Download presentation
Presentation is loading. Please wait.
1
Wi-Fi Business Networking
Xinbo Liu Danye Jia Barry Friedman
2
Site Survey Passive Survey Active Survey Predictive Survey
3
Site Survey Passive Survey Active Survey Predictive Survey (AirMagnet)
4
Channel Interference Co-channel Interference (CCI)
Adjacent channel interference (ACI) 802.11n vs ac 802.11n allows 3 n0n-overlapping channels to be deployed 802.11ac allows at least 23 non-overlapping channels to be deployed
5
Wireless Network Controller
Traditional Wireless Network Controller Wireless Network Architecture Automatic RF management
6
Wireless Network Controller
Virtual Wireless Controller Cloud Controlled WLAN Ruckus Cloud Wi-Fi Access Point
7
ISO Network Management Model
Fault Management Configuration Management Security Management Accounting Management ISO Network Management Model
8
Fault Management/Monitoring
Network Management Platforms Troubleshooting Infrastructure Trivial File Transfer Protocol (TFTP) system log (syslog) Fault Detection and Notification SNMP trap and polling RMON thresholds and syslog Proactive Fault Monitoring and Notification RMON alarm and event vs SNMP polling
9
Configuration Management
Configuration Standards Configuration File Management Inventory Management Software Management
10
Security Management Authentication Authorization Accounting
SNMP Security The SNMP protocol can be used to make configuration changes on routers
11
Accounting Management
NetFlow Activation and Data Collection Strategy Configure IP Accounting
12
Equipment Selection Vendor Selection Build out network
Unified solution Build out network WAPs Networking Post Site Survey – User Engagement Post build enhancements Intrusion detection
13
Network Security SSIDs Guests BYOD Corporate Issued Devices Tunneling
MMC Corporate Issued Devices GPOs and profile verification ISE and posture assessment Certificates
14
Network Resiliency Wireless LAN Controller Congestion Events RF Groups
Channel allocation Roaming Congestion Events Protocol discrimination Disabling inefficient 802.x protocols
15
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.