Posts with #cisco wireless - cisco wireless ap tag
The Adaptive Radio Modules are a family of solutions in a modular form factor that allow customers to adapt their wireless network to their current and future needs. The modules provide a dedicated third radio that can be field-upgraded on the 3600 Series access point. These modules allow customers to integrate advanced technology into their existing network without having to replace equipment or install additional equipment. Also, by adding a third radio, the Adaptive Radio Modules expands the access point’s performance and capacity.
Cisco offers three adaptive radio modules for the 3600 Access Point:
- 802.11ac Module
- Wireless Security and Spectrum Intelligence (WSSI) Module
- 3G Small Cell Radio Module
These modules allow customers to integrate advanced technology into their existing network without having to replace or install additional equipment. Also, by adding a third radio, it expands the access point’s capability in terms of performance and capacity.
For example, the addition of the WSSI module in a 3600 Access Point allows for advanced security and monitoring features such as CleanAir, wIPS and rogue detection to operate fully on both the 2.4 and 5GHz band without affecting the client traffic associated with the other 2 radios.
Because the module is operating as a dedicated radio, the access point can provide these advanced security features while also services the client traffic. The addition of an adaptive radio module is like adding an additional processor to your access point. Advanced features such as Security and Spectrum Monitoring can operate on a dedicated radio while the access point maintains throughput and performance by serving the client traffic on the two Wi-Fi radios.
Special Features, Adaptive Radio Modules
Adaptive Radio Modules allow for the diverse requirements of today’s networks, while future-proofing for the technology of tomorrow. The three flavors of adaptive radio modules provide customers with a leg up on various networking challenges.
-The 802.11ac radio module is the first of its kind in the industry and offers wire-like performance ideal for supporting HD video and high client density deployments
-The WSSI Module delivers always-on spectrum intelligence and proactive security scanning without effecting client performance
-The 3G Small Cell Module allows operators to concurrently offer a Wi-Fi/3G cellular infrastructure in a single access point
What makes Cisco unique is that our 3600 AP is modular designed so it can support different radio types to address emerging client needs, as well as providing investment protection for new and existing deployments.
With our Adaptive Radio Modules, Cisco’s strong portfolio touts:
-The first Enterprise Class Access Point to support the new 802.11ac Wave 1 standard
-The first solution to deliver combined Wi-Fi Serving, Spectrum Analysis and Threat Detection & Mitigation into a single Access Point
-The only solution to concurrently provide 3G Small Cell support and state of the art 802.11n-based 4x4 MIMO Wi-Fi
Adaptive Radio Modules can be used in the enterprise
Without the flexibility of the Adaptive Radio Modules, a customer in the case of the 802.11ac module and the 3G Small Cell would have to deploy an overlay network to support these additional radios. In the case of the WSSI Module, a customer would have to deploy an additional access point that exclusively monitors the traffic for security and spectrum issues.
In all cases, adding additional equipment to the network is costly in terms of deployment and maintenance but there is a cost factor with running Ethernet cables for the additional equipment and the cost of an Ethernet port that has to be taken up on a switch.
With the Adaptive Radio Modules deployed, there is a reduction in this cost since this technology can be added to an existing deployed network. Cisco estimates that there is a 30%+ CAPEX cost savings by eliminating the need for a separate:
- Overlay of additional access points to support 802.11ac, 3G or Security Monitors
- Ethernet cabling and Access Layer port required by each additional Access Point
- Typical cabling infrastructure costs typically running from $750-$1000 per pull – including labor
- Within the Healthcare industry, this cost is typically 2-3 times more
With the Adaptive Radio Modules, not only does the customer get the benefits of being able to deploy advanced technology but there is a significant cost saving to be gained as well.
Reference from http://blogs.cisco.com/wireless/adaptive-radio-modules-for-the-3600-series-ap-best-of-interop-2013-finalist/
More Cisco network Module Reviews:
The Cisco Aironet 3700 Series is designed for high-density network environments that use mission-critical, high-performance applications. The Aironet 3700 Series incorporates the High-Density Experience by using an innovative chipset with the best-in-class RF architecture. The Aironet 3700 Series provides three times the performance of current 802.11n based Wi-Fi at a greater distance.
The industry’s first access point with an integrated 802.11ac Wave 1 radio supporting 4x4 multiple input, multiple output (MIMO) with three spatial streams offers:
- The industry's first access point with integrated 802.11ac Wave 1 radio to support a 4x4 MIMO with three spatial streams
- Cisco CleanAir Technology with enhanced 80 MHz channel support
- Updated Cisco ClientLink 3.0 to boost performance for all clients, including 802.11ac
- Dual Band 2.4/5 GHz integrated radios to address the growing needs of BYOD and bandwidth demands
- A modular design that supports Cisco Wireless Security and Spectrum Intelligence, Cisco 3G Small Cells, or future 802.11ac Wave 2
Specifications at a Glance
Certified by the Wi-Fi Alliance, Aironet 3700 Series Access Points are offered in two versions:
- The 3700i model has integrated antennas for typical office deployments
- The 3700e model requires external dual-band antennas and is for RF-challenging indoor environments
The 3700e model is for RF-challenging indoor environments and requires external dual-band antennas. (For more information about antennas, visit: Antenna Product Portfolio for Cisco Aironet 802.11n Access Points).
More Related Cisco Aironet Access Points Topics:
Second-Generation 802.11n Access Points
Video promises life-like remote communications. Cloud computing promises agility and reduced costs. Tablets and smartphones promise new employee and customer engagement. Overall, technology tantalizes consumers and businesses alike with the promise of transformation. But the reality of an IT manager is more complicated. There is a high rate of change in the mobility and networking industry, making it difficult for yesterday’s networks to adapt. And as mobility becomes a user imperative, new use cases with conflicting security and technical requirements emerge.
To address these needs, Cisco has evolved the previous line of access points (the Cisco Aironet 1040, 1140, 1260, and 3500 Series) by offering a new line of second generation 802.11n access points—the Cisco Aironet 3600, 2600, and 1600 Series—that can extend spectrum intelligence, antenna density, and client acceleration to new price points in the mainstream.
The second-generation Cisco Aironet access point portfolio is designed for a broad range of requirements for best-in-class, mission-critical, and enterprise-class service to provide industry-leading performance for secure and reliable wireless connections.
Whether you require entry-level wireless connectivity for a small enterprise, missioncritical coverage at thousands of locations, or best-in-class performance with future proof expansion for emerging technologies such as 802.11ac, you can rely on Cisco’s broad portfolio of access points to meet the needs of specific industries, business types, and topologies.
The Cisco Aironet Access Points come in standalone or controller-based models to support the unique requirements for scale and mobility services. Controllers reduce overall operational expenses by simplifying network deployment, operations, and management. They allow network administrators to remotely configure and monitor several access points to thousands of access points in a simple and efficient way. A controller is required to support voice, location services, guest access, and advanced security. Controller-based access points also support Cisco OfficeExtend for secure remote teleworking and enterprise wireless mesh, which allows access points to dynamically establish wireless connections in hard-to-connect locations.
A wireless network with standalone access points offers a low-cost, entry-level solution that does not require a controller. It is ideal for small-scale networks with less than 10 access points, and offers base-level wireless functionality with the flexibility to scale and add services over time by adding a controller.
Cisco Aironet 3600 Series: Best in Class
Figure1. Cisco Aironet 3600 Series Access Points
The Cisco Aironet 3600 Series Access Point (Figure 1) delivers the highest level of 802.11n performance, with expansion capability for emerging technologies such as 802.11ac. The 3600 Series offers better coverage and security in dense-client, high bandwidth networks that utilize applications such as HD video and virtual desktop infrastructure (VDI).
•Highest 802.11n performance with Cisco CleanAir technology for a self-healing, self-optimizing wireless network
•The industry’s first 4 x 4 multiple-input multiple-output (MIMO) access point with three spatial streams
•Future-proof modularity, providing flexible upgrades and add-on options for 802.11ac or Wireless Security and Spectrum Intelligence (WSSI) Module and other future technologies
•Cisco ClientLink 2.0, optimizing performance for tablets, smartphones, and laptops and all 802.11n one-, two-, and three-spatial stream devices, as well as legacy 802.11a/g clients
•Standard 802.3af Power over Ethernet (PoE)
•The 3600i model has integrated antennas for typical office deployments
The 3600e model is for RF-challenging indoor environments and requires external dual-band antennas. (For more information about antennas, visit: Antenna Product Portfolio for Cisco Aironet 802.11n Access Points.)
Cisco Aironet 2600 Series: Mission-Critical
Figure2. Cisco Aironet 2600 Series Access Points
The Cisco Aironet 2600 Series Access Point (Figure 2) is bring-your-own-device (BYOD)-optimized for connectivity to any client device. Second only to the Cisco Aironet 3600 Series in performance and features, the Cisco Aironet 2600 Series sets the new standard for enterprise wireless technology. This mission-critical access point delivers Cisco’s RF excellence features such as Cisco CleanAir and ClientLink 2.0 technology for any small, medium-sized, and large enterprise network.
•Delivers the most advanced features in its class, with great performance, functionality, and reliability at a great price
•Includes 802.11n-based 3 x 4 MIMO, with three spatial streams
•Includes Cisco CleanAir, ClientLink 2.0, and VideoStream technologies, to help ensure an interference-free, high-speed wireless application experience
•Standard 802.3af PoE
•The 2600i model has integrated antennas for typical office deployments
•The 2600e model is for RF challenging indoor environments and requires external dual-band antennas. (For more information about antennas, visit: Antenna Product Portfolio for Cisco Aironet 802.11n Access Points.)
Cisco Aironet 1600 Series: Enterprise Class
Figure3. Cisco Aironet 1600 Series Access Points
The Cisco Aironet 1600 Series is an entry-level, enterprise-class 802.11n-based access point designed to address the wireless connectivity needs of small and midsize enterprise networks.
•With at least six times the throughput of existing 802.11a/g networks, the 1600 Series offers the performance advantage of 802.11n enterprise-class performance with 3 x 3 MIMO technology with two spatial streams
•Provides efficient wireless coverage through Clean Air Express* client acceleration for entry level networks that have a mixed legacy and non-legacy client base
(*planned for future support)
•Standard 802.3af PoE
•The 1600i model has integrated antennas for typical office deployments
•The 1600e model is for RF-challenging indoor environments and requires external dual-band antennas. (For more information about antennas, visit: Antenna Product Portfolio for Cisco Aironet 802.11n Access Points.)
The Cisco Advantage
Cisco has true enterprise-class RF technology designed to maximize 802.11n performance. Cisco technologies such as CleanAir, ClientLink 2.0, and VideoStream, plus optimized access point radios and antennas, improve performance regardless of where client devices are located. All Cisco Aironet 802.11n access points support:
•A limited lifetime hardware warranty
•5- or 10-unit Eco-Pack bundles with a single, easy-to-open carton that streamlines the staging and installation process and reduces packaging waste by 50 percent
•Mounting brackets that can be easily retrofitted to existing Cisco legacy access points to minimize migration cost and time
The benefits of deploying Cisco Aironet access points with a Cisco Unified Wireless Network extend from investment protection and future-proofing to better scalability and reliability of the enterprise network. For more details, visit: www.cisco.com/go/wireless.
Cisco Aironet 600 Series OfficeExtend Access Point
Figure4. Cisco Aironet 600 Series OfficeExtend Access Point
Purposely designed for the teleworking environment, Cisco Aironet 600 Series Office Extend Access Points (Figure 4) deliver always-on, secure access to networked business services from the remote home office. The access point connects to the home’s broadband Internet access and establishes a secure tunnel to the corporate network so that remote employees can access data, voice, video, and cloud services for a mobility experience consistent with that at the corporate office.
•802.11n access points for reliable, secure teleworking
•Zero-touch deployment at the home office speeds setup time
•Dual-band support uses all available spectrum to help avoid congestion caused by home devices
•Supports corporate and personal network activity with traffic segmentation
Table 1 compares the features of new Cisco Aironet 802.11n access points.
Table1. Cisco Aironet 802.11n Access Point Comparison Chart
More Cisco Aironet Access Point Info and Tips:
STP is used by switches to prevent loops occurring on a network, this process is implemented by using spanning tree algorithm in disabling unwanted links and blocking ports that could cause loop.
Loops and duplicate frames can have severe consequences on a network. Most LANs are designed to provide redundancy so that if a particular link fails another one can take over the forwarding of frame across the LAN.
Basically, each switch port on a network detects the MAC address of a host or PC A, it then sends messages to other switches on the network to inform them of it’s knowledge on how to get to PC A. The problem starts when another switch discovers the same host or PC A’s MAC address, In time every switch on the network will start flooding messages on the network of their discovery and how to get to the same PC A and a loop has formed.
STP ensures that there is only one logical path between all destinations on the network by intentionally blocking redundant paths that could cause a loop.
When a switch port detects a loop in the network, it blocks (A port is considered blocked when network traffic is prevented from entering or leaving that port) one or more redundant paths to prevent a loop forming.
To stop a loop from forming, STP chooses one switch to be ‘Root Bridge’ on the network. Then other switches selects one of its ports as ‘Root Port’ then, a ‘designated port’ is chosen on each segment and all other ports are closed down.
STP outline of Process
Cisco switches runs STP by default, no configuration needed.
STP continually monitors the network for failures, be it switchports or changes in the network topology. STP acts quickly in making redundant ports available if there is a failure on a link.
Spanning Tree Protocol
*Used by switches to turn a redundant topology into a spanning tree.
*Disables unwanted links by blocking ports
*Is defined by IEEE 802.1d
*Switches run STP by default - configuration needed.
*Choose one switch to be Root Bridge
*Choose a Root Port on each other switch
*Choose a Designated Port on each segment
*Intentionally closes down all other ports
More STP Info:
Ever been stuck trying to figure out the exact switching path that packets take through your network? Me too. Here’s how I solved the problem without fancy Layer 2 traceroute tools.
I’ve recently been working in a data center environment with Nexus 7000 and 5000 switches in the core. The core is almost completely Layer 2, with most routing pushed to the distribution layer. During the first week, we ran into a problem forwarding jumbo frames. Some vlans that used jumbo frames worked fine, but one vlan simply wouldn’t work. The network team went to some effort to prove our innocence, and there was the usual veiled finger-pointing by everyone else, “I’m not saying it’s a network problem, but…” Yeah, yeah, we know: the network is assumed guilty until proven innocent.
In my experience, troubleshooting jumbo frames begins simply. Either every device in the forwarding path allows jumbo packets, or they don’t. If just one interface in the path doesn’t allow jumbo frames, the conversation breaks. So the crucial first question is “what is the path?”
In a routed environment, this would be a no-brainer: traceroute would have your answer. But this is a Layer 2 environment. What I needed was a layer 2 traceroute tool. Turns out Cisco does offer a Layer 2 traceroute utility for IOS on both the Cisco 7600 series routers and Catalyst 3560 series switches. It’s been around since 12.2(18) and you can use either MAC address or IP address to run the trace.
However, it didn’t work in NX-OS. And I did try. Several times. Just to be sure.
So, what was left was a manual Layer 2 trace, which means manually searching through the mac address-tables. Kind of cumbersome, but still doable. It was going to be tricky though, since the core switches were using both port-channels and virtual port-channels. The command mac address-table alone was not going to cut it, as sometimes the switch would see the MAC address over a port-channel, and I’d need to know which interface in the port channel had forwarded the packet.
However, before jumping in, I needed the source and destination MAC addresses, as well as source and destination IP address (more on this later). Once the sever team provided all these, I began by finding the exact source switch and interface:
sh mac address-table | inc AAAA.AAAA.AAAA
SWITCH-A# sh mac address-table | inc AAAA.AAAA.AAAA
VLAN MAC Address Type age Secure NTFY Ports
* 200 AAAA.AAAA.AAAA dynamic 10 F F Eth101/1/2
Once the originating switch and port was identified, I could begin looking for the path to the destination. On the source switch, I ran:
sh mac address-table | inc BBBB.BBBB.BBBB
SWITCH-A# sh mac address-table | inc BBBB.BBBB.BBBB
VLAN MAC Address Type age Secure NTFY Ports
* 200 BBBB.BBBB.BBBB dynamic 10 F F Po1
Guess what? The MAC was found on a port-channel. So, to find the physical interfaces included in that port-channel, I ran:
show port-channel summary
SWITCH-A# sh port-channel sum
Flags: D - Down P - Up in port-channel (members)
I - Individual H - Hot-standby (LACP only)
s - Suspended r - Module-removed
S - Switched R - Routed
U - Up (port-channel)
M - Not in use. Min-links not met
Group Port-Channel Type Protocol Member Ports
1 Po1(SU) Eth LACP Eth1/1(P) Eth1/2(P)
This showed which physical interfaces each port-channel contains. With this, I looked in the CDP neighbor table to see which neighbor these interfaces connect to.
show cdp neighbor
SWITCH-A# sh cdp ne
Capability Codes: R - Router, T - Trans-Bridge, B - Source-Route-Bridge
S - Switch, H - Host, I - IGMP, r - Repeater,
V - VoIP-Phone, D - Remotely-Managed-Device,
s - Supports-STP-Dispute
Device-ID Local Intrfce Hldtme Capability Platform Port ID
Eth1/1 125 S I s N5K-C5548 Eth1/1
Eth1/2 128 S I s N5K-C5548 Eth1/2
Turns out the two physical interfaces connect to two different neighbors. Why? Virtual Port-Channel. This is where things get a little tricky.
I needed to figure out which physical interface is actually forwarding the packets, since they lead to different switches. I had no clue which command would accomplish this. Fortunately, Cisco TAC did know.
sh port-channel load-balance forwarding-path int port-channel 1 vlan 101 src-ip 18.104.22.168 dst-ip 22.214.171.124
This command is full of options, and if you question-mark your way through it, you can tweak it a variety of different ways. Remember the source and destination IPs? This is where you’ll use them. The output shows which physical interface the packets are taking, as well as which load-balanceing algorithm the port-channel is using. In this case, it was just using source and destination IP only.
SWITCH-A# sh port-channel load-balance forwarding int port-channel 1
vlan 140 src-ip 126.96.36.199 dst-ip 188.8.131.52
Missing params will be substituted by 0's.
Load-balance Algorithm on switch: source-dest-ip
crc8_hash: 11 Outgoing port id: Ethernet1/2
Param(s) used to calculate load-balance:
With the physical interface info, I could correlate with the CDP neighbors table, and find which neighbor to check next.
I moved to the next switch, repeated the whole process, moved to the third, ran the procedure again, moved on yet again … sigh. Eventually, the MAC address-table entry didn’t point to a CDP neighbor, but instead pointed to a single physical interface with only one MAC address in the MAC address-table.
At last. I’d found the full, one-way Layer 2 path.
At this point, it would be easy assume that the return path is symmetrical, and call it a day. But in this case, given how much everyone else had already worked on it (with no success), my hunch said the traffic followed an asymmetrical return path. So, once again into the CLI, I repeated everything until I returned to the source. Sure enough, one device on the different return path was not configured for jumbo frames – problem found. One maintenance window later, problem solved.
All told, this procedure took about an hour. But with some Layer 2 traceroute tool, it would have taken about 5 minutes. This is a great opportunity for Cisco to expand the Layer 2 traceroute to NX-OS, especially since the Nexus line goes into the core of many large networks. Maybe even some enterprising startup with mad programming skills could develop an app with a Cisco API that would spider through all these tables and display the path. No doubt the big monitoring packages like What’s UP Gold or HP OpenView or Cisco Prime already do it, but how about a scaled-down version for the rest of us?
---Original reading from http://packetpushers.net/tracing-a-layer-2-path-on-cisco-nexus-switches/
The explosion of smart devices means that enterprises can no longer fall back on Ethernet
As smart devices continue to proliferate, the nature of the network is changing, and organisations need to focus on making their wireless networks as fast, reliable and scalable as their fixed line networks, according to Cisco.
Recent research by the UK communications regulator Ofcom found that tablet ownership in the UK has jumped from two percent to 11 percent during the last 12 months, and every two in five adults now owns a smartphone. Meanwhile, Cisco survey data suggests that the average person will own 3.47 devices in 2015, and 6.58 devices in 2020.
With the explosion of smart devices putting massive pressure on wireless networks, businesses cannot afford to offer inadequate services, according to Sarah Eccleston, head of borderless networks for Cisco UK and Ireland.
Most enterprises already have “best efforts” wireless networks in place, which have typically been built for the convenience of employees moving around the office, or for guest access. This is fine, said Eccleston, as long as there is a fixed line network to fall back on.
“In a traditional world, if your wireless network wasn't performing reliably, you simply plugged in your Ethernet cable. But you can't plug an Ethernet cable into a tablet or smart device because it doesn't have an Ethernet port,” she said.
“The wireless network is becoming more and more relevant and can't just be a best efforts technology anymore.”
Eccleston said that pressure is being put on organisations to holistically improve their wireless networks so that employees, clients and visitors can get the same level of service on their smart mobile devices that they have become used to on their PCs and laptops using a wired connection.
The biggest challenge is making wireless networks as fast as fixed networks, she said. This is partly because the the number of mobile devices connected to a wireless network is constantly changing, whereas the number of connections on a fixed line network is restricted by the number of Ethernet ports.
The speed of connection over wireless networks can also be affected by the wireless client on the smartphone or tablet, which is often not as powerful as on a laptop, so the network has to compensate for devices connecting slowly.
Meanwhile, making wireless networks more reliable means removing radio frequency (RF) interference from electrical devices such as microwaves, video cameras and motion detectors; making them more scalable means building wireless LAN controllers that can support as many devices as a typical wired enterprise LAN.
Cisco has brought out several products to tackle these issues, such as the Aironet 3600 access point and its CleanAir technology, but Eccleston said there is still some way to go before the wireless network is good enough to replace fixed line. However, one important step towards the two becoming interchangeable is offering unified access.
“It's not really about having a LAN or having a wireless network any more, it's about providing access, and that access has to be just as good and just as secure, whether it's wired or wireless because of the plethora of mobile smart devices,” said Eccleston.
She said that IT departments used to have complete control of both the devices that employees were using, and of the applications running on those devices. Having lost control of both of those environments, as a result of the BYOD and cloud computing revolutions, they must now rely on the network for control.
“Unified access is about being able to know who's on your network, control what people can do when they're on that wireless network, and it's about being able to set that policy once. So regardless of the means of access of that person, that policy is set and enforced by the network.”
This means that whether an employee is accessing the corporate network using a laptop in the office with a wired Ethernet connection or using Wi-Fi in Starbucks via a VPN, the IT department has an equal amount of control and can feel confident that the enterprise's sensitive data is secured.
“It's a little bit about giving them visibility, and a little bit about giving them management, but it's also about giving IT back some control of their environment,” said Eccleston.
Providing fast, reliable and scalable access that enables people to use their own devices wherever they are, securely and effectively, is no longer just a “nice to have”. It has become central to the smooth running of any business, and not only employees but also customers and partners will expect to be able to connect seamlessly.
“If organisations don't improve their wireless capability then they can't really truly enable these devices for productivity, and that has all kinds of implications in terms of employee satisfaction, and the ability to recruit and retain younger talent,” concluded Eccleston.
---Written by Sophie Curtis from Techworld.com
More Cisco Reviews and Cisco News
The networking giant will introduce a 1G-bit access point in 2013 to accommodate the need for faster wireless enterprise networks, but competitors are expected to be close behind.
Cisco Systems says it will be the first networking vendor to deliver 1-gigabit-per-second speeds on enterprise wireless networks when it introduces an 802.11ac-based access point next year, but a few other things have to also happen before that actually means something.
The 802.11ac WiFi standard, currently under development by the Institute of Electrical and Electronics Engineers (IEEE) standards body, would be the successor to the predominant 802.11n standard today. Cisco officials said 802.11ac is needed to handle the growing number of devices seeking wireless access to corporate networks as the smartphones and tablet computers people are bringing to work lack an Ethernet jack to plug into the wired network.
They said Cisco will introduce an 802.11ac module in the first half of 2013 that can be plugged into an existing Cisco Aironet 3600 access point that runs on the 802.11n standard now, said Sujai Hajela, vice president and general manager of the wireless networking business unit at Cisco.
“It allows [customers] to upgrade and not have to go through the guesswork of, ‘Should we upgrade to 802.11n or go with 802.11ac?’ You can invest in 11n now and upgrade to 11ac with a new radio,” Hajela said, referring to the module. “It’s a way of future-proofing your network.”
Wired networks already operate at 1G-bps speeds and are quickly accelerating to 10G, 40G and even 100G speeds, but Hajela said Cisco would be the first to break the 1G-bps barrier on a wireless local area network (WLAN).
However, a few other things have to happen before end users can actually experience 1G-bps speeds on their wireless networks, said Mike Spanbauer, principal analyst at Current Analysis, a research firm.
First, the 1G-bps speeds Cisco is touting are dependent upon a number of variables, including radio frequency (RF) interference, the kind of antenna used, the strength of the endpoint radio and other factors. Second, 11ac-capable access points won’t mean much unless 11ac-enabled devices are there to connect to them. The smartphones, tablets and laptops currently shipping are still based on the 802.11n standard, although Spanbauer expects the endpoint devices will be on the market by the time the access points are.
And although Cisco may claim bragging rights as the first networking vendor to publicly declare a coming 1G-bps WLAN access point, Cisco’s competitors—particularly Aruba Networks and Hewlett-Packard—may not be far behind, he said. All three vendors were placed in the “Leaders” quadrant in a June Magic Quadrant report from research firm Gartner profiling the top vendors in both the wired and wireless networking equipment markets.
“I think that every one of those vendors is very aggressively working on 11ac themselves,” said Spanbauer.
“[HP] is working on our 802.11ac portfolio of access points,” said Kevin Secino, a marketing manager within HP Networking, but emphasized that “our business objective is to be standards-compliant.” Furthermore, he noted that the 802.11ac standard is still in development and may not be finalized until sometime in 2013 anyway.
HP’s experience in wireless access points dates back to its acquisition of a company called Colubris in 2008, whose technology went into HP’s ProCurve line of wireless devices. It entered into a joint venture with 3Com to sell a line of wireless devices called the H3C line, which was followed by HP’s acquisition of 3Com in 2010.
While noting that competitors are expected to introduce 1G-bps access points in competition with Cisco, Current Analysis’ Spanbauer lauded Cisco for enabling its existing Aeronet 3600 WLAN access point devices already shipping and installed to be easily upgraded to 802.11ac when the time comes.
“It’s important to know that your wireless LAN vendor is going to be supporting and moving forward with the next specification,” he said.
HP’s Secino, meanwhile, said the company “has been very good in ensuring that customers’ investments are protected.”
---Original News Reading from eWeek
More Cisco News:
Enable VLAN or Virtual Local Area Network forwarding through a Cisco Aironet 1300 by connecting to the Aironet Web administration interface. The Cisco Aironet 1300 can bridge network segments and forward VLANs between network segments once the Aironet native VLAN matches that of the switch connected to the Aironet. Configure the Cisco Aironet Native VLAN and VLANs you want to forward using a Web browser.
What You'll Need
Cisco Aironet 1300 configured as a bridge
Cisco Aironet 1300 IP address
Administrator username and password
IDs of VLANs
Native VLAN ID of connected switch
How to Route Multiple VLANS through a Cisco Aironet 1300
1. Launch a Web browser, type the Cisco Aironet 1300 IP address into the browser address bar and press “Enter.”
2. Type the Cisco Aironet administrator username and password when prompted and press “Enter.”
3. Click “Services,” “VLAN,” then “New” in the “Current VLAN List” box.
4. Type the Native VLAN ID of the switch connected to the Cisco Aironet 1300 into the “VLAN ID” box. Click to select the “Native VLAN” check box and click “Apply.”
5. Click “New” in the “Current VLAN List” box. Type the ID of a VLAN you want to route through the Cisco Aironet 1300 into the “VLAN ID” box and click “Apply.” Repeat this step for each VLAN you want to route through the Cisco Aironet 1300.
6. Click“Security” in the left pane, then “SSID Manager.” Click “New” in the “Current SSID List” box.
7. Type the SSID or Service Set Identifier for the Cisco Aironet 1300 into the “SSID” box. Click the “VLAN” box, then the Native VLAN number configured earlier. Click the “Apply” button.
8. Click the “Set Infrastructure SSID” drop-down box in the “Global Radio0-802.11G SSID Properties” section. Click the SSID assigned in the previous step and click “Apply.”
More Cisco Aironet 1300 Series Info
Wireless Access Point (WAP) is essentially hardware equipment that enables wireless devices to connect to wireless networks, via standards such as Wi-Fi, Bluetooth and so on. The WAP device typically connects to a wired network, and acts as a communication interface between the wireless devices and wired devices on the network.
The WAP device enables the transmission of data between wireless and wired devices. For example, in an office setup multiple users can print documents from their workstations or laptops that are physically connected to the network, with the help of a wireless printer that is located at a central location in the office. The WAP device acts as a central hub for sending and receiving data via WLAN (Wireless Local Area Networks).
The usage of WLAN and WAP has become quite common in offices, homes and educational institutions. Before the advent of wireless networking, setting up a computer network for home, corporate or institutional use was quite tedious and time-consuming, as it involved the installation of numerous cables to ensure network access for all the network devices being deployed. Presently WAP devices are designed to work with standards to send and receive data via radio frequencies. This keeps the usage of cabling to a bare minimum. The standards and frequencies are prescribed by IEEE (Institute of Electric and Electronic Engineers), and nearly all WAP devices use IEEE 802.11 standards.
WAP devices are widely used for the following environments:
Corporate organizations use a number of WAP devices and attach them to a traditional wired network, in order to give wireless access to the office LAN. Within the office setup, users have the advantage of network access coupled with mobility.
- Hot spot
Hot spots are used for public access to the internet. Wireless devices can access the Internet by directly connecting to the network present at these hot spots. Hot spots can be found in hotels, airports, coffee houses, malls, and so on.
- Home wireless networks
Home wireless networks use wireless routers in conjunction with broadband modems to provide wireless access within a home environment.
The wireless network access modes are as follows:
- Infrastructure mode
The infrastructure mode is the most commonly used mode for wireless Internet access. It uses WAP devices to enable wireless devices to communicate with the wired network. A single WAP device attached to a wired network and a group of wireless devices is known as a Basic Service Set (BSS).
- Ad-hoc mode
In a wireless ad-hoc network, devices communicate with each other directly, without the aid of a WAP device. It is also known as peer to peer mode or Independent Basic Service Set (IBSS).
More Related Tips:
The Wi-Fi giant surprises with an 802.11ac add-on to their popular high-end 3600 AP. Too soon? Perhaps not.
Cisco recently briefed me on an interesting product direction they discussed at their latest Cisco Live event, an add-on 802.11ac module for their popular 3600 series of Cisco APs. In addition to being one of the few four-antenna .11n products on the market, the 3600 has a modular architecture that enables the bolting on of additional functionality. Cisco previously announced a security monitor module for off-channel ClearnAir scanning, and the .11ac module will support 3x3:3 1.3 Gbps capability. Both modules are scheduled for availability in 1Q13, a little ahead of my prediction with respect to 802.11ac in the enterprise.
There is little doubt that the as-yet-unfinished 802.11ac standard will eventually supersede 802.11n. This will take many years - at a recent symposium I Chaired for the Boston Section of the IEEE Communications Society, the panel of analysts assembled pretty much settled on 2015 as the timeframe for critical mass for 802.11n in the enterprise - with one thinking it could in fact be much later than that. I'm expecting reasonable numbers of enterprise-class .11ac products to appear in the second half of next year. As I noted above, I didn't expect an announcement to that effect so soon, and especially from industry leader Cisco. Aggressive? Certainly. But the evolution to .11ac is inevitable, and implementing the functionality in an add-on module eliminates the cannibalization risk that would otherwise be present. Indeed, such might actually spur sales of the 3600 as the technological risk is minimized.
The only risk, in fact, might be with respect to cost, as pricing for the module has not been announced. Nonetheless, the benefits of a modular implementations are once again reinforced, even if the assumed success of .11ac remains well off in the future.
Reading from http://www.networkworld.com/community/node/80833
More Cisco News: