SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
APPLICATION BRIEF
ENTERPRISE WLAN




WiNG 5 WIRELESS LAN
OPTIMIZE THE PERFORMANCE
OF WI-FI ENABLED SMARTPHONES
AND TABLETS
  WiNG 5 DELIVERS BETTER QUALITY OF EXPERIENCE




Every day, wireless devices – some approved, some
not – come through the doors of your enterprise in the     POWER IN NUMBERS
pockets, briefcases and backpacks of your employees        • IDC reports that twice as many smartphones and tablets, nearly all with Wi-Fi, will 	
and may simply “appear” on your network. While             	 ship compared to laptops this year.
this fact may not surprise you, the challenges to your
                                                           • The number of Wi-Fi certified handsets in 2010 was almost 10 times the number
enterprise IT policy remain. Whether you like it or not,
                                                           	 certified in 2007, according to the Wi-Fi Alliance.
employees prefer to use their own mobile devices for
work-related tasks and are doing so in record numbers.     • Apple recently announced it has reached 15 billion downloads from its App Store.
                                                           • Google reports that the number of Android apps downloaded now exceeds
Can your wireless network infrastructure handle the        	 4.5 billion.
growing numbers of tablets, smartphones, and eReaders
                                                           • A Motorola Solutions survey of IT professionals in companies with more than 1,000 	
taking significant bandwidth bites out of your network?
                                                           	 employees revealed that 61 percent of enterprises have seen an increase in
Do you have the right solutions and policies in place to
                                                           	 employees using their own devices for work-related tasks.
grant more freedom of device choice while securing and
optimizing their performance? The choices you make         • By the end of 2011, more than 50 percent of the U.S. population will use
now will directly impact the quality of connectivity       	 smartphones – ABI Research.
you deliver as the number of wireless devices on your
network grows. Your infrastructure matters.
APPLICATION BRIEF
ENTERPRISE WLAN




TO SERVE AND PROTECT                                         is key to the performance of all network devices.
Despite the inherent risks, enterprises in virtually all     Current 802.11n WLAN solutions, like ours, provide
industries are taking the wireless plunge in greater         higher throughput and better coverage. But fair warning,
numbers than ever before. They simply have to.               they are not all created equal and what you don’t know,
Customer and employee expectations continue to drive         could hurt you.
this trend as a result of the rich application experiences
they’ve come to enjoy outside the workplace. By the end      Our WiNG 5 solution makes it easy to extend your
of this year, ABI Research projects more than 50 percent     wireless capabilities and users. One WiNG 5 controller
of the U.S. population will be carrying smartphones and      can now efficiently manage up to 10,000 APs and reliably
by 2014, 90 percent of them will be Wi-Fi capable. To        connect hundreds of thousands of users. Proper RF
accommodate this growth, your network will need the          planning and network configuration directly impact
intelligence, bandwidth and agility to do more.              network device performance and management.

The good news is that with smart, cost-effective             Some important tips:
wireless infrastructure investments, not only can you        • Configure 2.4 GHz for 20 MHz and
scale quickly to secure the growing number of devices        	 three non-overlapping channels
you serve, but also optimize their performance. To do          Having three non-overlapping 20 MHz channels
it right takes advanced planning, proper configuration,        provides greater flexibility for access point placement
enforceable security policies and dynamic network              and Wireless LAN design than one 40 MHz channel
management capabilities. And a cost-effective, easy-to-        and one 20 MHz channel. Maintaining three 20 MHz
deploy wireless network solution to make it work.              channels will help you better optimize wireless
                                                               capacity and coverage.
BUILDING THE RIGHT PATH                                      • Disable lower data rates in 2.4 GHz
Ensuring your network can accommodate increasing               When legacy 802.11b clients communicate on
demand for wireless access and still deliver reliable          the WLAN, they negatively impact Wireless LAN
coverage and performance takes planning and the                performance. If you can, consider disabling the lower
right wireless LAN solution. As the use of wireless            2.4 GHz data rates on your Wireless LAN (such as 1
applications grow, so do your security, reliability and        and 2 Mbps). Data rates can be adjusted through the
capacity challenges. How you configure your network            WiNG 5 Wireless LAN controller.
                                                                                                   (continued on next page)


                                                                                                                              PAGE 2
APPLICATION BRIEF
ENTERPRISE WLAN



• Enable Smart Band control                                                     • User profiles and rate limiting for QoS
  Encourage dual-band clients to operate in the 5 GHz frequency. With             Rate limiting allows you to specify a limit for the aggregate WLAN
  eight times the spectrum of 2.4 GHz, it is typically less congested.            traffic on a per radio basis. It can be used to make sure that guest
  WiNG 5 steers 5 GHz capable clients to use the 5 GHz bands, helping             WLAN users do not use more air time than is allowed by the WLAN
  free 2.4 GHz bands for single-band devices such as the Apple iPhone             rate limit. This can also work in conjunction with per Mobile Unit rate
  4, VoWLAN phones and older laptops.                                             limiting providing finer control.
• Give high throughput client preference in airtime fairness                      WiNG 5 role based firewall enables administrators to group users in
  This allows client preference to be dictated by higher data rates, such as      various categories based on a number of parameters such as their
  11n optimized devices like iPad clients. The WiNG 5 AP keeps track of           type of access or type of device. Different user groups can then be
  the capabilities of various clients and their current connection data rates     assigned varied levels of access, enforced by the firewall. This allows
  and ensures that clients using lower data rates (which reduces overall          administrators to not only control different levels of access for guest
  performance of the cell) don’t impact the clients using higher data rates.      and corporate users, but fine grained control even within the pool of
                                                                                  corporate users.
• Enable accelerated multicast and IGMP snooping
  By delivering higher data rates to one client at a time, WiNG 5               • Manage guest access
  dramatically improves video performance. IGMP snooping helps to                 WiNG 5 can help the administrator segregate guest user traffic from
  prune the multicast traffic in a network by allowing it to be forwarded         corporate traffic. Devices that have not been authorized by corporate
  only to ports and clients that are interested in that particular multicast      are detected and automatically placed on a restricted network vlan.
  stream. WiNG 5 also supports accelerated multicast which converts               The Administrator can then restrict traffic on this network based on
  multicast addressed data frames into directed frames to clients.                either network addresses, or choose to rate-limit the traffic so it does
  These frames are transmitted at higher data rates and more reliably,            not impact the resources available to corporate devices.
  ensuring better overall performance. For some applications that
  depend on pure multicast traffic, the administrator can leave the
  packets as multicast, but still prioritize them relative to other
  multicast traffic.


  WELCOME MORE DEVICES IN, BUT KEEP NETWORK THREATS OUT

While your own enterprise network device policies may be moving                 INTELLIGENCE = OPTIMAL DEVICE PERFORMANCE
toward a more inclusive model, security concerns still likely keep your         It bears repeating that when it comes to wireless capabilities, infrastructure
entire IT team awake at night. And for good reason. Because as your             matters. Intelligent solutions like ours:
network perimeter continues to grow beyond the four walls into the
                                                                                • Enable SMART RF to first calibrate your network correctly and then
cloud, invaders await. They sit in parking lots, along roadways and on
                                                                                  dynamically respond to changing RF conditions – without device users
hilltops using crude technology to find gaps in your defense systems.
                                                                                  being any the wiser. Seamless connectivity is achieved effortlessly
They are using Netstumbler, Kismet, Airsnort or others to beat WEP,
                                                                                  with centralized troubleshooting and real-time integrated network
WPA, intercept communications or even associate as a rogue AP. They
                                                                                  management capabilities.
want in and you need to ensure unprotected employee devices don’t
become the means to that end.
                                                                                 AIRDEFENSE - NETWORK ASSURANCE
Hackers are smart. Enabling iPhones and Android devices on enterprise
servers is risky because cybercriminals are sneaking Trojan-embedded
                                                                                               Centralized WLAN Troubleshooting
apps onto the various marketplaces, which users are downloading to
their devices and right into your networks. Integrated with our WiNG                                     End-user Feedback      Performance Alarms & Reports


5 architecture, our AirDefense solution prevents network intrusions by
identifying potential threats and immediately dropping any data packet               HISTORICAL                        REAL-TIME                       PROACTIVE
that appears suspicious. With a firewall right in the access point,
                                                                                    DETAILED FORENSICS               LIVEVIEW                        ACCESS POINT
AirDefense controls network access and enforces security policy even                                                                                 TESTING
                                                                                    SCOPE FORENSICS                  CLIENT CONNECTIVITY
for sessions that originate and terminate in the same domain. Every                 ALARM FORENSICS
                                                                                                                     TROUBLESHOOTING                 POLICY COMPLIANCE

Packet is analyzed and rules for how to deal with that package are                                                   ACCESS POINT TESTING            PERFORMANCE POLICY

applied, which not only achieves better video, voice and application                                                 SPECTRUM ANALYSIS               LIVE RF

                                                                                                                     LIVE RF
performance, but exceptional threat detection and prevention.
                                                                                                                                                        (continued on next page)


                                                                                                                                                                         PAGE 3
APPLICATION BRIEF
ENTERPRISE WLAN



• Use real-time Spectrum Analysis to view 		
	 interference as it occurs on the network, identify and fix 	
	 sources of interference, move channels and more.
• Test APs to ensure client connectivity, establish 	
	 device and data prioritization and allow better 		
	 bandwidth utilization for voice and multimedia traffic. 	
	 This is all possible because WiNG 5 APs can talk to 	
	 each other, lowering latency rates and dramatically 	
	 improving device performance.
Unconnected devices mean unproductive employees and
lost revenue. Our advanced troubleshooting tools take the
guess work out of network management – not to mention
the legwork of IT staff who would have to physically
walk around to identify interference issues. Our system
identifies and fixes connectivity issues before a user
is even aware of them. If an AP goes down, traffic
automatically reroutes to ensure no calls are dropped
or applications are interrupted.

  WiNG 5 WLAN BENEFITS
  • Distributes intelligence between controllers
  	 and access points
  • Handles more network traffic by avoiding
  	 controller bottlenecks
  • Keeps running when localized wired or wireless 	                              IF YOU CAN’T BEAT THEM...
  	 network problems occur                                                        …plan, configure, secure and optimize their performance
  • Recovers quickly and automatically from RF 		                                 with our WiNG 5 Wireless LAN network solution. Will
  	 interference or coverage problems                                             your network be ready for the next Wi-Fi device surge?
  • Delivers flexibility and choice in creating the                               Find out why less is more here.
  	 right wireless network



ABOUT WIRELESS NETWORK SOLUTIONS
We deliver seamless connectivity that puts real-time information in customers’ hands. Our proven solutions provide the
agility needed to grow business or better protect and serve the public. Working seamlessly together with world-class
devices, our portfolio includes indoor WLAN, outdoor wireless mesh, point-to-multipoint, point-to-point networks and voice
over WLAN solutions. Combined with powerful software for wireless network design, security, management and trouble-
shooting, wireless network solutions deliver trusted networking and anywhere access to organizations across the globe.



For more information on wireless LAN solutions, please visit:
www.motorola.com/wlan.
For news and comments on the industry, join the conversation at
wirelesspulse.motorola.com.


MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered
trademarks of Motorola Trademark Holdings, LLC and are used under license. All other trademarks are
the property of their respective owners. ©2011 Motorola Solutions, Inc. All rights reserved.




                                                                                                                                             PAGE 4
                                                                                                                                            GO-29-112

Weitere ähnliche Inhalte

Mehr von Advantec Distribution (20)

Vx9000 datasheet
Vx9000 datasheetVx9000 datasheet
Vx9000 datasheet
 
Nx7500 datasheet
Nx7500 datasheetNx7500 datasheet
Nx7500 datasheet
 
Nx9500 datasheet
Nx9500 datasheetNx9500 datasheet
Nx9500 datasheet
 
Nx4500 6500 datasheet
Nx4500 6500 datasheetNx4500 6500 datasheet
Nx4500 6500 datasheet
 
Rfs7000 datasheet
Rfs7000 datasheetRfs7000 datasheet
Rfs7000 datasheet
 
Rfs6000 datasheet
Rfs6000 datasheetRfs6000 datasheet
Rfs6000 datasheet
 
Rfs4000 datasheet
Rfs4000 datasheetRfs4000 datasheet
Rfs4000 datasheet
 
Ap8200 datasheet
Ap8200 datasheetAp8200 datasheet
Ap8200 datasheet
 
Ap7181 datasheet
Ap7181 datasheetAp7181 datasheet
Ap7181 datasheet
 
Ap8222 datasheet
Ap8222 datasheetAp8222 datasheet
Ap8222 datasheet
 
Ap8163 datasheet
Ap8163 datasheetAp8163 datasheet
Ap8163 datasheet
 
Ap6562 datasheet
Ap6562 datasheetAp6562 datasheet
Ap6562 datasheet
 
Ap8122 datasheet
Ap8122 datasheetAp8122 datasheet
Ap8122 datasheet
 
Ap8132 datasheet
Ap8132 datasheetAp8132 datasheet
Ap8132 datasheet
 
Ap7532 datasheet
Ap7532 datasheetAp7532 datasheet
Ap7532 datasheet
 
Ap7502 datasheet
Ap7502 datasheetAp7502 datasheet
Ap7502 datasheet
 
Ap7131 datasheet
Ap7131 datasheetAp7131 datasheet
Ap7131 datasheet
 
Ap7522 datasheet
Ap7522 datasheetAp7522 datasheet
Ap7522 datasheet
 
1 access points_vertical_snapshot
1 access points_vertical_snapshot1 access points_vertical_snapshot
1 access points_vertical_snapshot
 
Ap6522 datasheet
Ap6522 datasheetAp6522 datasheet
Ap6522 datasheet
 

Kürzlich hochgeladen

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Kürzlich hochgeladen (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Optimize wi fi-smartphones_tablets

  • 1. APPLICATION BRIEF ENTERPRISE WLAN WiNG 5 WIRELESS LAN OPTIMIZE THE PERFORMANCE OF WI-FI ENABLED SMARTPHONES AND TABLETS WiNG 5 DELIVERS BETTER QUALITY OF EXPERIENCE Every day, wireless devices – some approved, some not – come through the doors of your enterprise in the POWER IN NUMBERS pockets, briefcases and backpacks of your employees • IDC reports that twice as many smartphones and tablets, nearly all with Wi-Fi, will and may simply “appear” on your network. While ship compared to laptops this year. this fact may not surprise you, the challenges to your • The number of Wi-Fi certified handsets in 2010 was almost 10 times the number enterprise IT policy remain. Whether you like it or not, certified in 2007, according to the Wi-Fi Alliance. employees prefer to use their own mobile devices for work-related tasks and are doing so in record numbers. • Apple recently announced it has reached 15 billion downloads from its App Store. • Google reports that the number of Android apps downloaded now exceeds Can your wireless network infrastructure handle the 4.5 billion. growing numbers of tablets, smartphones, and eReaders • A Motorola Solutions survey of IT professionals in companies with more than 1,000 taking significant bandwidth bites out of your network? employees revealed that 61 percent of enterprises have seen an increase in Do you have the right solutions and policies in place to employees using their own devices for work-related tasks. grant more freedom of device choice while securing and optimizing their performance? The choices you make • By the end of 2011, more than 50 percent of the U.S. population will use now will directly impact the quality of connectivity smartphones – ABI Research. you deliver as the number of wireless devices on your network grows. Your infrastructure matters.
  • 2. APPLICATION BRIEF ENTERPRISE WLAN TO SERVE AND PROTECT is key to the performance of all network devices. Despite the inherent risks, enterprises in virtually all Current 802.11n WLAN solutions, like ours, provide industries are taking the wireless plunge in greater higher throughput and better coverage. But fair warning, numbers than ever before. They simply have to. they are not all created equal and what you don’t know, Customer and employee expectations continue to drive could hurt you. this trend as a result of the rich application experiences they’ve come to enjoy outside the workplace. By the end Our WiNG 5 solution makes it easy to extend your of this year, ABI Research projects more than 50 percent wireless capabilities and users. One WiNG 5 controller of the U.S. population will be carrying smartphones and can now efficiently manage up to 10,000 APs and reliably by 2014, 90 percent of them will be Wi-Fi capable. To connect hundreds of thousands of users. Proper RF accommodate this growth, your network will need the planning and network configuration directly impact intelligence, bandwidth and agility to do more. network device performance and management. The good news is that with smart, cost-effective Some important tips: wireless infrastructure investments, not only can you • Configure 2.4 GHz for 20 MHz and scale quickly to secure the growing number of devices three non-overlapping channels you serve, but also optimize their performance. To do Having three non-overlapping 20 MHz channels it right takes advanced planning, proper configuration, provides greater flexibility for access point placement enforceable security policies and dynamic network and Wireless LAN design than one 40 MHz channel management capabilities. And a cost-effective, easy-to- and one 20 MHz channel. Maintaining three 20 MHz deploy wireless network solution to make it work. channels will help you better optimize wireless capacity and coverage. BUILDING THE RIGHT PATH • Disable lower data rates in 2.4 GHz Ensuring your network can accommodate increasing When legacy 802.11b clients communicate on demand for wireless access and still deliver reliable the WLAN, they negatively impact Wireless LAN coverage and performance takes planning and the performance. If you can, consider disabling the lower right wireless LAN solution. As the use of wireless 2.4 GHz data rates on your Wireless LAN (such as 1 applications grow, so do your security, reliability and and 2 Mbps). Data rates can be adjusted through the capacity challenges. How you configure your network WiNG 5 Wireless LAN controller. (continued on next page) PAGE 2
  • 3. APPLICATION BRIEF ENTERPRISE WLAN • Enable Smart Band control • User profiles and rate limiting for QoS Encourage dual-band clients to operate in the 5 GHz frequency. With Rate limiting allows you to specify a limit for the aggregate WLAN eight times the spectrum of 2.4 GHz, it is typically less congested. traffic on a per radio basis. It can be used to make sure that guest WiNG 5 steers 5 GHz capable clients to use the 5 GHz bands, helping WLAN users do not use more air time than is allowed by the WLAN free 2.4 GHz bands for single-band devices such as the Apple iPhone rate limit. This can also work in conjunction with per Mobile Unit rate 4, VoWLAN phones and older laptops. limiting providing finer control. • Give high throughput client preference in airtime fairness WiNG 5 role based firewall enables administrators to group users in This allows client preference to be dictated by higher data rates, such as various categories based on a number of parameters such as their 11n optimized devices like iPad clients. The WiNG 5 AP keeps track of type of access or type of device. Different user groups can then be the capabilities of various clients and their current connection data rates assigned varied levels of access, enforced by the firewall. This allows and ensures that clients using lower data rates (which reduces overall administrators to not only control different levels of access for guest performance of the cell) don’t impact the clients using higher data rates. and corporate users, but fine grained control even within the pool of corporate users. • Enable accelerated multicast and IGMP snooping By delivering higher data rates to one client at a time, WiNG 5 • Manage guest access dramatically improves video performance. IGMP snooping helps to WiNG 5 can help the administrator segregate guest user traffic from prune the multicast traffic in a network by allowing it to be forwarded corporate traffic. Devices that have not been authorized by corporate only to ports and clients that are interested in that particular multicast are detected and automatically placed on a restricted network vlan. stream. WiNG 5 also supports accelerated multicast which converts The Administrator can then restrict traffic on this network based on multicast addressed data frames into directed frames to clients. either network addresses, or choose to rate-limit the traffic so it does These frames are transmitted at higher data rates and more reliably, not impact the resources available to corporate devices. ensuring better overall performance. For some applications that depend on pure multicast traffic, the administrator can leave the packets as multicast, but still prioritize them relative to other multicast traffic. WELCOME MORE DEVICES IN, BUT KEEP NETWORK THREATS OUT While your own enterprise network device policies may be moving INTELLIGENCE = OPTIMAL DEVICE PERFORMANCE toward a more inclusive model, security concerns still likely keep your It bears repeating that when it comes to wireless capabilities, infrastructure entire IT team awake at night. And for good reason. Because as your matters. Intelligent solutions like ours: network perimeter continues to grow beyond the four walls into the • Enable SMART RF to first calibrate your network correctly and then cloud, invaders await. They sit in parking lots, along roadways and on dynamically respond to changing RF conditions – without device users hilltops using crude technology to find gaps in your defense systems. being any the wiser. Seamless connectivity is achieved effortlessly They are using Netstumbler, Kismet, Airsnort or others to beat WEP, with centralized troubleshooting and real-time integrated network WPA, intercept communications or even associate as a rogue AP. They management capabilities. want in and you need to ensure unprotected employee devices don’t become the means to that end. AIRDEFENSE - NETWORK ASSURANCE Hackers are smart. Enabling iPhones and Android devices on enterprise servers is risky because cybercriminals are sneaking Trojan-embedded Centralized WLAN Troubleshooting apps onto the various marketplaces, which users are downloading to their devices and right into your networks. Integrated with our WiNG End-user Feedback Performance Alarms & Reports 5 architecture, our AirDefense solution prevents network intrusions by identifying potential threats and immediately dropping any data packet HISTORICAL REAL-TIME PROACTIVE that appears suspicious. With a firewall right in the access point, DETAILED FORENSICS LIVEVIEW ACCESS POINT AirDefense controls network access and enforces security policy even TESTING SCOPE FORENSICS CLIENT CONNECTIVITY for sessions that originate and terminate in the same domain. Every ALARM FORENSICS TROUBLESHOOTING POLICY COMPLIANCE Packet is analyzed and rules for how to deal with that package are ACCESS POINT TESTING PERFORMANCE POLICY applied, which not only achieves better video, voice and application SPECTRUM ANALYSIS LIVE RF LIVE RF performance, but exceptional threat detection and prevention. (continued on next page) PAGE 3
  • 4. APPLICATION BRIEF ENTERPRISE WLAN • Use real-time Spectrum Analysis to view interference as it occurs on the network, identify and fix sources of interference, move channels and more. • Test APs to ensure client connectivity, establish device and data prioritization and allow better bandwidth utilization for voice and multimedia traffic. This is all possible because WiNG 5 APs can talk to each other, lowering latency rates and dramatically improving device performance. Unconnected devices mean unproductive employees and lost revenue. Our advanced troubleshooting tools take the guess work out of network management – not to mention the legwork of IT staff who would have to physically walk around to identify interference issues. Our system identifies and fixes connectivity issues before a user is even aware of them. If an AP goes down, traffic automatically reroutes to ensure no calls are dropped or applications are interrupted. WiNG 5 WLAN BENEFITS • Distributes intelligence between controllers and access points • Handles more network traffic by avoiding controller bottlenecks • Keeps running when localized wired or wireless IF YOU CAN’T BEAT THEM... network problems occur …plan, configure, secure and optimize their performance • Recovers quickly and automatically from RF with our WiNG 5 Wireless LAN network solution. Will interference or coverage problems your network be ready for the next Wi-Fi device surge? • Delivers flexibility and choice in creating the Find out why less is more here. right wireless network ABOUT WIRELESS NETWORK SOLUTIONS We deliver seamless connectivity that puts real-time information in customers’ hands. Our proven solutions provide the agility needed to grow business or better protect and serve the public. Working seamlessly together with world-class devices, our portfolio includes indoor WLAN, outdoor wireless mesh, point-to-multipoint, point-to-point networks and voice over WLAN solutions. Combined with powerful software for wireless network design, security, management and trouble- shooting, wireless network solutions deliver trusted networking and anywhere access to organizations across the globe. For more information on wireless LAN solutions, please visit: www.motorola.com/wlan. For news and comments on the industry, join the conversation at wirelesspulse.motorola.com. MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark Holdings, LLC and are used under license. All other trademarks are the property of their respective owners. ©2011 Motorola Solutions, Inc. All rights reserved. PAGE 4 GO-29-112