26
Session ID 20PT Mobility Wireless Best Design Deep Dive MinSe Kim Technical Marketing Engineer

Mobility Wireless Best Design Deep DiveArial regular—Only font used in presentation Body copy uses sentence capital letters only, size 24, left aligned Sub-bullets are size 20 and

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Mobility Wireless Best Design Deep DiveArial regular—Only font used in presentation Body copy uses sentence capital letters only, size 24, left aligned Sub-bullets are size 20 and

Session ID 20PT

Mobility Wireless Best Design Deep Dive

MinSe Kim

Technical Marketing Engineer

Page 2: Mobility Wireless Best Design Deep DiveArial regular—Only font used in presentation Body copy uses sentence capital letters only, size 24, left aligned Sub-bullets are size 20 and

Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 2

WLAN market credentials:

• 5+ years of growing faster than the market

• 250,000+ enterprise customers

• 10+ Million Access Points shipped

• 93% of Fortune 1000 selected Cisco

WLAN

• 77% of Fortune 1000 installed Cisco

802.11n

•Grew $350+ Million in trailing 12 months

WLAN Industry credentials:

• Gartner listed as Market Leader for 5+

years

•15+ years of WLAN development

experience

• 50+ IEEE 802.11 active members

• 750+ wireless engineers

• 140+ granted patents - 270+ patents

pending

• ICSA, FIPS, Common Criteria, PCI

certified

Cisco Mobility / WLAN Leadership

Page 3: Mobility Wireless Best Design Deep DiveArial regular—Only font used in presentation Body copy uses sentence capital letters only, size 24, left aligned Sub-bullets are size 20 and

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BRKSPM-2604_c1 3

Wireless Service Architecture

Centralized

Distributed

Hybrid

Network Usage type

Campus Network

Branch Network

Remote Access Network

Common Requirement

Performance – Promising Maximum performance

Mobility – Freedom of Mobility, regardless of size of network

Secure – 802.1x, Policy-based management, BYOD, wIPS, Data Privacy

Manageability – RF Specialized, Wired-Wireless management, Client

Troubleshoot

Today’s WLAN Service Architecture

Page 4: Mobility Wireless Best Design Deep DiveArial regular—Only font used in presentation Body copy uses sentence capital letters only, size 24, left aligned Sub-bullets are size 20 and

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BRKSPM-2604_c1 4

Centralized Architecture

Data path is centralized to the WLC. Communication between AP and WLC is

automatically tunneled and encrypted

Easy control traffic and provide ―specialized‖ mobility network services

Create access network independent Wireless Network

Expecting WLC upgrades as WLAN standard moves to faster 802.11n

Usual suspects on Centralized Architecture…

Can Controller handle increasing traffics from 802.11n devices?

192.168.0.x

10.1.1.x

192.168.0.x

20.1.1.x

Page 5: Mobility Wireless Best Design Deep DiveArial regular—Only font used in presentation Body copy uses sentence capital letters only, size 24, left aligned Sub-bullets are size 20 and

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BRKSPM-2604_c1 5

802.11n Myth

What we hear from the ―industry‖

―802.1n will deliver 300Mbps, 450Mbps, 600Mbps … 900 Mbps…‖

So Can WLC get chocked up as WLC will become bottleneck?

Influx of new devices 802.11n

Supports 20Mhz, Long Guard Interval

Single Tx / Rx

Maximum Datarate = 65Mbps

Still stand truth in 2011

20% Datarate

increase from

802.11a/g

Mostly came

from 2.4Ghz

Oversubscription is between downlink-uplink is typical in wired design (100Mbps x 24 : 1Gbps 24 Gbps x 20 : 2-20Gpbs)

Cisco WLC’s subscription ratio is the lowest in the industry.(500AP :

8Gbps)

Required Network performance is application driven, not device driven

Page 6: Mobility Wireless Best Design Deep DiveArial regular—Only font used in presentation Body copy uses sentence capital letters only, size 24, left aligned Sub-bullets are size 20 and

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BRKSPM-2604_c1 6

Campus / HQ type deploy model

Campus Network or In-building networks that spans multiple subnet.

(Campus, Multi-story office, High density usage types)

Enterprise WLAN network requires versatile, adaptable network that

embrace legacy network requirements

Mobility/Scalability/HA/Security …

Integration of legacy wired infra (VLAN, IP Subnetting) with full mobility

Complex requirements and sophisticated security & management policy

yet minimize management points Born WLAN Controller based

architecture and design

Usual questions on Campus/Multi-story network

How to design WLAN network on top of current wired infrastructure?

Scalability / Future-proof network roadmap

Page 7: Mobility Wireless Best Design Deep DiveArial regular—Only font used in presentation Body copy uses sentence capital letters only, size 24, left aligned Sub-bullets are size 20 and

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BRKSPM-2604_c1 7

Why Centralized Architecture? Performance Perspective

In centralized

architecture,

controllers seats inline

data processing

Controller is

sophisticated system

that responsible for

data processing,

security, encryption,

RF management –

Needs to be High

performance, full-

featured system.

3550

3550

WLAN

Controller

Network

Backbone

AP

L3 Tunnel

3F

2F

1F

Page 8: Mobility Wireless Best Design Deep DiveArial regular—Only font used in presentation Body copy uses sentence capital letters only, size 24, left aligned Sub-bullets are size 20 and

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BRKSPM-2604_c1 8

Why Centralized Architecture? Mobility Perspective

Essential architecture in campus & Multi-story building

Best architecture that guarantee mobility and scalability

SSID Independent VLAN/IP subnetting

AP Group – VLAN/IP

Subnetting per

location(per AP)

Dynamic VLAN

(requires .1x auth

per user)

VLANselect

(Automatic)

Building A Building B

Building C-2F above

Building C-1F

User Group A User Group B

User C

User D

Different VLAN per User

Page 9: Mobility Wireless Best Design Deep DiveArial regular—Only font used in presentation Body copy uses sentence capital letters only, size 24, left aligned Sub-bullets are size 20 and

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BRKSPM-2604_c1 9

Why Centralized Architecture? Security Perspective

Centralized Network Security Policy design and enforcement

Device Profiling and dynamic policy change (CoA)

and Location tracking, Data privacy, wIPS, Troubleshooting…

VLAN 10

VLAN 20

New BYOD

Employee

Company

Laptop

WLAN

Controller

Intranet

Resource

Internet

Access Only

User Location

Time Attribute X

DHCP

RADIUS SNMP

NETFLOW HTTP

DNS Device

Centralized

Policy Engine

Wired-Wireless

Integrated

NMS

Single SSID

Page 10: Mobility Wireless Best Design Deep DiveArial regular—Only font used in presentation Body copy uses sentence capital letters only, size 24, left aligned Sub-bullets are size 20 and

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BRKSPM-2604_c1 10

Branch type usage model

WLAN Design that targeted for Branch

Local Branch WLC is not decided by number of active users in the

branch but required by its application.

Number of AP per branch is variables but architecture shall be capable

of future scalability

Usual questions in branch type deployment…

All Wireless ?

What is optimal trade-off of branch network design while maintain quality

of service

How to leverage/integrate current branch IT facility

Page 11: Mobility Wireless Best Design Deep DiveArial regular—Only font used in presentation Body copy uses sentence capital letters only, size 24, left aligned Sub-bullets are size 20 and

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BRKSPM-2604_c1 11

Distributed Architecture

WLC does not participate in user data path. Data is switched to local

branch network at the branch AP level

Mobility is only allowed on single subnet level and user VLAN is defined

at the branch access switch

Typical questions in Distributed architecture

Is that useable on campus or HQ design?

How to provides L3 mobility in distributed architecture

Can we provide enough mobility experience – from performance &

scalability perspective

What is security policy?

Does it provide enough scalability from feature, flexibility and capacity

perspective?

Page 12: Mobility Wireless Best Design Deep DiveArial regular—Only font used in presentation Body copy uses sentence capital letters only, size 24, left aligned Sub-bullets are size 20 and

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BRKSPM-2604_c1 12

Hybrid Architecture

WLC can engage on user data traffic plane based on types of user,

types of device yet it maintains control plane only network

AP have different WLAN profiles and AP supports access of both

centralized or distributed network

Used in Branch that needs to have both distributed and centralized

architecture feature

Usual questions in hybrid type approach…

What types of WLAN service is possible from hybrid network

Page 13: Mobility Wireless Best Design Deep DiveArial regular—Only font used in presentation Body copy uses sentence capital letters only, size 24, left aligned Sub-bullets are size 20 and

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BRKSPM-2604_c1 13

Hybrid WLAN service using private cloud controller

Wide Area Network

Lower CapEx

Single Configuration, Easy maintentance

Centralize IT support resource

FlexConnect 7500 • Scalable

• Supports Hybrid

Wireless Network Data Center / Private Cloud

Page 14: Mobility Wireless Best Design Deep DiveArial regular—Only font used in presentation Body copy uses sentence capital letters only, size 24, left aligned Sub-bullets are size 20 and

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BRKSPM-2604_c1 14

Remote Access type usage model

Telecommuter or satellite office employee use simple yet secure WLAN,

connects to headquarter network

Login/Access/Encryption/Personal SSID settings etc., All of these

processes are assuming operation under untrusted network environment

Better user experience – AutoProvisioning, Zero-touch client, Flexibility

through Home SSID and multiple Ethernet ports

Usual questions in WLAN remote access …

How to compare various VPN options?

Can it be used in different types of remote network?

How easy to use? While system provides similar security of corporate

network

Page 15: Mobility Wireless Best Design Deep DiveArial regular—Only font used in presentation Body copy uses sentence capital letters only, size 24, left aligned Sub-bullets are size 20 and

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BRKSPM-2604_c1 15

Provide a Seamless and Secure Corporate Experience….from the Home

Application of

Borderless Network

services and policies

Extends Borderless Network services

from the core to the home

OfficeExtends

600 AP

WiSM2 / 5500

Controller

Home Router

Corporate

Network

Industry Standard CAPWAP Encryption using DTLS No Impact to controllers | Line rate support for broadband connections

Segments and Supports

Home Network Activities

Page 16: Mobility Wireless Best Design Deep DiveArial regular—Only font used in presentation Body copy uses sentence capital letters only, size 24, left aligned Sub-bullets are size 20 and

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BRKSPM-2604_c1 16

Wireless Network Goal in 12 months

Ideas of Operational Targets

Page 17: Mobility Wireless Best Design Deep DiveArial regular—Only font used in presentation Body copy uses sentence capital letters only, size 24, left aligned Sub-bullets are size 20 and

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BRKSPM-2604_c1 17

Wireless in 12months - Performance

Challenges

Comparing WLAN AP usually involves differences of RF quality, CPU speed and packet forwarding performance But most of anything above, Proper RF design and interference management is the key

Answers

In the WLAN controller’s case, depends on data processing units (NPU,ASIC,Bus) capacity and scalability

WLAN throughput from the user is NOT ideal Bandwidth, but practical Goodputs that depends on RF control

WLAN Performance is depends on proper survey and cell design, and RF environmental monitoring and control

Usual questions on WLAN performance

What is 2x2, 2x3, 3x3? 2 Stream? 3 Stream?

Where is the performance bottleneck?

Page 18: Mobility Wireless Best Design Deep DiveArial regular—Only font used in presentation Body copy uses sentence capital letters only, size 24, left aligned Sub-bullets are size 20 and

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BRKSPM-2604_c1 18

Wireless in 12months – Mobility

Challenges

Mobility issue may not the first priority in nomadic uses of laptop but mobile nature of Smart devices raised bar

WLAN industry does not have fully interoperable fast roaming product.

Answers

Looking for what’s available today – CCX, OKC

Mobility is connected to Scalability L2 L3 Roaming, HQ Branch mobility

Usual questions for Mobility performance

How to implement 3G-WLAN Roaming?

What needs to be done to enable VoWLAN on BYOD

Page 19: Mobility Wireless Best Design Deep DiveArial regular—Only font used in presentation Body copy uses sentence capital letters only, size 24, left aligned Sub-bullets are size 20 and

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BRKSPM-2604_c1 19

Cisco Compatible Extensions (CCX)

Over seventy-five (75) Partners license CCX in the CDN Program

Over 350 Devices & Tags are CCX Certified (―Cisco Compatible‖)

Over 730 Companies in the CDN Program across Cisco CDO

Page 20: Mobility Wireless Best Design Deep DiveArial regular—Only font used in presentation Body copy uses sentence capital letters only, size 24, left aligned Sub-bullets are size 20 and

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BRKSPM-2604_c1 20

Challenges

Unprecedented level of security enforcement is required from Day One of operation

All of access is authentication, policy-based

Pervasive RF Monitoring

E2E Encryption

Security = 50% of Policy, 50% of Adaptation

Answers

Centralized Policy Creation, Automated adaptation

Approach from Wired-Wireless Integration perspective

E2E

WPA2-AES Migration

Usual Questions

Does wIPS solve WLAN security problem?

Wireless in 12months - Security

Page 21: Mobility Wireless Best Design Deep DiveArial regular—Only font used in presentation Body copy uses sentence capital letters only, size 24, left aligned Sub-bullets are size 20 and

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BRKSPM-2604_c1 21

Challenges

RF Management is essential to raise WLAN service quality WLAN NMS acts crucial role on campus wide RF Policy & management

Wireless-only NMS does not cover network perspective

Legacy wired LAN NMS that consisted around port-based(static) & syslog based (post issue) needs to be extended to embrace Wireless network and focused on user experiences

Answers

Wireless Management that provides RF + Wired and Client manageability

What is Client Management? – Connection Troubleshooting + RF management is key. Location information for troubleshooting & security

Usual questions on WLAN NMS …

Multi-vender Management?- Best efforts basis

Wireless in 12months - Management

Page 22: Mobility Wireless Best Design Deep DiveArial regular—Only font used in presentation Body copy uses sentence capital letters only, size 24, left aligned Sub-bullets are size 20 and

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BRKSPM-2604_c1 22

Next Generation WLAN Architecture

Preparing Exponential growth of ―Wireless‖ client.

Emerge of Wireless Service Quality Management to protect 802.11 capacity and performance

Interference Management, RF management will raise as key element to manage

―Low-latency, Scalable Mobility‖ will be natural things on any wireless network

―Robustness of WLAN‖ become key criteria of successful enterprise network

Wired-Wireless Integration will happen not only access but from E2E perspective

Page 23: Mobility Wireless Best Design Deep DiveArial regular—Only font used in presentation Body copy uses sentence capital letters only, size 24, left aligned Sub-bullets are size 20 and

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BRKSPM-2604_c1 23

One more thing

What is this Access Point?

First 4x4 Enterprise AP. First Active Beam Forming solution for 802.11n devices.

Q) What is the key element to protect your Wireless performance ?

RF/Interference Management

Page 24: Mobility Wireless Best Design Deep DiveArial regular—Only font used in presentation Body copy uses sentence capital letters only, size 24, left aligned Sub-bullets are size 20 and

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BRKSPM-2604_c1 24

Page 25: Mobility Wireless Best Design Deep DiveArial regular—Only font used in presentation Body copy uses sentence capital letters only, size 24, left aligned Sub-bullets are size 20 and

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BRKSPM-2604_c1 25

Source: Placeholder for Notes is 14 points

History of Cisco Wireless Networking

Arial regular—Only font used in presentation

Body copy uses sentence capital letters only, size 24, left aligned

Sub-bullets are size 20 and indented

Hyperlink: www.cisco.com

Use Cisco red, bold, or both when emphasizing words, do not italicize

Heritage of Excellence

Page 26: Mobility Wireless Best Design Deep DiveArial regular—Only font used in presentation Body copy uses sentence capital letters only, size 24, left aligned Sub-bullets are size 20 and

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Presentation_ID 26

―Optional quote slide option two has text that is left aligned, set in Arial Regular with a point size of 28 points. The maximum quote length should not be more than six lines of text per quote.‖