DEP390 802.11g Deployment Strategies Migration to establish and exploit high-speed Wireless LAN’s Jan Haagh Senior Product Manager Proxim Wireless LAN.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
Advertisements

Encrypting Wireless Data with VPN Techniques
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Wireless Technology.
1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
Brocade VDX 6746 switch module for Hitachi Cb500
Introduction to Systems Management Server 2003 Tyler S. Farmer Sr. Technology Specialist II Education Solutions Group Microsoft Corporation.
UMA (Unlicensed Mobile Access) El Ayoubi Ahmed Hjiaj Karim.
By, Shah Ankur Vasant. WIMAX stands for Worldwide Interoperability for Microwave Access The original IEEE standard (now called "Fixed WiMAX") was.
Wireless Fundamentals Chapter 6 Introducing Wireless Regulation Bodies, Standards, and Certifications.
Wireless Design for Voice Last Update Copyright 2011 Kenneth M. Chipps Ph.D.
DEV392: Extending SharePoint Products And Technologies Through Web Parts And ASP.NET Clint Covington, Program Manager Data And Developer Services - Office.
Wireless Local Area Networks By Edmund Gean August 2, 2000.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
Maximizing your g investment Proxim. Outline Why 54Mbps isn’t really 54Mbps Actual achievable throughput of g The impact of b backwards.
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
Flexible Network Access Overview. Flexible Access an Integral part of Universal Access Policy Universal Access to Campus IT Resources Managed LAN portsFlexible.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Doc.: IEEE /1126r0 Submission September 2012 Krishna Sayana, SamsungSlide 1 Wi-Fi for Hotspot Deployments and Cellular Offload Date:
IE 419/519 Wireless Networks Lecture Notes #4 IEEE Wireless LAN Standard Part #2.
Windows ® Powered NAS. Agenda Windows Powered NAS Windows Powered NAS Key Technologies in Windows Powered NAS Key Technologies in Windows Powered NAS.
Mobility at CERN 29/10/2013 HEPiX Fall IT/Communication Systems HEPiX Fall 2013.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
Wireless Infrastructures Wireless. Wireless Infrastructures Wireless LAN Predominantly IEEE A, B, G, N Wireless MAN WiMax and its.
High Performance, Easy to Deploy Wireless. Agenda Foundry Key Differentiators Business Value Product Overview Questions.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
DEP351 Windows ® Rights Management (Part 2): Enterprise Readiness & Deployment Marco DeMello Group Program Manager Windows Trusted Platforms & Infrastructure.
Sybex CCNA Chapter 12: Wireless Networks.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
© Aastra – 2012 SIP-DECT 4.0 RFP 43 WLAN June 2012.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
1 © 2004 Cisco Systems, Inc. All rights reserved. Rich Gore Case Study: Cisco Global Wireless LAN Software Migration Cisco Information.
DEV325 Deploying Visual Studio.NET Applications Billy Hollis Author / Consultant.
WME ABC ’ s LayerDescription aPHY 54 Mb/s in 5 GHz bands bPHY 11 Mb/s direct sequence in 2.4 GHz band cMAC Bridging operation dPHY International.
A PRESENTATION ON “Wireless Networks”
Wireless Hotspots: Current Challenges and Future Directions CNLAB at KAIST Presented by An Dong-hyeok Mobile Networks and Applications 2005.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 US&C FE Cisco Next Generation Wireless Launch Chris Kozup, Manager, Mobility Solutions.
October 4-7, 2004 Los Angeles, CA VoWLAN Trends and Opportunities Kamal Anand Vice President Marketing Meru Networks
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
Doc.: IEEE /0498r0 Submission April 2008 Eldad Perahia, Intel CorporationSlide 1 Modifications to the 60GHz PAR & 5 C’s Proposal Date:
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
Designing for High Density Wireless LANs Last Update Copyright Kenneth M. Chipps Ph.D.
DEV333 Instrumenting Applications for Manageability with the Enterprise Instrumentation Framework David Keogh Program Manager Visual Studio Enterprise.
Enterprise-Class Telephony on Wireless LANs Tom Alexander CTO VeriWave, Inc.
MBL206 A First Look at the Microsoft Location Server (MLS) Steve Lombardi Technical Product Manager MapPoint Business Unit Microsoft Corporation.
Wireless? A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. The last link with the users is wireless, to give.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
Doc.: IEEE /0542r0 SubmissionSimone Merlin, QualcommSlide 1 HEW Scenarios and Goals Date: Authors: May 2013.
Sybex CCNA Chapter 14: Cisco Wireless Technologies Instructor & Todd Lammle.
Doc.: IEEE /345r0 Submission May 2002 Albert Young, Ralink TechnologySlide 1 Enabling Seamless Hand-Off Across Wireless Networks Albert Young.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 1 Cisco Small Business Wireless Access Point WAP371.
Performance Characterization of Voice over Wireless LANs Lionel PEREZ August 3rd, 2005.
Cisco Aironet 350 Series: The Right Choice for the Enterprise.
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Retail File 23 June 2016 Promo Valid Until 30/06/2016 or Until Stock Last JL024A HP ACCESS POINT M210 DUAL BAND 2 ANTENNAS WIRELESS MIMO N A/B/G/N.
Wireless Access Point Product Overview
Wireless Access Point Product Overview
Wireless Fidelity 1 1.
Case Study: Cisco Global Wireless LAN Software Migration
Chapter 4: Wireless LANs
Microsoft Virtual Academy
Presentation transcript:

DEP g Deployment Strategies Migration to establish and exploit high-speed Wireless LAN’s Jan Haagh Senior Product Manager Proxim Wireless LAN Division

Presentation content g Deployment Strategies What is g? Why is co-existence with b an issue? a and b/g differences Need to find the proper balance b only mode g only mode Mix mode of b and g clients Migration to establish and exploit high-speed Wireless LAN’s Today’s enterprise Wireless LAN requirements New WLAN features on the horizon Intelligent Access Points Concept of centralized architecture Positioning of centralized concept and intelligent Access Points Concluding

802.11g Deployment Strategies

What is g? Ratified IEEE standard (as of June 11, 2003) Similar to a Uses same OFDM modulation Supports same data rates: 6, 9, 12, 18, 24, 36, 48 and 54 Mbps Different from a Operates in the 2.4 GHz band, not the 5 GHz band Distance advantage due to propagation difference Far fewer channels available Significant detrimental impact on throughput in dense deployments Requires support for b devices (1, 2, 5.5, and 11 Mbps) Requires support for: Long preamble 20 μs slot times Both of these have significant detrimental impact on throughput

Why is co-existence with b an issue? g operates in exactly the same spectrum/channels as b Inevitably there will be networks with simultaneous.11b/.11g users, or.11b networks in close proximity to.11g networks g b g b

Single Cell Throughput performance 11g is superior due to: Slot time Propagation This is the ideal case and is not real life Multiple channel co-channel interference Interference between different system in same band

Co-channel neighbor cells

Multi Cell Throughput performance

PLCP Header Adding complexity: preamble length Preamble a: OFDM (20 μsec) g: Either long (192 μsec) or short (96 μsec) or OFDM, depending on the mix of traffic on the network b: Either long or short

Adding complexity: slot time Slot time a: 9 μsec g: Either 9 μsec or 20 μsec depending on the mix of traffic on the network b: 20 μsec

Slot time performance impact

802.11b effect on 11g performance

802.11g protection mechanism

Protection mechanism impact

802.11b and g devices deferring for each other g and 11b sharing the medium

Need to find the proper balance Throughput Co-existence OFDM Preamble No RTS/CTS Short Slot Time Long or Short Preambl e RTS/CTS Long Slot Time

802.11b only mode Access Point will always operates with a 20 μsec slot time b clients can only recognize the 20 μsec slot time In this mode the Access Points will be able to respond to clients using either the long or the short preamble The long preamble is only used when a client joins the network that can only use the long preamble bb

802.11g only mode only g modulation (OFDM); restricting associations to g clients Using the short slot time of 9 μsec Preamble that will be relevant is the OFDM preamble No need for a protection mechanism because the traditional medium access mechanisms will manage the sharing of the wireless media The configuration providing the maximum throughput for g devices; no throughput degradations caused by: long slot times b devices protection mechanisms g g

Mix mode of b and g clients Most complex modes: Slot time Preamble RTS/CTS At any b devices, automatically fall back to the use of 20 μs slot times For maximum throughput at slot times of 9 μs when no b devices are detected CTS-only protection mechanism when b clients are present At a mixture of b and g clients, the network will use both long or short preamble gb b

Proxim Proposed Modes b onlyMixed Mode802.11g only Short preamble OFDM preamble No RTS/CTSRTS/CTS with mixed traffic No RTS/CTS 20 μsec slot20 μsec slot with mixed or overlapping traffic 9 μsec slot

Recommended Usage.11b only mode Only.11b clients in the network.11g only mode Only.11g clients in the network Mixed mode Mixed.11b and.11g traffic Using a dual slot Access Point, supporting 11b on one channel and the 11g on another channel

Migration to establish and exploit high-speed Wireless LAN’s How to migrate current architectures to support new features and how to migrate current architectures into new concepts

Today’s enterprise Wireless LAN requirements Administrators and users want integrated voice and data Mobile access to mobile voice and data services Leverage single WLAN infrastructure Wireless users need seamless mobility Transparent roaming within and across subnets Zero-configuration and session persistence Administrators need a secure network Interoperable, integrated, and scalable security Minimal client configuration Administrators need a homogeneous management system Multiple radio technologies, client devices, and user profiles Enterprises need a scalable system Maintain efficiency and manageability as network grows No performance impact with scale

New WLAN features on the horizon IEEE g radio Wi-Fi Protected Access (WPA) security Also known as SSN; Early TKIP implementation Standard is mature IEEE i security AES-CCM encryption (mandatory) 802.1x authentication IEEE e QoS Wireless Multimedia Enhancement (WME) as first out Standard stable Q4-02; (starting to) mature Q2-03

Two directions to support the requirements & new features Maintaining the intelligence in the Access Point Creation of a centralized architecture with the intelligence based in the switch Combination of both possibilities: Appropriate solution for the customer Migration from existing network into a new centralized architecture

Intelligent Access Points Fits perfectly in the decentralized intelligence architecture for enterprises or small and medium venues Single and dual slot Access Points Ease of use for subscriber is key Support for a, b and g Extensive radius AAA support, required for public access Network Management software to manage large networks Secure solutions using VPN, access control, 802.1X, re-keying, WPA and migration to i

An intelligent wireless LAN infrastructure solution which simplifies and reduces the cost of deploying Wireless LANs in the enterprise A self-aware system which delivers enhanced functionality required to support broader and deeper adoption of Wireless LANs, enabling Wireless LANs to grow to thousands of nodes Enhanced security, mobility, manageability, QOS, voice integration Consists of a wireless-enabled switch & (lite) Access Points Advantages over today’s and future intelligent Access Points Supports today’s Access Points Leverages [of] existing technology Open system, not proprietary Concept of centralized architecture

Example of a centralized architecture Wireless Enabled Switch Distribution layer Customer’s Directory Server Network Management System Mobile users Access Layer Wiring Closet Mix of Access Points Access Layer Wiring Closet Campus LAN Wireless Enabled Switch

Positioning of centralized concept and intelligent Access Points General positioning Each solution is best suited to a particular environment and application Primary differentiation is based on scale and economics, not necessarily on features Some customers may have a predisposition to a particular architecture When in doubt, use the traditional Access Points in conjunction with a centralized intelligent switch When an intelligent Access Points  Less than 6 APs  Small area, limited-cell environments  Typical department wise roll-out When a centralized solution  6 APs or greater  Large area, multi-cell environments  Typical corporate IT roll-out

Concluding

802.11g Deployment Strategies.11b only mode Only.11b clients in the network.11g only mode Only.11g clients in the network Mixed mode Mixed.11b and.11g traffic Using a duals slot Access Point, supporting 11b on one channel and the 11g on another channel b only Mixed Mode g only Short preamble OFDM preamble No RTS/CTSRTS/CTS with mixed traffic No RTS/CTS 20 μsec slot20 μsec slot with mixed or overlapping traffic 9 μsec slot

1Maintaining the intelligence in the Access Points 2Centralize the intelligence in the wireless-enabled switch When in doubt, use the traditional Access Points in conjunction with a centralized intelligent switch When an intelligent Access Points  Less than 6 APs  Small area, limited-cell environments  Typical department wise roll-out When a centralized solution  6 APs or greater  Large area, multi-cell environments  Typical corporate IT roll-out Migration to establish and exploit high-speed Wireless LAN’s

Ask The Experts Get Your Questions Answered I will be available for questions on Wednesday 10-12

Community Resources Most Valuable Professional (MVP) Newsgroups Converse online with Microsoft Newsgroups, including Worldwide User Groups Meet and learn with your peers

evaluations evaluations

© 2003 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.