Presented to: MAG January 15, 2004 By Client Technologists: Chris Colby & Randy Kendzior
Agenda Wireless Landscape & Technology Trends Dell Wireless Products & Services Applications of Wireless Implementation Considerations Q & A
Wireless Landscape and Technology Trends
Wireless Technology Positioning Each wireless technology category provides an unique set of capabilities and options... ` ` WPAN WLANWWAN Personal spaceHome, campus, hotspotsMetros, countries, global AttributeWPAN (Bluetooth) WLAN (802.11b/g/a) WWAN (GPRS) Usage Model Object exchange, cable replacement LAN extension & hotspot coverage On-the-road remote access Network Ad-hocDedicated enterprise or “hotspot” infrastructure Operator owned infrastructure Data-rate 1 Mbps 10 Mbps?11 Mbps 54 Mbps40 Kbps 384 Kbps Range / coverage 10m, personal proximity area 50m, “hotspot” coverageMetro/global coverage with vehicular support Power LowMediumHigh Cost LowMediumHigh (with access) Volume Driver Cell phones & headsetsNotebooksCell phones
Past WPAN WLAN WWAN Bluetooth 1.1 Bluetooth b GPRS cdma2000 1xRTT cdma2000 1xRTT g a WCDMA EDGE n (HTSG) n (HTSG) Bluetooth 2.x Bluetooth 2.x a UWB a UWB 54Mbps at 5GHz 1xEV-DO 54Mbps at 2.4GHz 180Kbps ?Kbps 140Kbps Data overlay 11Mbps 35kbps 721Kbps 3Mbps (Medium rate) 10Mbps(High-data rate) Next generation 100+ Mbps thruput Wireless technologies, categorized by mobility and range, will continue to evolve to higher data rates Mbps+ Bluetooth 1.2 Bluetooth 1.2 AFH, Improvements Dual-Band Wireless Technology Roadmap 1xEV-DV HSPDA 300Kbps 600Kbps 60kbps
Dell Wireless Products & Services
Notebook Wi-Fi standard on all Latitude notebooks Bluetooth internal module Cellular PC Cards Desktop WLAN USB adapters Bluetooth (combo) dongle Axim WLAN / Bluetooth CF and SDIO cards Internal wireless modules (WWAN, BT, WLAN) Assessment Needs, wants, requirements, restraints, roadblocks Design Design spec based on assessment & site survey Deployment Install, configure, verify – transfer of knowledge Support On-going support and maintenance Client ServicesAccess WLAN hotspot Catalog, web-links, coupons, client SW / icons Cellular Cellular cards + Access Convergent Bundled WLAN+Cellular Access Infrastructure Consumer & Small Business WLAN router AP WLAN print server and media servers Enterprise Access Point Corporate middleware server Beyond simple client enablement, Dell is adding emphasis on other primary pieces… Dell Areas of Focus
WLAN Reference Model SoHo / Consumer Broadband Enterprise Adapters for CE devices Wireless Media server Wireless BB routers Notebook cards Desktop cards Axim cards & modules Enterprise APs AP controllers Consumer Enterprise Beyond common client HW, the consumer and enterprise segments will motivate different product solutions… Public WLAN Access
Applications of Wireless
Public Utilities Meter reading Tax appraisals Preventative maintenance Public Safety Police reporting & Investigations (Mobile terminals) Mobile Hotspots (Fire & Police stations, Courthouses, etc.) Judicial Applications Courthouse law library access Attorney network access Medical Applications Prescription dispensing Mobile cart admissions Physician order entry General Administration Mobile & scheduling Safety alerts
Implementation Considerations
Network perimeter is clearly defined ‘Trusted’ users are only inside the network Past Evolving Security Usage Models Future A shift towards a less defined network and trusted-user base will require increased emphasis on end-user authentication and data encryption… Paradigm Shift Wireless Increasing On-line Info Remote Access Extranets Internet Network perimeter is less defined ‘Trusted’ users both inside and outside the network
General Security Framework In the room Ability to physically protect and secure systems and track assets In the room Ability to physically protect and secure systems and track assets At the keyboard Processes and policies to assure user identification, authorization and access privileges At the keyboard Processes and policies to assure user identification, authorization and access privileges In the box Real-time protection from data and programs that have entered a system In the box Real-time protection from data and programs that have entered a system On the net Ability to interact with internal and external users and remote systems in a secure manner On the net Ability to interact with internal and external users and remote systems in a secure manner Security is a “chain” of technologies/solutions Security is also a continuous process Interoperability requires security standards A security policy encompasses many different facets…and is only as secure as the weakest one..
Questions & Answers
THANK YOU