3. An integrated solution for new IT challenges
3
Billions of
mobile devices
A complete solution out-of-the-box:
No extra hardware, software, or complexity
HD video and rich
media
New business
opportunities
Integrated mobility
management
Layer 7
application shaping
Analytics and user
engagement
4. The cloud increases IT efficiency
4
Manageability Scalability Cost Savings
Turnkey installation and
management
Secure out-of-bound
managementāno user
traffic flows through the
cloud
Scales from small
branches to large
networks
Reliable: the network
stays up, even if
connection to the cloud is
lost
Reduces operational
costs
Integrated, always up-to-
date features
5. Bringing the cloud to enterprise IT
5
MR
Wireless LAN
Systems Manager
Mobility Management
MS
Ethernet Switches
MX
Security Appliances
MC
Communications
MV
Security Cameras
7. Simplifying across IT with cloud management
7
A complete cloud managed networking solution
Wireless, switching, security, communications,
EMM, and security cameras
Integrated hardware, software, and cloud services
Leader in cloud-managed networking
Among Ciscoās fastest growing portfolios
Over 140,000 unique customers
Over 2 million Meraki network devices online
Trusted by thousands of customers worldwide:
12. Distributed networks
12
Centralized cloud
management scales to
thousands of sites
Multi-site visibility and
control
Map-based dashboard; configuration sync; remote diagnostics; automatic monitoring
and alerts
Zero-touch provisioning Devices easily provisioned from the cloud, no staging required
Traffic acceleration Web caching reduces bandwidth usage; application-aware QoS and SD-WAN
capabilities prioritize business critical apps
13. High capacity edge networks
13
RF optimization and
application-aware QoS for
high-throughput, high
density WLAN
Layer 7 application and
traffic shaping
Throttle, block, or prioritize application traffic with DPI-based fingerprinting; set user and
group-based traffic shaping rules
Cloud-based RF
optimization
Dynamically avoid interference, optimizing channel selection and power levels
Density-optimized
WLAN
RF platform tuned for airtime fairness and performance in dense performance-critical
environments
14. Mobility management
14
Security, management, and
capacity for BYOD-ready
deployments right out of
the box
Device-aware security Device-aware firewall and access control; antivirus scan; LAN isolation; Bonjour
Gateway; content and security filtering
Integrated EMM Enforce encryption, passcodes, and device restrictions; deploy enterprise applications;
remotely lock or wipe devices
Simplified onboarding Flexible authentication with Active Directory integration, SMS authentication, hosted
splash pages, and automatic EMM enrollment
15. User analytics and engagement
15
Built-in location analytics
dashboard
Optimize marketing and
business operations
Analyze capture rate, dwell time, and new/repeat visitors to measure the impact of
advertising, promotions, site utilization, etc.
Built-in location
analytics
Integrated in the WLAN; no extra sensors, appliances, or software
Extensible API Integrate location data with CRM, loyalty programs, and custom applications for targeted
real-time offers
16. Flexible authentication and access control
16
Flexible built-in
authentication mechanism
Flexible authentication Secure 802.1x and Active Directory authentication; Facebook Authentication for
branding and targeted social marketing; SMS self-service authentication; and hosted
sign-on splash pages
Dynamic access control Assign clients layer 3 / 7 firewall rules, VLANs, and application-aware quality of service
by identity, group, location, or device type
17. Simplified enterprise security
17
Enterprise-class security
features for security-
conscious environments
Air Marshal
WIDS/WIPS
Detect wireless attacks; contain rogue APs; cloud-based alerting and diagnostics
User and device aware
security
User, device, and group-based firewall rules (layer 3 / 7) with Active Directory integration
UTM and content
security
Application firewall; content filtering matching 1B+ URLs; antivirus/anti-malware filtering;
Google safe-search
20. Location Tracking Approaches
ā¢ Real-time location tracking and positioning systems can be classified by the
measurement techniques they employ to determine mobile device location
ā¢ Approaches differ in terms of the specific technique used to sense and
measure the position of the mobile device in the target environment
ā¢ Real-Time Location Systems (RTLS) can be grouped into four basic
categories of systems that determine position on the basis of the following:
20
Cell of origin (nearest cell) Distance based (lateration) Angle based (Angulation) Location patterning
BRKEWN-2650
21. Cell of Origin
ā¢ One of the simplest mechanisms of estimating approximate location in any
system based on RF cells is the concept of ācell of originā (or āassociated
access pointā in Wi-Fi 802.11 systems)
ā¢ When receiving cells, provide received signal strength indication (RSSI)
for mobile devices; the use of the highest signal strength technique can
improve
location granularity over the cell of origin.
21BRKEWN-2650
22. Distance-Based (Trilateration) Techniques
ā¢ Trilateration can be performed by using received signal strength (RSS)
ā¢ Measured by either the mobile device or the receiving sensor
22
10dB
The closer the distance the greater
the rate of change in RSS in
relationship to distance
The change in RSS in
relationship to distance flattens
out at greater distances
BRKEWN-2650
23. Angle-Based (Angulation) Techniques
ā¢ The AoA locates the mobile station by
determining the angle of incidence at which
signals arrive at the receiving sensor
ā¢ Requires two receiving sensors for location
estimation, with improved accuracy coming
from at least three or more receiving sensors
(triangulation)
23BRKEWN-2650
24. Location Patterning (Fingerprinting)
ā¢ Location patterning is based on the sampling
and recording of radio signal behaviour
patterns in specific environments
ā¢ Each potential device location ideally
possesses a distinctly unique RF "signatureā
24
Because of fading and other phenomena, the observed signal
strength of a mobile device at a particular location is not static but
is seen to vary over time. As a result, calibration phase software
typically records many samples of signal strength for a mobile
device during the actual sampling process.
BRKEWN-2650