Title: Nortel Presentation
1(No Transcript)
2Geoff Hall EMEA Chief Technology Officer
3A VIEW TO THE FUTURETransformations in
networking and communications
- Phil EdholmJune 2005
- Abridged Geoff Hall
- July 2005
4Technology Mega Trends
MOORES LAW
NOMADIC WIRELESS BANDWIDTH
1000
1Gbps
4G
OutsideCampus
Moores Law Silicon power doubles every 18
months(500,000 x in 30 years)
WMN andWiMax
100
100Mbps
3G
2.5G
Delivered Ethernet Performance
Processor Power
Gigabit Desktop Dramatic increasein bandwidth
from11000 Mbps in 15 years
10
10Mbps
DECT
802.11a/g
WithinCampus
802.11b
Bluetooth
802.11n
Mbps
1
1Mbps
1980
1990
2000
2010
0.1
1
10
100
Mobility
EDHOLMS LAW OF BANDWIDTH
METCALFES LAW
2.94 Mb/sEthernet
1 Gb/s Ethernet
100 Mb/sEthernet
Billion
NetworkedEverything
802 .11g
10 Mb/sEthernet
Bits per second
WIRELINE
802.11g
MIMO
Million
NOMADIC
UMTS
Value
9600gtb/s modem
110-b/s Hayesmodem
Ricochetradio modem
WIRELESS
56 Kb/s modem
Thousand
56 Kb/s modem
28.8 Kb/s modem
Wide-area paging
First alphanumeric pager
1976
1984
1992
2000
2008
of Networked End Points
5A Journey into the Future
- Dissolution of distance and location
- Third generation wireless
- 802.11 futures
- Terrestrial for high resolution
- Transformation from complexity to simplicity
- Explosion of devices
- Wide variety of devices
- Dramatic increases in edge intelligence
- Hyper-interactivity
- Multi-media
- Always available
- Adaptive
- Explosion in interaction events
- Personal agents
- Reachability
- Control
- Information sieve
6Conferencing
Conferencing
IVR
Multiple Applications Multiple Platforms
E-mail
CRM
E-mail
Call Centre
IVR
Todays Enterprise
Multiple Separate Networks
Dispersed Workforce
7The New (Virtualized) Enterprise
Conferencing
IVR
Platform Application Convergence
E-mail
Call Centre
Video
IM
Presence
Converged Infrastructure
Protocol NetworkConvergence
SIP
Virtualization
Open Ecosystem
8Architectural Discontinuities
A fundamental architectural shift that transforms
networks, communication systems and networked
applications
- DISCONTINUITY CRITERIA
- Five-year view
- Enabled by technology
- Business transforming
- Boundary eliminating (towards anyone, anywhere,
anytime, anyhow communicationssecurely)
Omni-Networking
- PAST EXAMPLES
- Digital communications
- Personal computers
- Web browsers
Competitive advantage comes from managing IT
evolution and risk to eliminate barriersand not
from the technology itself
9Virtualization
- Proliferation of devices
- Device mobility
- Call mobility
- Location based services
Virtualization
Requires dependable security
10Nortel Networks Vision for Mobility
Always connected, no matter where you are or
where you are going
Wired/Wireless
In the Office
Adapts as you move from one place to another
At Home
On the Road
In Public Areas
Only Nortel Networks can eliminate the boundaries
11Hyper-Interactivity
- Explosion in interaction events
- Reachability unification
- Time To Decision (TTD)
- Personal agents
- Adaptive intelligence
- Contextual volume
Hyper-Interactivity
Requires trust of identity
12Emerging Enterprise Applications Model
Web services
Collaboration applications
Converged communications
Improved productivity and efficiency, while
lowering cost
13Creating the Inter-Human Web
Clients
Applications Services
Service Provider
Enterprise
- Open Interfaces
- Innovation at the intersection of end user
networking - Differentiation through function
14Webification
- Integrate real-time front office to back office
- Future strategic differentiation
- Web enabled apps
- Integration of workflow, document management, and
communications management - Conference in real-time media replicates virtual
spaces in cyber environment
Webification
Requires federation
15Omni-Networking
Omni-Networking
- Embedded, ever-present, all encompassing security
- Autonomic Networking
- Federated trust
- Ambient intelligence
Redefining networks based on the real-time
virtualized enterprise
16Facets of Security
Information Assurance
- Protection of data and information
- At Rest and in Flight
- Authentication/Identity
- Authorization/Entitlement
- Encryption
- Auditing
Business Continuity
- Protection from disruptions
- Virus and Worms
- Intrusions
- Control Attacks
- Continuous operation
17Autonomic Application Aware Networking
- Autonomic Networking is a vision of real-time
secure multimedia networks that can dynamically
adjust to changing conditions to optimize network
performance and application/user QoE. - Autonomic Architecture allows the user to focus
at the business logic and policy level versus the
micro level bit and byte details. It allows the
network to self heal, self secure, self tune and
self optimize - Auto-Discovery/Auto-Provisioning (WAN)
- Call Admission Control
- Route intelligence, linking applications with
infrastructure - Security management
- Identity management
18Continuum
- Convergence is driving new transformations
Omni-Networking
- Each delivers new challenges and opportunities
- Each requires new thoughts at the network level
- Omni-Networking is critical
- Autonomic Networking
- Federated Trust
- Ambient Intelligence
19(No Transcript)