexible infrastructure driven by the ongoing refactoring of their applications and how Cisco can help to deliver the desired business outcomes. The increasingly distributed nature of the applications used by enterprises requires tools that transform how IT operates. IT organizations are measured by the speed, simplicity, and security they can provide to support their organizations’ business objectives.

The speed of digital transformation is often a key competitive differentiator for our customers. A crucial part of the IT transformation is the leverage of cloud and edge data center locations as well as the use of service-centric cloud operations models. Now our daily work habits are transformed further by global events beyond our control, dispersing us to work, bank, shop, learn almost anywhere, at any time. The ability to adapt to these transformations while maintaining business resiliency and agility depends on a connective fabric—the network. 

Managing the network that connects on-premise, cloud, and edge applications to the workforce is a multi-disciplinary effort among NetOps, SecOps, CloudOps, and DevOps teams. These teams control multiple facets of the IT infrastructure: the tools that manage where workloads are run, the service level objectives (SLO) defining user experience, and implementation of zero trust security to protect vital business assets. 

Enabling these teams to deliver the best experience is the goal of an agile automation platform powered by real-time insights. An automation platform enables cloud and data center network operations to adapt to the new normal of shifting workloads and distributed workforces. With both workforce, application developers, and operations teams increasingly working remotely, separated by time and distance, it’s critical they have the tools to align and collaborate more efficiently than ever before. 

Cisco provides a data center network automation platform that is fabric agnostic and delivers a consistent, simplified experience to Ops tams. Enterprises can accelerate their IT transformation whether they focus purely on network automation or implementing more comprehensive IT automation that leverages an Infrastructure as Code (IaC) operating methodology.

An Agile Automation Platform for Data Center and Cloud Operations

The Cisco Nexus Dashboard brings together real-time insights and automation services to operate multi-cloud data center networks spanning on-premise, virtual edge, and cloud sites. It provides a unified view into proactive operations with continuous assurance and actionable insights across data center fabrics for seamless management. The Nexus Dashboard incorporates Nexus Insights, Network Assurance, and Multi-Site Orchestrator, as well as seamless access to network controllers and third-party tools and cloud-based services. 

Cisco Exam Prep, Cisco Learning, Cisco Tutorial and Material, Cisco Guides, Cisco Certification

Cisco Multi-Site Orchestrator (MSO) provides consistent connectivity and security policies across multiple data center network sites such as ACI, DCNM, and cloud fabrics. MSO also enables end-to-end automation across data center, SD-WAN, and enterprise branch and campus networks. Integration with Cisco SD-WAN optimizes path selection for traffic among data centers and branches to deliver on application SLOs. Integration with Cisco DNA Center delivers consistent identity-based security policies across the workforce and applications.

Cisco Nexus Insights brings together in a single service the current Cisco Network Insight and Cisco Network Assurance Engine capabilities. It delivers real-time insights, assurance, and compliance needed to deliver the SLOs required by IT and the business. Nexus Insights applies baselining, predictive analytics, and machine learning techniques to move from reactive to a proactive operations model. Nexus Insights can easily integrate with other services leveraging standard and open APIs. Existing integrations with Cisco AppDynamics, Cisco Intersight, Hashicorp Consul, and Cisco TAC provide rich visibility across operations teams.

Delivered with Nexus Dashboard, these services provide Ops teams with a commanding view of the entire network fabric and tools to take immediate and proactive actions to maintain business resiliency. Nexus Dashboard also offers the ability to define multiple personas that enable IT to provide role-based access to specific operations teams.

Cisco Exam Prep, Cisco Learning, Cisco Tutorial and Material, Cisco Guides, Cisco Certification

Bridging the Gap from NetOps to DevOps


Looking ahead, the Cisco Nexus Dashboard becomes a collaborative focal point where operations-critical third-party services and tools can be consumed via a single-pane of glass interface. IT can custom build automation workflows employing Cisco and third-party services to support their IT transformation processes.

Cisco Exam Prep, Cisco Learning, Cisco Tutorial and Material, Cisco Guides, Cisco Certification

For example, through the Nexus Dashboard:

◉ NetOps teams can integrate directly with ServiceNow to generate tickets for centralized incident management.

◉ DevOps teams can map application, network and compute context by linking Nexus Insights with Cisco AppDynamics and Cisco Intersight, providing rich contextual information that enables DevOps to monitor application performance, identify network bottlenecks affecting applications, and fine-tune workloads accordingly.

◉ DevOps can leverage an Infrastructure as Code approach to link Ansible or Terraform services with the MSO API.

Multiple Deployment Options for Maximum Flexibility


Just as changes in the workplace and workforce are transforming the way IT works, the Nexus Dashboard will be available in various form factors to match the IT transformation organizations are going through. Flexible deployment options for Cisco Dashboard include:

◉ As an on-premise appliance.
◉ As a virtual appliance to deploy on existing compute or hyperconverged infrastructure (Q1CY21).
◉ As a cloud-based application for remote deployment and management (Q1CY21).

Reduce Complexity, Accelerate IT Transformation


Complexity is the enemy of efficiency. To manage distributed networks, you need tools that are easy to deploy, simple to access, and sharable among operations teams. With Cisco Nexus Dashboard you get a scalable, easy-to-use console that brings together Cisco operational services with commonly used third-party services and tools. Operations teams can work together to assure that the entire network is performing as intended. They can leverage automation coupled with real-time analytics to deliver the agility IT and the business needs for success. The nexus of the network makes it simple.

Tuesday 27 October 2020

Zero to One Device Provisioning and Discovery with PnP Connect

Cisco Prep, Cisco Exam Prep, Cisco Tutorial and Material, Cisco Guides, Cisco Learning, Cisco Certification

What is PnP Connect?

Cisco Plug and Play Connect (a component of the Cisco Network Plug and Play solution) is a secure and scalable cloud-based service that provides a discovery mechanism for a network device to discover it on-premise Cisco DNA-Center or DNAC-Cloud. It’s the go-to solution for simple day-zero provisioning across all Cisco Enterprise platforms (routers, switches, and wireless access points).

What drives the necessity for this solution?

Installing and deploying the vast number of networking devices that reach their data center, branch networks, and campus rollout are costly for enterprises and campus deployments. Any computer usually has to be pre-staged by a professional installer and equipped with a CLI configuration via a console connection that allows it to connect to the rest of the network. This method is expensive, time consuming, and vulnerable to error. Due to these factors, customers would like to increase the speed and reduce the complexity of the deployment without compromising the security.

For PnP solutions we have the following 3 major pillars:

1. The solution should be simple, as that is critical for automation. For this our device should be able to call home to our controller, and this path should be robust.

2. The solution should be secure. We know some vendors have ZTP provision but that is traditional and not secure, specially through WAN connections. In PnP, the device gets secured connection via HTTPS solution and this gives the image to device. SUDI authentication is an added layer on top of this. When device calls home, a challenge is sent over the tunnel, and device will un-sign the certificate with a private key and it will be determined if the device is legit.

3. The solution has to have a consistent workflow for all kind of devices. Hence, we needed a simple secure unified and integrated solution that eases new branch rollouts or provisioning existing deployments.

Cisco Prep, Cisco Exam Prep, Cisco Tutorial and Material, Cisco Guides, Cisco Learning, Cisco Certification

What are the PnP solution components?


Cisco Prep, Cisco Exam Prep, Cisco Tutorial and Material, Cisco Guides, Cisco Learning, Cisco Certification

1. First, we need a server or orchestrator that makes the device do what it needs to do. This could be running on DNAC.

2. Second, the PnP agent is embedded in Cisco devices and communicates to the Cisco Network Plug and Play application using the open plug and play protocol over HTTPS during device deployments. The PnP agent attempts to obtain the IP address of the PnP server it wishes to connect with. The agent interacts with the PnP server to conduct deployment-related activities after a server is identified and a connection has been created.

3. PnP Server communicates with the PnP agent on the device using PnP protocol.
PnP protocol is the main connection. From that connection they will start using PNP schema (XML schema) to tell each other what they need to do and from there we provision the image or config.

4. If the device is not able to communicate to the server using DHCP or DNS it can use the PnP connect cloud-based service. This is the PnP Connect solution we launched that redirects device to the on prem DNAC.

How does PnP connect work?


Cisco Prep, Cisco Exam Prep, Cisco Tutorial and Material, Cisco Guides, Cisco Learning, Cisco Certification

PnP connect is a highly automation-based pre -provision workflow. Under this solution all the configurations that are to be pushed, site hierarchy and software image details are associated to a certain Serial Number of a device. All of this information will be linked to the device using the Smart Account. We can put our smart account information in our order when we buy it.

If you order plug and play network devices through Cisco Commerce Workspace (CCW), these network devices are automatically registered with Plug and Play Connect as long as a Cisco Smart Account is assigned to the order and you include the NETWORK-PNP-LIC option for each device that you want to use with Cisco Network Plug and Play. This option causes the device serial number and PID to be automatically registered in your Smart Account for plug and play.

There is also an option to manually add the device. The users can import a device from a CSV file or enter the devices information manually.

We also need to register DNAC as the default controller for the Smart Account, which will port all the SNs to DNAC. So, we will not need to import separate CSV files. Now, when device boots up their SN will get mapped and it will be sent to the mapped on-prem DNAC and all of configurations that were supposed to be pushed will be done accordingly in association to site.

The flexibility and efficiency that is achieved by using PnP connect is what makes it the true-blue solution.

Sunday 25 October 2020

One Architecture on Multiple Devices with No Compromise

Cisco Prep, Cisco Learning, Cisco Guides, Cisco Tutorial and Material, Cisco Certification

Service providers, web scale companies, and equipment manufacturers have long struggled with networks comprised of multiple unique architectures driving up huge operational complexity and cost. Power-hungry routers, feature-limited web scale switches, and an ever-expanding footprint have them seeking new alternatives. Unfortunately, it seems the only solution is to wait for another chip family release once every 24 months.

Well, we have some good news. Those days are over. In December of 2019, we made a bold announcement about how we’ll forever change the economics of the Internet. Two of the key elements in that announcement were the introduction of Cisco Silicon One and a new business model. For the first time in the industry, customers can buy our state-of-the-art silicon and discrete optics parts directly from us.

The 10Tbps Cisco Silicon One Q100 is the first device in a family of chips that mark a fundamental shift in the routing silicon market. Whereas it once took at least five pieces of routing silicon to build a complete system, this can now be accomplished with just one. More than ever before, customers have the freedom to innovate at their own pace. We designed the new Cisco Silicon One architecture to be endlessly scalable, enabling faster iterations of future generations. Naturally there were skeptics – after all, this defied the norm.

Today, less than 10 months later, we’re proud to announce six new 7nm additions to the Cisco Silicon One portfolio: three highly efficient web scale switching devices, and three high-scale and deep-buffered routing devices covering an expanded performance range between 3.2Tbps and 12.8Tbps. The Cisco Silicon One portfolio now covers the entire space from service provider and web scale routers all the way to the Top of Rack (TOR) switches and everything in between. With one architecture, one Software Development Kit (SDK), and one P4 forwarding code, Cisco Silicon One unifies the network across routing and web scale switching.

Cisco Prep, Cisco Learning, Cisco Guides, Cisco Tutorial and Material, Cisco Certification

The Cisco Silicon One Q200 extends our market leadership in routing silicon with a 7nm high performance, large scale, run-to-completion P4 engine and deep buffers. At 12.8Tbps, it enables customers to build a 32x400GE 1RU router with a single piece of silicon while others on the market require between two and 10 pieces of silicon. This dramatic difference alters the fundamental economics of building fixed-box routers.

Multiple Q200 devices can then be interconnected to create massive multi-petabit systems with a fully scheduled Ingress Virtual Output Queueing (VOQ) fabric. The Q201 and Q202 extend the portfolio down to enable lower bandwidth and less expensive 64x100GE and 32x100GE 1RU systems. Cisco Silicon One now covers the entire routing market, from 3.2Tbps to multiple petabits.

Today we also expand the market addressability of Cisco Silicon One in a big way by adding purpose-built devices for the web scale switching market. The Q200L is a 7nm 12.8Tbps web scale switching device featuring high performance, run-to-completion P4 engines and a fully unified on-die buffer. The Q200L is also foot-print compatible with the Q200, which enables one hardware design to support a 32x400GE router with the Q200 or a 32x400GE web scale switch with the Q200L, simplifying the development costs for our customers.

Although the leading switching devices are at rates of 12.8Tbps (and soon 25.6Tbps), we found that many customers are searching for highly efficient 3.2Tbps and 6.4Tbps to play different roles in their network. Because Cisco Silicon One is built with a scalable, slice-based architecture, we can easily create fully optimized, lower-speed devices from the same architecture. The Q201L at 6.4Tbps enables a highly efficient 64x100GE web scale switch and Q202L at 3.2Tbps can be used to build a 32x100GE web scale switch.

The efficiency of the Cisco Silicon One architecture combined with 7nm creates a truly unique offering in the web scale switching market.

Cisco Silicon One erases the hard-architectural boundaries that have existed for decades in the industry between routing and web scale switching devices by providing a single architecture that optimally spans both market segments. Customers can port one SDK and address multiple markets, while network operators need only train their support staff once to troubleshoot one architecture across their entire network. But in the end, this unique level of convergence wouldn’t be so interesting if each of the devices weren’t best of breed themselves. What sets Cisco Silicon One apart from the competition is how it brings convergence without compromise.

Cisco Silicon One was created by the team that built the silicon carrying more than 90 percent of the world’s Internet traffic and we believe this clean sheet architecture will serve the industry for the next several decades. To do this, we had to solve many of the problems that other architectures stumble over, but just as important, we’ve created an architecture that is highly efficient and scalable.

The impacts of a unifying architecture are clearly visible today. Most silicon vendors announce new silicon once every few years, whereas today we’re announcing six new devices in less than a year, just as we promised back in December 2019.

But as exciting as these new devices are, this is just the beginning. We’ve started a journey and we have more devices on the way. Stay tuned because there will be exciting news ahead!

Source: cisco.com