building wireless networks - bicsi · building wireless networks tariq hasan regional ... lte et...
TRANSCRIPT
Building Wireless Networks
Tariq HasanRegional Sales Manager, MENAWireless Network SolutionsMotorola Solutions
Agenda
• Evolution of WLAN
• Benefits of Distributed architecture
• Next Generation Verticals – BOYD, 3G offload
• Wireless Security
• Voice over WLAN – Push to talk, Switch based telephony.
• Integrating two way radios with WLAN
• Case study on WLAN at the China Olympics
The Evolution: In the beginning
$ $ $
$ $ $
• Access points required to provide network intelligence for WLAN requirements
• Access Points are deployed “passed the edge”
• Layer 2 device
• Resulting in unnecessary costs for: Equipment Support Upgrade
Dissecting an Access Point
Lower costRadio (PHY) 802.11 802.11b 802.11a 802.11g
Higher cost CPU & memory Media Access Control
(MAC) Intelligence
What if…..
Big Centralized MAC
Media independent, distributed PHY
The birth of WLAN Switching
802.11b…a…g thin Access Points
Multi-Service Wireless Switch Layer 2, 3 & 4 switch Management Security Wireless services Wire-line Capabilities
Next Generation Wireless with .11n and higher ‐Distributed Architecture
Bridging at the edgeNo load on the controllerNo bottlenecksScalable 802.11nExcellent VoIP and Video qualitySecurity at the edge
CENTRALIZED CONTROL
INTELLIGENCE AT THE EDGE
MULTI-LEVEL RESILIENCY
ZERO TOUCH DEPLOYMENT
WLAN ARCHITECTURE EVOLUTION
INDEPENDENTSTANDALONE
HUB AND SPOKECENTRALIZED
Distributed
FIRST WIRELESS LANSMOBILE DATA ACCESSNETWORK OF CONVENIENCE
LIMITED MOBILITYDIFFICULT TO MANAGELIMITED SECURITY
COST EFFICIENT 802.11a/b/g WLANFILLED NEED FOR LARGER SCALE AFFORDABLE NETWORKS
LIMITED 11n SCALABILITYBOTTLENECK AT WIRELESS CONTROLLERLIMITED SECURITY/QoSAT THE EDGE
Bridging at the edgeNo load on the controllerNo bottlenecksScalable 802.11nExcellent VoIP and Video qualitySecurity at the edge
Mesh Performance on 802.11n
229 Mbps• Channel Width: 20/40
• Security None
• Packet Size:1518
• Test Duration: 30secs
• Test Tool: Veriwave229 Mbps
5 Ghz
5 Ghz 5 Ghz
124 Mbps
229 Mbps
5 Ghz 5 Ghz
124 Mbps
2.4 Ghz
119 Mbps
Are employees allowed to use their own devices?
DEVICE TRENDS
Source: Quocirca - Sept 2011
BYOD – COLLISION OF TWO WORLDS
Corporate World
Highly SecureHigh visibility
Corporate AccessAntivirus Protection
Personal Devices
Open NetworksLow Visibility
Limited Anti-virusPersonal Emails
Infrastructure
What is a BYOD solution requirement?
• IT departments should be able to provision personal devices of enterprise employees in a non‐intrusive manner
• Provide Enterprises with Tools to self provision devices by the employees themselves
• Typically a Captive Portal with Open security permits first entry. The BYOD platform then provisions the device with Anti‐Virus, Personal Firewalls, Certificates to then permit the device on the corporate network.
Another Emerging Vertical: 3G offloadCurrent Situation ‐ Carrier Need
Smartphones doing internet surfing, video streaming, music download
• Consuming massive bandwidth
• Smartphone share growing rapidly
3G/cellular data traffic greater than expected at highly concentrated and nomadic areas
Potential lost revenue on customers with usage‐based pricing
Customer satisfaction and network performance issues.
4G rollout may take a while and may still not be enough. Carriers need a way to handle the load
Data Growth
0
5
10
15
20
25
30
2008 2009 2010 2011 2012 2013 2014 2015
Dat
a Tr
affic
(nor
mal
ized
to 2
009
volu
me)
0
5
10
15
20
25
30
Dat
a R
even
ue (n
orm
aliz
ed to
200
9 U
SD)
Data TrafficData Revenue
Source: Yankee Group 2009
Data consumption per user on a global basis will increase from 1GB in 2009 to over 14GB in 2015
Mobile data traffic doubling every year through 2013 ‐ growing 100 times faster than mobile data revenues
Data revenues remain relatively constant creating wide gap data traffic
Video The new “Cell Edge”
Traditional Cellular Network Architectures, designed for Voice, are now two decades old.
Voice & SMS: 30 KpbsCell Radius: 1 Km+
90% of all IP traffic will be Video by 201364% of all Mobile IP traffic will be Video by 2013Cisco Visual Networking Index: Forecast and Methodology, 2008‐2013
Current estimates suggest that video will be the single largest component of mobile data usage
Streaming Video: 600 kbps~1.5 MbpsCell Radius: 300 ~ 500 meters
Carrier Business Case‐3G‐WiFi
Hotspot Solutions• Available now• Off-load heavy “Fixed/Nomadic” users from
Mobile network• Create bridge to 3G or 4G• Preserves high value mobile spectrum and
infrastructure for high ARPU Customers• Applies to all mobile markets: HSDPA,
WiMAX, LTE et al.• WiFi off load $$ = 3-4% add-on to full site
Mobile network cost• Deploy WLAN where required • Hotspot Average Cost: $1000s per hotspot
Typical add on 3G/4G Site Cost
3G/4G Site: $10,000s per site for equipment, installation, site fee, etc.
Wireless Security
Attacks are No Longer Innocent Attempts to Gain Notoriety –Organized Crime Uses Wireless Hacking to Steal Money
Breaches Cost Millions
Average Cost for each compromised record: USD 300 - Gartner
10s of Millions of Credit Card records have been breached in the past few years
Average Breach Cost is $6.6m (Network World)
What does this have to do with Wireless?
Wired Network Security Architecture
INTRANET
INTERNET
SECURE ENTERPRISE PERIMETER
Desktop
Server
Firewalls were designed to prevent Internet based attacks
Database Breach
Wired Network Security Architecture in a Wireless World
19
INTRANET
INTERNET
SECURE ENTERPRISE PERIMETER
Wireless Access Point
Server
Branch 1Wireless Switch
Solution :The firewall is distributed giving a complete blanket of user, data and network protection to the enterprise.
Branch 2
www
The Wireless Firewall
Corporate HQ
Corp WAN
Corp WAN
APPLIANCE BASED SERVICESConnecting work teams across the enterprise,
delivered over a range of devices and platforms
Push-to-talk Software Clients
Mobile Extension
Enterprise Text
Radio Link
BASIC(CLIENT BASED)
SERVICES
ENTERPRISE VOICE SOLUTIONS
RESPOND INSTANTLY. ERASE BOUNDARIES. EMPOWER WORKERS.
FMC
Push-to-talk Professional
Unified Retail Communications
MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark Holdings, LLC and are used under license. All other trademarks are the property of their respective owners. © 2011 Motorola Solutions, Inc. All rights reserved.
Basic Push -To -Talk Extend PBX to WLAN or cellular
Text Messagingover WLAN
Interoperability with2-way Radios (PTT)
Private Call, Group Call, Talk group
scan, All call
Local telephony ServerLocal node of central PBX
Simple PTT Voice Communications
– Should be a Wearable, industrial grade solution
– Cost effective so can justify deployment for all associates
– Must be easy to use
– The communicator should be designed to work on a single subnet for small groups of users
– Create multiple groups
– Should have private call‐back feature
IMPROVE ASSOCIATE PRODUCTIVITY THROUGH ENTRY LEVEL VOICE COMMUNICATIONS
RADIO LINKSYSTEM OVERVIEW
Mobile Extension Talk Group 1
Mobile Extension Talk Group 2
AP RIU Two-way Donors
Appliance with Radio Link
Enterprise Network
Two-way Talk Group 1
Two-way Talk Group 2
• PTT talk-groups are established between the Mobile Extension talk groups and two-way radio talk groups by utilizing a two-way mobile radio "donor" device. Each talk-group requires a dedicated two-way donor mobile radio which is connected to the Radio Link via the Radio Interface Unit (RIU).. Each RIU can accommodate up to 4* talk groups.
Radio Link provides PTT talk-group communication between the Mobile Extentsion solution and a two-way radio solution.
• The Radio Link application utilizes the appliance hardware
Sports Stadium Installations
2008 Beijing Olympics
Beijing\Tianjing\Qinghuangdao
13 Stadiums
Motorola
RFS7000+ AP300
Sports Stadium Installations
2010 Guangzhou Asia Game56 StadiumsMotorola
RFS7000+ AP650
2010 Shanghai EXPOMotorola
RFS7000+ AP650