WLAN Architecture - Considerations Christoffer Jacobsson.

Slides:



Advertisements
Similar presentations
© 2011 Aerohive Networks CONFIDENTIAL WI-FI DESIGN 101: QUESTIONS EVERY MANAGER SHOULD ANSWER BEFORE PURCHASING WI-FI.
Advertisements

UTC-N Overview of Campus Networks Design.
1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
WHG Product Training Oct 2011 For authorized partners only
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
Page 1 MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their.
Enterprise Wireless Solutions: Controller-based vs. Controller-less What should you be implementing in 2014?
Is Your Network Ready for the iPad? George Bentinck MBCS MIET Sales Engineer, EMEA +44 (0) Twitter: meraki_se.
Wireless Networking Solutions for Schools AP-300.
All Rights Reserved © Alcatel-Lucent | Enterprise mobility | 2010 Laurent Bouchoucha October, 2010 Seamless mobility in a secure and controlled.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Software Defined Networking.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Business Continuity Moving from Disaster Recovery to Constant Availability Dan.
Network Access and 802.1X Klaas Wierenga SURFnet
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Technologies Networking for Home and Small Businesses – Chapter 7.
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
Chudi IgboemekaITSS, Stanford University 04/2002 Campus Wireless Update Chudi Igboemeka Academic Technology, Pilots & Projects ITSS.
Wireless LANs A Case Study of Baylor University’s Wireless Network Copyright Bob Hartland 2002 This work is the intellectual property of the author. Permission.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
195Eg Ethernet Wired LAN 195Eg. Wireless Ethernet Setting IP Address Using Utility Programs Begin Programming Definition Selection Programming Modes of.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
1 October 20-24, 2014 Georgian Technical University PhD Zaza Tsiramua Head of computer network management center of GTU South-Caucasus Grid.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Wi-Fi Public Access Requirements for Wireless Products & Technologies Public Access Provider Perspective Phil Belanger.
Case Study 2 – TeraBit Inc. DMico Johnson Hans Schmidt.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Deploying XenApp and XenDesktop with BIG-IP Brent Imhoff – Field Systems Engineer Gary Zaleski – Solutions Architect Michael Koyfman – Solutions Architect.
© Aastra – 2012 SIP-DECT 4.0 RFP 43 WLAN June 2012.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
D-Link Business Wireless. Trends of Business Wireless solutions The market is looking for Cutting-edge Technology Unified Wired and Wireless Access System.
Bintec WLAN Controller Overview.  Designed for the requirements of organization with up to 100 employees  Suitable for installation from 2 to 24 Access.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
Wireless Long-Term Issue Wireless LANs Issues for Infrastructure Support Mark Poepping Carnegie Mellon Tucson CSG 2/4/2000.
Wireless Hotspots: Current Challenges and Future Directions CNLAB at KAIST Presented by An Dong-hyeok Mobile Networks and Applications 2005.
Bluesocket vWLAN Overview. Its ALL about n……
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
FireProof. The Challenge Firewall - the challenge Network security devices Critical gateway to your network Constant service The Challenge.
© 1999, Cisco Systems, Inc. 1-1 Chapter 2 Overview of a Campus Network © 1999, Cisco Systems, Inc.
The Next Generation Wireless Yuri Kolomiyets Network Services Information Systems and Technology.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Femto Network Dr. Monir Hossen ECE, KUET Department of Electronics and Communication Engineering, KUET.
Leading provider of secure mobility for the enterprise Aruba MOVE Architecture Industry’s most secure WLAN Easiest BYOD & Guest Access Zero-touch.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Switching in an Enterprise Network Introducing Routing and Switching in the.
Enterprise High Speed Access Point Brand & Marketing MGMT Dept DrayTek Corp VigorAP900.
How are Computers Connected? Chapter 8. How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed.
Cisco Aironet 350 Series: The Right Choice for the Enterprise.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
NT1210 Introduction to Networking
Model: DS-600 5x 10/100/1000Mbps Ethernet Port Centralized WLAN management and Access Point Discovery Manages up to 50 APs with access setting control.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
Networks and Security Great Demo
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
ShoreTel Virtualization February, © 2014 ShoreTel, Inc. All rights reserved worldwide. Unified Communications Deployment Model 1 Secure Reliable.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
University of Maryland College Park
Product Introduction --AP Controller M3 Yaojun 26/12/2015
Switch Setup Connectivity to Other locations Via MPLS/LL etc
CenturyLink® Business Wi-Fi
Building Scalable Ignition Enterprise Architectures
Cisco WLAN Overview and Vision
Configure a Wireless Router
Enterprise Wireless Solutions: Controller-based vs. Controller-less
What’s New In WatchGuard Wi-Fi Cloud v8.6
Presentation transcript:

WLAN Architecture - Considerations Christoffer Jacobsson

What will I talk about? Some enterprise WLAN history. Explaining the three working planes of a WLAN. Centralized architecture, pros and cons. Distributed architecture, pros and cons. Summary and an extra slide on redundancy.

Where did enterprise WLAN begin? Fat/Autonomous APs Secondary access method Unique solutions for every need Limited coverage Little or no visibility Management nightmare

The three working planes of a WLAN Data planeManagement planeControl plane Data Forwarding Configuration Firmware Monitoring/Reporting Dynamic radio control Mobility/Roaming Load balancing Encryption/Decryption QoS tagging Data filtering

How do we leverage these working planes? Data plane Management plane Control plane Data plane Management plane Control plane Data plane Management plane Control plane Data plane Management plane Control plane SSID: Awsome-Company Security: WPA2-PSK SSID: Awsome-company Security: WPA2-PSK Wireless Network Management System (WNMS) SSID: Awsome-Company Security: WPA2-PSK

Centralized architecture – ”The overlay implementation” YeahBaby Inc. WLAN project. 500 employees, 2 devices per person. 7 floor building. Trunk port including new WLAN client WLANs New VLANs exist only in controller and Core/Distribution Seamless roaming accross all floors Centralized channel and power dynamics Encryption from client to controller One RADIUS client One point of management s Control Data Management

Centralized architecture for a distributed company NearYou AB WLAN project. 20 Offices spread out over the country All internet and server access goes through HQ New VLANs exist only in HQ All APs configured the same way Client traffic encrypted to HQ One RADIUS client One point of management Control Data Management

Drawbacks of a centralized architecture NearYou AB WLAN project. 20 Offices spread out over the country All internet and server access goes through HQ Dependancy on controllers Possible traffic U-turns and bottlenecks Scalability issues Controllers and licenses are expensive Control Data Management

Distributed architecture – Optimizing traffic flows UpUpAndAway Inc. WLAN project. 4 offices globally. Demands local survivability. Client traffic forwarded locally Local RADIUS client Central management on premises or in the cloud Local shared control plane Distributed architecture is redundant by design Data Management Control Data Control

Distributed architecture – an MSPs perspective Aranya AB, WLAN as a service. Customers totally separated from eachother. No operational dependencies on Aranya datacenter Management Data Control Data Control Data Control Data

Drawbacks of a distributed architecture Management Data Control Data Control Alot of more wired side management More RADIUS clients Wireless encryption ends at AP Changing architecture can sometimes require hardware replacement.

Extra redundancy considerations Who and where are your RADIUS clients and servers? Are those server certificates under control? Are you querying more than one LDAP server? Who and where are your DHCP servers and IP-helpers? Always test your redundancy!

Questions and comments are welcome! Mail: Phone: