SlideShare a Scribd company logo
1 of 7
Download to read offline
ACCESS POINT OPTIMIZATION
FEATURE
GUIDE
Copyright © 2013, 4ipnet, Inc. All rights reserved. All other trademarks mentioned are the property of their respective owners.1
SUMMARY OF FEATURES
AIRTIME FAIRNESS
BAND STEERING
OPTIMAL CLIENT FILTERING
MULTICAST TO UNICAST CONVERSION
WI-FI MULTIMEDIA (WMM)
PROXY ARP
WI-FI PROTECTED ACCESS II (WPA2)
STATION ISOLATION
DHCP SNOOPING
LAYER 2 FIREWALL
AIRTIME FAIRNESS
ENTERPRISE VS. CONSUMER AP
“Why should I pay an extra five to ten times the cost for an enterprise-grade AP (access point), when I can buy
a much cheaper wireless router from Amazon or the electronics shop down the block?” This is one of the most
commonly asked questions in all segments of the enterprise Wi-Fi market, including hospitality, education, large
enterprises, and SMBs. To answer this question, we must first look at the fundamental difference between
the consumer and enterprise Wi-Fi markets – more specifically, how access points are deployed and used. For
example, Power over Ethernet (PoE) is a hardware specification that is ubiquitous on all enterprise-grade APs,
due to the presence of PoE switches that lie at the core of every enterprise’s network infrastructure as well as the
expensive cost of physical cabling.
In this feature guide we will highlight the performance and security features of 4ipnet access points, and in the
process clearly illustrate the differences between 4ipnet APs and regular consumer-grade APs.
As networks migrate between wireless standards – previously from 11g to 11n, and now from 11n to 11ac –
network operators are increasingly struggling with the tradeoffs between legacy client support and wireless
performance. For example, when both 11g and 11n clients are connected to the same AP, an 11g client will
take much longer (use more airtime) to complete the transfer of the same amount of data as an 11n client. To
understand why this matters, we must first briefly explain how data is transmitted over Wi-Fi.
The fundamental concept behind wireless transmission is that two devices cannot transmit at exactly the same
time in the same frequency, otherwise collisions occur and the transmission will be unsuccessful. Wi-Fi deals
with this issue by utilizing CSMA/CA (carrier sense multiple access with collision avoidance), which incorporates
a random back-off period for each transmitting device when detecting that the medium is busy. Therefore, the
longer a single device takes to transmit, the higher the probability that other devices trigger their respective wait
periods.
Back to the legacy client example, this means that all other clients have to wait for the legacy client to finish
transmission, which results in decreased overall network throughput. However, if legacy standards such as 11g
are not allowed, operators will surely receive a lot of complaints from users who have older devices that only
support legacy standards. Herein lies a dilemma: do operators allow legacy clients to connect at the expense of
overall network throughput, or do they block all legacy clients and maximize performance?
Copyright © 2013, 4ipnet, Inc. All rights reserved. All other trademarks mentioned are the property of their respective owners.2
In today’s wireless environment the unlicensed
2.4 GHz frequency band is becoming increasingly
congested due to the explosion of mobile devices.
As a result, many consumer device manufacturers,
whether it be of laptop computers or smartphones,
have incorporated 5 GHz-capable Wi-Fi chipsets in
their devices. Furthermore, 802.11ac ready consumer
devices are already making their way into the hands
of everyday users. This begs the question: When a Wi-
Fi environment offers connectivity in both 2.4 GHz
and 5 GHz, and clients have both 2.4 GHz and 5 GHz
capability, how do network operators balance the load
between the two frequency bands? One method is to simply to add the frequency band to the SSID name. For
example, instead of “Hotel”, “Hotel-2.4GHz” and “Hotel-5GHz” can be used instead. But what if organizations don’t
want to advertise the frequency band in the SSID?
BAND STEERING is a function that addresses this exact issue. When enabled on a 4ipnet access point, the AP
will use one of two methods to “steer” clients that are capable of operating in the 5 GHz band away from 2.4 GHz
networks and towards 5 GHz networks.
1. The AP does not respond to 2.4 GHz probe requests of the client, tricking the client into believing that
it does not exist. For the user, this means that the SSID cannot be seen. However, if the user happens
to know the SSID, he/she can still manually connect. This is a more passive method of Band Steering, as
users will not completely be prohibited from using 2.4 GHz if their device supports 5 GHz.
BAND STEERING
Luckily, on 4ipnet APs there is a middle ground. AIRTIME FAIRNESS is a feature that allows networks to mitigate
the decrease in performance incurred by supporting legacy clients. Depending on the needs and preferences of
each deployment, the following two options can be selected:
1. All clients, regardless of standards supported, obtain roughly the same amount of airtime. If a client
occupies the wireless medium for a longer period of time in one transmission, then subsequent
transmissions are placed on a lower priority, ensuring that overall airtime distribution is balanced.
2. 11n clients are given a slight preference. Legacy clients are not blocked from the network, but they
will be allocated less airtime. This option is ideal for organizations that wish to optimize network
performance while still supporting older clients. Organizations can also use this feature as a method to
slightly “nudge” older clients to migrate from 11b/g to 11n.
With either option, administrators are able to increase overall network throughput without sacrificing the support
of legacy clients. Further details on how priority is managed by the AP will be described in the section on WMM.
11g
client
11n
client
EQUAL AIRTIME
Time
=Time on medium
2.4 GHz
2.4 GHz
5 GHz
5 GHz
4ipnet AP4ipnet AP
Figure 2: Clients capable of 5 GHz are "steered" towards 5 GHz networks
Figure 1: All clients are allocated equal airtime to prevent starvation due to slower/legacy clients
Copyright © 2013, 4ipnet, Inc. All rights reserved. All other trademarks mentioned are the property of their respective owners.3
OPTIMAL CLIENT FILTERING
Earlier in this feature guide we described Wi-Fi as a form of a wireless communication that utilizes CSMA/CA to
avoid collisions during data transmission. As mentioned, one caveat of this protocol is that anyone who wishes to
use the medium to transmit must wait until the medium is free (unused). Therefore, if a device or client takes a
long time to transmit a small amount of data, overall network throughput is decreased. Now let us consider the
case where a network consists of only 802.11n (or 802.11ac) clients. Theoretically, everyone can get in and out of
the medium in a short amount of time, since under 802.11n/ac standards data can be transmitted at relatively
fast rates. In this case, is network performance optimized?
Legacy clients are not the only issue in a wireless environment – even though all clients may utilize the most up-
to-date standard, some clients will inevitably have poorer transmission rates than others due to interference,
physical obstructions, or large distances between themselves and the AP. As a result, these clients have to stay on
the medium longer to complete data transmissions, which creates the exact same phenomenon as legacy clients.
If you’ve ever wondered why the network feels very slow even when you have “full bars” of connection in the
taskbar, it may be because others using the same network have less than ideal connectivity.
For a wireless network to perform optimally, not only should clients comply with the newest standards, they
should also connect to APs that offer them best connection. However, this is a best-case scenario that cannot
always be guaranteed, since all Wi-Fi users usually think about is getting “connected”. Should everyone be allowed
to connect to the network even when under conditions of poor connectivity (which drags down the entire
network’s throughput)? Or do you prevent these devices from connecting to let others enjoy higher throughput?
This is a question that many network administrators struggle with as Wi-Fi becomes more pervasive and common
in our daily lives.
OPTIMAL CLIENT FILTERING is a
method that helps 4ipnet APs filter out
clients that will negatively impact the
AP’s overall throughput. Through a set
of thresholds, such as Dropped Packet
Threshold, Transmission Rate Threshold,
and Receiving RSSI Threshold, the AP is
able to remove (kick) clients that have poor
connectivity. This ensures that all clients
connected to an AP have an acceptable
connection quality, minimizing the number
of packet retries and increasing airtime
efficiency.
How does this translate to real-life deployments? Some environments such as hospitals may be very strict on
2. The AP rejects 2.4 GHz connections from the client, even if the client were to know the SSID and
manually connect. This is the more aggressive method of Band Steering, and in essence forces all 5 GHz
clients to only connect to 5 GHz networks.
Band Steering is a feature that can be enabled or disabled individually for each AP, but it does not make
much sense if the setting is not consistent between neighboring APs. For example, if the purpose is to reduce
congestion in the 2.4 GHz frequency band, then network administrators should enable Band Steering for all APs
to redirect as many connections to 5 GHz as possible. If only a few of the APs have the function enabled, then 5
GHz clients will still be able to connect to other 2.4 GHz SSIDs, meaning that actual spectrum usage and medium
access in 2.4 GHz is still the same. Although at times Band Steering can be viewed as a feature to load balance
clients between different APs, ultimately its end goal to lower 2.4 GHz medium access contention.
LOW RSSI
HIGH RSSI
4ipnet AP
4ipnet AP
Figure 3: Client connections are filtered based on pre-defined connectivity thresholds
Copyright © 2013, 4ipnet, Inc. All rights reserved. All other trademarks mentioned are the property of their respective owners.4
In Wi-Fi networks, multicast packets are typically sent at slower rates to ensure that devices at the edge of an AP’s
cell are able to receive the packets without error. This may be useful in environments where most clients are a
certain distance (further away) from the AP. However, if the cell size is very small and most clients are densely
packed around the AP, this would be an inefficient use of airtime. Why send at 11M when you can send at 300M?
MULTICAST TO UNICAST CONVERSION is a method that 4ipnet APs employ to convert multicast transmissions
to unicast so that they can be sent at unicast rates. When clients are close to an AP, high transmission rates can
be more easily sustained, and thus unicast is more efficient. On the other hand, attempting to use the same rate
with clients far away from the AP will lead to a high number of retransmissions, which lowers efficiency. As a result,
Multicast to Unicast Conversion is not a universally beneficial feature – it merely allows network administrators to
optimize performance based on how clients are spatially distributed around APs.
MULTICAST TO UNICAST CONVERSION
If you’ve ever observed VoIP over Wi-Fi working flawlessly even when there were tons of other applications
simultaneously using the network, then you’ve seen WMM (WI-FI MULTIMEDIA) in action. WMM provides
fundamental QoS (Quality of Service) functionality to wireless networks by increasing the performance of
differentiated wireless traffic, such as audio, video, and traditional application data. Based on the needs of each
type of data, they are placed in one of four different queues, BE (Best Effort), BK (Background), VI (Video), and VO
(Voice).
Recall the earlier description of Wi-Fi medium access using CSMA/CA – clients must wait for a random amount of
time before retrying transmission if a busy medium is detected. WMM assigns shorter or longer average back-
off periods to each of the four queues, which in essence gives each queue a different priority. The queue with the
shorter average random back-off period (e.g. Voice) will forward traffic faster and more easily (with higher priority)
than queues with longer average random back-off periods (e.g. Best Effort).
On 4ipnet access points, traffic is automatically prioritized and placed into one of the four queues based on its
802.1p priority tag or DiffServ Code Point (DSCP) value. Along with the traffic remarking function on 4ipnet wireless
WI-FI MULTIMEDIA (WMM)
ENABLE
MULTICAST TO UNICAST
DISABLE
MULTICAST TO UNICAST
4ipnet AP4ipnet AP
Figure 4: Multicast to Unicast Conversion is ideal in environments where the majority of clients are densely packed around APs
connectivity and performance issues (where delays may be the difference between life and death), while other
environments may be more tolerant towards devices with slow connectivity. With 4ipnet’s Optimal Client Filtering,
network administrators can fine-tune each threshold value depending on the needs of each deployment to
ensure optimal wireless performance.
Copyright © 2013, 4ipnet, Inc. All rights reserved. All other trademarks mentioned are the property of their respective owners.5
ARP (Address Resolution Protocol) is an essential protocol in networking (both wired and wireless) that resolves IP
addresses to MAC addresses when data needs to be sent between two hosts. Whenever a host wishes to obtain
the physical address (MAC) of another, it will broadcast an ARP request onto the network. On wireless networks
this may sometimes be additional and unnecessary traffic that decreases overall network performance.
4ipnet access points address this issue by employing PROXY ARP to reduce the amount of ARP packets in the
wireless medium, handling ARP requests itself instead of forwarding them onto the wireless medium when
possible. As long as the AP’s own ARP table has a record of the address requested, it can respond on behalf of
the actual host. As a result, the amount of ARP packets in the air diminishes and hosts learn MAC addresses much
more quickly, increasing overall network throughput.
PROXY ARP
In enterprise-grade deployments security is one of the most commonly emphasized features and requirements.
The first line of defense is usually at the point of access to the network, which back in the old days was composed
primarily of network switches, but is now shifting rapidly towards wireless access points. Similar to the port-based
authentication features on Ethernet switches, wireless access points also have methods to authenticate devices.
Furthermore, the evolution of Wi-Fi in recent years has begun to invalidate the notion that data transmission over
wireless is insecure – with authentication and encryption protocols such as WPA2-ENTERPRISE, organizations can
rest assured that confidential information will remain confidential.
WPA2-Enterprise provides 802.1X authentication with the access point acting as the authenticator, blocking
access until successful authentication. For deployments where security is not as stringent, network administrators
can use WPA2-Personal and simply perform passphrase verification in order to gain access to the network. Both
methods utilize AES data encryption, which would theoretically take longer than the age of the universe to be
cracked via brute-force by even by the most powerful supercomputers today.
WI-FI PROTECTED ACCESS II (WPA2)
In many Wi-Fi environments, it is not uncommon to see upwards of
twenty or thirty devices connected to a single access point. Allowing direct
communication between these clients would be a security concern for
network operators, as malicious traffic from one client could potentially
affect another. The STATION (CLIENT) ISOLATION feature on 4ipnet
APs allows network operators to prevent devices connected to the same
AP from communicating with one another, essentially creating a virtual
network per client.
Imagine that you have a bunch of strangers connected to the same
access point in a coffee shop, all of whom are assigned IP addresses
by the same DHCP server, which usually means that they are on the
same network (subnet). If a user were to have file sharing turned on
STATION ISOLATION
ISOLATED
4ipnet AP
Figure 5: Station Isolation prevents direct
communication between clients on the same AP
LAN controllers, network administrators have a complete arsenal of tools at their disposal to guarantee reliable,
latency-free operation of mission-critical applications.
It is important to note that WMM and Airtime Fairness both utilize priority assignment but with very different
purposes. WMM performs prioritization based on the type of traffic, while Airtime Fairness performs prioritization
based on the type of client.
Copyright © 2013, 4ipnet, Inc. All rights reserved. All other trademarks mentioned are the property of their respective owners.6
In order for a device to begin using network services after connecting to an access point, it must first obtain an IP
address from the network’s DHCP server. This is a point of vulnerability, as attackers can install their own DHCP
server and assign clients arbitrary IP addresses and default gateways. In the worst case, a rogue DHCP server
controlled by a hacker could potentially cause network administrators to lose control of their entire network,
which is a major security flaw.
The DHCP SNOOPING feature on 4ipnet APs prevents this type of network failure by allowing network
administrators to specify the IP and MAC addresses of trusted DHCP servers. As a result, the APs will filter out
DHCP messages from unrecognized servers, preventing them from ever reaching client devices. Although DHCP
attacks are typically not as big of a concern for small-sized networks, enterprise and government networks
requiring the tightest of security measures will find DHCP snooping to be a beneficial added-layer of security.
DHCP SNOOPING
For security purposes, network administrators may sometimes want to block specific types of traffic directly at
the access point, preventing them from ever reaching associated wireless devices, such as applications running
on specific ports, or traffic originating from specific IP addresses. For example, if a school discovers that students
are using the school’s network to play online games during class time, the school may want to block the port(s)
that are used by the game to serve content. To address requirements such as these, 4ipnet access points are
equipped with a LAYER 2 FIREWALL feature that help network administrators enforce usage policies.
Another usage of the Layer 2 Firewall feature is to improve wireless performance by preventing unnecessary traffic
from being sent out by the AP. Throughout this feature guide we constantly reiterated how a wireless network’s
throughput is affected by the number of hosts contending for medium access – even network maintenance
packets such as STP (spanning tree protocol), which do not necessarily need to be sent to edge nodes (e.g.
wireless devices), can negatively impact a network’s performance. By blocking these packets, the airtime that
would have been required to send them is freed for transmissions other devices.
Although firewall features are also available on 4ipnet wireless LAN controllers, there are a few major reasons for
blocking packets directly at the network edge (at the access points):
1. Specific types of packets from the wired end of the access point will not be flooded out onto the
LAYER 2 FIREWALL
4ipnet AP
ONLY
ALLOWED
Figure 6: Layer 2 Firewall can be configured to prevent unnecessary traffic from entering the wireless medium, improving overall performance
(e.g. Windows-based system), then all of the other users on the network would be able to browse the files of the
exposed system. So while the user may have only wanted to get coffee and browse the Internet, he/she actually
ended up sharing all of his/her personal documents to every other coffee-goer. This illustrates why Station
Isolation is a crucial security feature, and why it is imperative for network administrators to enable the feature,
especially when providing public Wi-Fi service.
Copyright © 2013, 4ipnet, Inc. All rights reserved. All other trademarks mentioned are the property of their respective owners.7
By introducing the various performance and security features on 4ipnet access points, the difference between
consumer and enterprise-grade APs should now be much clearer – many of these features deal with applications
and usage scenarios only found in large-scale deployments. In today’s smartphone and tablet environment, it is
not uncommon to see an average of five to ten Wi-Fi enabled devices in traditional households. However, public
Wi-Fi hotspots such as coffee shops, hotels, or office buildings may have ten times that amount or even more. The
need for enterprise-grade APs is real. Enterprises and organizations have to address the ever increasing number
of mobile devices and the seemingly insatiable desire for bandwidth. 4ipnet’s wireless LAN solution is well-aligned
to help organizations of all types and scales face this rapidly evolving Wi-Fi landscape.
CONCLUSION
wireless medium, decreasing interference and increasing overall wireless throughput.
2. Malicious traffic from wireless clients can be blocked before ever entering the network, limiting the
amount of potential damage.

More Related Content

What's hot

Business Case for Cisco Intelligent WAN
Business Case for Cisco Intelligent WANBusiness Case for Cisco Intelligent WAN
Business Case for Cisco Intelligent WANCisco Service Provider
 
Software-Defined WAN 101
Software-Defined WAN 101Software-Defined WAN 101
Software-Defined WAN 101Zivaro Inc
 
Managing The Mobile Device Wave
Managing The Mobile Device WaveManaging The Mobile Device Wave
Managing The Mobile Device WaveCisco Canada
 
CloudGenix_Customer Presentation
CloudGenix_Customer PresentationCloudGenix_Customer Presentation
CloudGenix_Customer PresentationSyed Arsalan
 
MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17
MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17
MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17Scott Logan
 
Power Ngn%20 Datasheet 0
Power Ngn%20 Datasheet 0Power Ngn%20 Datasheet 0
Power Ngn%20 Datasheet 0PHIL110
 
Tech Talk by Tim Van Herck: SDN & NFV for WAN
Tech Talk by Tim Van Herck: SDN & NFV for WANTech Talk by Tim Van Herck: SDN & NFV for WAN
Tech Talk by Tim Van Herck: SDN & NFV for WANnvirters
 
Spectrum management best practices in a Gigabit wireless world
Spectrum management best practices in a Gigabit wireless worldSpectrum management best practices in a Gigabit wireless world
Spectrum management best practices in a Gigabit wireless worldCisco Canada
 
hSo Guide To MPLS
hSo Guide To MPLShSo Guide To MPLS
hSo Guide To MPLShSo
 
The greatest SDWAN sales slidedeck ever created
The greatest SDWAN sales slidedeck ever createdThe greatest SDWAN sales slidedeck ever created
The greatest SDWAN sales slidedeck ever createdRonald Bartels
 
SD-WAN 2.0: Building a Better SD-WAN
SD-WAN 2.0: Building a Better SD-WANSD-WAN 2.0: Building a Better SD-WAN
SD-WAN 2.0: Building a Better SD-WANADVA
 
15.) cloud (opex, capex or hybrid)
15.) cloud (opex, capex or hybrid)15.) cloud (opex, capex or hybrid)
15.) cloud (opex, capex or hybrid)Jeff Green
 

What's hot (20)

Business Case for Cisco Intelligent WAN
Business Case for Cisco Intelligent WANBusiness Case for Cisco Intelligent WAN
Business Case for Cisco Intelligent WAN
 
802.11ac Migration - Airheads Local
802.11ac Migration - Airheads Local802.11ac Migration - Airheads Local
802.11ac Migration - Airheads Local
 
Software-Defined WAN 101
Software-Defined WAN 101Software-Defined WAN 101
Software-Defined WAN 101
 
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment BasicsVery High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
 
Managing The Mobile Device Wave
Managing The Mobile Device WaveManaging The Mobile Device Wave
Managing The Mobile Device Wave
 
SD-WAN Economics 101 - VeloCloud
SD-WAN Economics 101 - VeloCloudSD-WAN Economics 101 - VeloCloud
SD-WAN Economics 101 - VeloCloud
 
Shubham
ShubhamShubham
Shubham
 
CloudGenix_Customer Presentation
CloudGenix_Customer PresentationCloudGenix_Customer Presentation
CloudGenix_Customer Presentation
 
MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17
MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17
MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17
 
Verizon Managed SD-WAN with Cisco IWAN
Verizon Managed SD-WAN with Cisco IWAN Verizon Managed SD-WAN with Cisco IWAN
Verizon Managed SD-WAN with Cisco IWAN
 
Power Ngn%20 Datasheet 0
Power Ngn%20 Datasheet 0Power Ngn%20 Datasheet 0
Power Ngn%20 Datasheet 0
 
Tech Talk by Tim Van Herck: SDN & NFV for WAN
Tech Talk by Tim Van Herck: SDN & NFV for WANTech Talk by Tim Van Herck: SDN & NFV for WAN
Tech Talk by Tim Van Herck: SDN & NFV for WAN
 
802 11ac wp
802 11ac wp802 11ac wp
802 11ac wp
 
Spectrum management best practices in a Gigabit wireless world
Spectrum management best practices in a Gigabit wireless worldSpectrum management best practices in a Gigabit wireless world
Spectrum management best practices in a Gigabit wireless world
 
hSo Guide To MPLS
hSo Guide To MPLShSo Guide To MPLS
hSo Guide To MPLS
 
An SD-WAN Bill of Rights
An SD-WAN Bill of RightsAn SD-WAN Bill of Rights
An SD-WAN Bill of Rights
 
The greatest SDWAN sales slidedeck ever created
The greatest SDWAN sales slidedeck ever createdThe greatest SDWAN sales slidedeck ever created
The greatest SDWAN sales slidedeck ever created
 
VRD-Indoor80211n 2012 05-31
VRD-Indoor80211n 2012 05-31VRD-Indoor80211n 2012 05-31
VRD-Indoor80211n 2012 05-31
 
SD-WAN 2.0: Building a Better SD-WAN
SD-WAN 2.0: Building a Better SD-WANSD-WAN 2.0: Building a Better SD-WAN
SD-WAN 2.0: Building a Better SD-WAN
 
15.) cloud (opex, capex or hybrid)
15.) cloud (opex, capex or hybrid)15.) cloud (opex, capex or hybrid)
15.) cloud (opex, capex or hybrid)
 

Viewers also liked

Viewers also liked (20)

HCCO Dashboard
HCCO DashboardHCCO Dashboard
HCCO Dashboard
 
Wave IP - Business communications
Wave IP -  Business communicationsWave IP -  Business communications
Wave IP - Business communications
 
Two-Bladed HAWT Final Presentation
Two-Bladed HAWT Final PresentationTwo-Bladed HAWT Final Presentation
Two-Bladed HAWT Final Presentation
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
Pancuronium bromide 16974-53-1-api
Pancuronium bromide 16974-53-1-apiPancuronium bromide 16974-53-1-api
Pancuronium bromide 16974-53-1-api
 
Oxyfedrine 15687-41-9-api
Oxyfedrine 15687-41-9-apiOxyfedrine 15687-41-9-api
Oxyfedrine 15687-41-9-api
 
2015
20152015
2015
 
Improve Issue Book Management
Improve Issue Book ManagementImprove Issue Book Management
Improve Issue Book Management
 
Annual Report FY14
Annual Report FY14Annual Report FY14
Annual Report FY14
 
Miguel
MiguelMiguel
Miguel
 
QT4DP 10-04-2011
QT4DP 10-04-2011QT4DP 10-04-2011
QT4DP 10-04-2011
 
ms word reusme
ms word reusmems word reusme
ms word reusme
 
2014_12_Sierra
2014_12_Sierra2014_12_Sierra
2014_12_Sierra
 
Oxomemazine 3689-50-7-api
Oxomemazine 3689-50-7-apiOxomemazine 3689-50-7-api
Oxomemazine 3689-50-7-api
 
HCCO OM Metrics Example
HCCO OM Metrics ExampleHCCO OM Metrics Example
HCCO OM Metrics Example
 
Testing for the carry-over loss time period of SCI patients via FES in conjun...
Testing for the carry-over loss time period of SCI patients via FES in conjun...Testing for the carry-over loss time period of SCI patients via FES in conjun...
Testing for the carry-over loss time period of SCI patients via FES in conjun...
 
my profile 2012
my profile 2012my profile 2012
my profile 2012
 
MS5 Schadenfreude
MS5 SchadenfreudeMS5 Schadenfreude
MS5 Schadenfreude
 
Biomaterial Testing W Electrical Stimulation
 Biomaterial Testing W Electrical Stimulation Biomaterial Testing W Electrical Stimulation
Biomaterial Testing W Electrical Stimulation
 
Nateglinide 105816-04-4-api
Nateglinide 105816-04-4-apiNateglinide 105816-04-4-api
Nateglinide 105816-04-4-api
 

Similar to Wi-Fi access points for business

Carrier grade wi fi integration architecture
Carrier grade wi fi integration architectureCarrier grade wi fi integration architecture
Carrier grade wi fi integration architectureSatish Chavan
 
EC 8004 – WIRELESS NETWORKS UNIT – IV.pptx
EC 8004 – WIRELESS NETWORKS UNIT – IV.pptxEC 8004 – WIRELESS NETWORKS UNIT – IV.pptx
EC 8004 – WIRELESS NETWORKS UNIT – IV.pptxNandhini Saravanan
 
1Running Head Network Design3Network DesignUn.docx
1Running Head Network Design3Network DesignUn.docx1Running Head Network Design3Network DesignUn.docx
1Running Head Network Design3Network DesignUn.docxeugeniadean34240
 
SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?Phani Kumar
 
APManagement_FeatureGuide
APManagement_FeatureGuideAPManagement_FeatureGuide
APManagement_FeatureGuideEugene Yu
 
FAS 110CL QEP Assignment Why Study Theatre Inst.docx
FAS 110CL QEP Assignment Why Study Theatre   Inst.docxFAS 110CL QEP Assignment Why Study Theatre   Inst.docx
FAS 110CL QEP Assignment Why Study Theatre Inst.docxssuser454af01
 
How to Re-evaluate Your MPLS Service Provider
How to Re-evaluate Your MPLS Service ProviderHow to Re-evaluate Your MPLS Service Provider
How to Re-evaluate Your MPLS Service ProviderIdan Hershkovich
 
White Paper: Resilient Semi-Passive Optical Link Protection
White Paper: Resilient Semi-Passive Optical Link ProtectionWhite Paper: Resilient Semi-Passive Optical Link Protection
White Paper: Resilient Semi-Passive Optical Link ProtectionSusmita Adhikari Joshi
 
wirless lan 802.11
wirless lan 802.11wirless lan 802.11
wirless lan 802.11mankuuu
 
Broadband Access Over Satellite: For Consumer, SOHO and SME
Broadband Access Over Satellite: For Consumer, SOHO and SMEBroadband Access Over Satellite: For Consumer, SOHO and SME
Broadband Access Over Satellite: For Consumer, SOHO and SMEST Engineering iDirect
 
Wimax - Opportunites for Developing Nations
Wimax - Opportunites for Developing NationsWimax - Opportunites for Developing Nations
Wimax - Opportunites for Developing Nationskamalmittal1
 
Access point or wireless router general questions tell you
Access point or wireless router general questions tell youAccess point or wireless router general questions tell you
Access point or wireless router general questions tell youIT Tech
 
A Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksA Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksEswar Publications
 
A Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication SystemA Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication SystemIOSR Journals
 
TECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN OptimizationTECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN OptimizationSymantec
 
Tp link distributor
Tp link distributorTp link distributor
Tp link distributorSkincare7
 

Similar to Wi-Fi access points for business (20)

Carrier grade wi fi integration architecture
Carrier grade wi fi integration architectureCarrier grade wi fi integration architecture
Carrier grade wi fi integration architecture
 
EC 8004 – WIRELESS NETWORKS UNIT – IV.pptx
EC 8004 – WIRELESS NETWORKS UNIT – IV.pptxEC 8004 – WIRELESS NETWORKS UNIT – IV.pptx
EC 8004 – WIRELESS NETWORKS UNIT – IV.pptx
 
1Running Head Network Design3Network DesignUn.docx
1Running Head Network Design3Network DesignUn.docx1Running Head Network Design3Network DesignUn.docx
1Running Head Network Design3Network DesignUn.docx
 
5G -NOMA & IBFD
5G -NOMA & IBFD5G -NOMA & IBFD
5G -NOMA & IBFD
 
SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?
 
APManagement_FeatureGuide
APManagement_FeatureGuideAPManagement_FeatureGuide
APManagement_FeatureGuide
 
FAS 110CL QEP Assignment Why Study Theatre Inst.docx
FAS 110CL QEP Assignment Why Study Theatre   Inst.docxFAS 110CL QEP Assignment Why Study Theatre   Inst.docx
FAS 110CL QEP Assignment Why Study Theatre Inst.docx
 
WLAN considerations v2.2
WLAN considerations v2.2WLAN considerations v2.2
WLAN considerations v2.2
 
How to Re-evaluate Your MPLS Service Provider
How to Re-evaluate Your MPLS Service ProviderHow to Re-evaluate Your MPLS Service Provider
How to Re-evaluate Your MPLS Service Provider
 
Lect3
Lect3Lect3
Lect3
 
White Paper: Resilient Semi-Passive Optical Link Protection
White Paper: Resilient Semi-Passive Optical Link ProtectionWhite Paper: Resilient Semi-Passive Optical Link Protection
White Paper: Resilient Semi-Passive Optical Link Protection
 
wirless lan 802.11
wirless lan 802.11wirless lan 802.11
wirless lan 802.11
 
B010410411
B010410411B010410411
B010410411
 
Broadband Access Over Satellite: For Consumer, SOHO and SME
Broadband Access Over Satellite: For Consumer, SOHO and SMEBroadband Access Over Satellite: For Consumer, SOHO and SME
Broadband Access Over Satellite: For Consumer, SOHO and SME
 
Wimax - Opportunites for Developing Nations
Wimax - Opportunites for Developing NationsWimax - Opportunites for Developing Nations
Wimax - Opportunites for Developing Nations
 
Access point or wireless router general questions tell you
Access point or wireless router general questions tell youAccess point or wireless router general questions tell you
Access point or wireless router general questions tell you
 
A Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksA Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh Networks
 
A Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication SystemA Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication System
 
TECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN OptimizationTECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
 
Tp link distributor
Tp link distributorTp link distributor
Tp link distributor
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Wi-Fi access points for business

  • 1. ACCESS POINT OPTIMIZATION FEATURE GUIDE Copyright © 2013, 4ipnet, Inc. All rights reserved. All other trademarks mentioned are the property of their respective owners.1 SUMMARY OF FEATURES AIRTIME FAIRNESS BAND STEERING OPTIMAL CLIENT FILTERING MULTICAST TO UNICAST CONVERSION WI-FI MULTIMEDIA (WMM) PROXY ARP WI-FI PROTECTED ACCESS II (WPA2) STATION ISOLATION DHCP SNOOPING LAYER 2 FIREWALL AIRTIME FAIRNESS ENTERPRISE VS. CONSUMER AP “Why should I pay an extra five to ten times the cost for an enterprise-grade AP (access point), when I can buy a much cheaper wireless router from Amazon or the electronics shop down the block?” This is one of the most commonly asked questions in all segments of the enterprise Wi-Fi market, including hospitality, education, large enterprises, and SMBs. To answer this question, we must first look at the fundamental difference between the consumer and enterprise Wi-Fi markets – more specifically, how access points are deployed and used. For example, Power over Ethernet (PoE) is a hardware specification that is ubiquitous on all enterprise-grade APs, due to the presence of PoE switches that lie at the core of every enterprise’s network infrastructure as well as the expensive cost of physical cabling. In this feature guide we will highlight the performance and security features of 4ipnet access points, and in the process clearly illustrate the differences between 4ipnet APs and regular consumer-grade APs. As networks migrate between wireless standards – previously from 11g to 11n, and now from 11n to 11ac – network operators are increasingly struggling with the tradeoffs between legacy client support and wireless performance. For example, when both 11g and 11n clients are connected to the same AP, an 11g client will take much longer (use more airtime) to complete the transfer of the same amount of data as an 11n client. To understand why this matters, we must first briefly explain how data is transmitted over Wi-Fi. The fundamental concept behind wireless transmission is that two devices cannot transmit at exactly the same time in the same frequency, otherwise collisions occur and the transmission will be unsuccessful. Wi-Fi deals with this issue by utilizing CSMA/CA (carrier sense multiple access with collision avoidance), which incorporates a random back-off period for each transmitting device when detecting that the medium is busy. Therefore, the longer a single device takes to transmit, the higher the probability that other devices trigger their respective wait periods. Back to the legacy client example, this means that all other clients have to wait for the legacy client to finish transmission, which results in decreased overall network throughput. However, if legacy standards such as 11g are not allowed, operators will surely receive a lot of complaints from users who have older devices that only support legacy standards. Herein lies a dilemma: do operators allow legacy clients to connect at the expense of overall network throughput, or do they block all legacy clients and maximize performance?
  • 2. Copyright © 2013, 4ipnet, Inc. All rights reserved. All other trademarks mentioned are the property of their respective owners.2 In today’s wireless environment the unlicensed 2.4 GHz frequency band is becoming increasingly congested due to the explosion of mobile devices. As a result, many consumer device manufacturers, whether it be of laptop computers or smartphones, have incorporated 5 GHz-capable Wi-Fi chipsets in their devices. Furthermore, 802.11ac ready consumer devices are already making their way into the hands of everyday users. This begs the question: When a Wi- Fi environment offers connectivity in both 2.4 GHz and 5 GHz, and clients have both 2.4 GHz and 5 GHz capability, how do network operators balance the load between the two frequency bands? One method is to simply to add the frequency band to the SSID name. For example, instead of “Hotel”, “Hotel-2.4GHz” and “Hotel-5GHz” can be used instead. But what if organizations don’t want to advertise the frequency band in the SSID? BAND STEERING is a function that addresses this exact issue. When enabled on a 4ipnet access point, the AP will use one of two methods to “steer” clients that are capable of operating in the 5 GHz band away from 2.4 GHz networks and towards 5 GHz networks. 1. The AP does not respond to 2.4 GHz probe requests of the client, tricking the client into believing that it does not exist. For the user, this means that the SSID cannot be seen. However, if the user happens to know the SSID, he/she can still manually connect. This is a more passive method of Band Steering, as users will not completely be prohibited from using 2.4 GHz if their device supports 5 GHz. BAND STEERING Luckily, on 4ipnet APs there is a middle ground. AIRTIME FAIRNESS is a feature that allows networks to mitigate the decrease in performance incurred by supporting legacy clients. Depending on the needs and preferences of each deployment, the following two options can be selected: 1. All clients, regardless of standards supported, obtain roughly the same amount of airtime. If a client occupies the wireless medium for a longer period of time in one transmission, then subsequent transmissions are placed on a lower priority, ensuring that overall airtime distribution is balanced. 2. 11n clients are given a slight preference. Legacy clients are not blocked from the network, but they will be allocated less airtime. This option is ideal for organizations that wish to optimize network performance while still supporting older clients. Organizations can also use this feature as a method to slightly “nudge” older clients to migrate from 11b/g to 11n. With either option, administrators are able to increase overall network throughput without sacrificing the support of legacy clients. Further details on how priority is managed by the AP will be described in the section on WMM. 11g client 11n client EQUAL AIRTIME Time =Time on medium 2.4 GHz 2.4 GHz 5 GHz 5 GHz 4ipnet AP4ipnet AP Figure 2: Clients capable of 5 GHz are "steered" towards 5 GHz networks Figure 1: All clients are allocated equal airtime to prevent starvation due to slower/legacy clients
  • 3. Copyright © 2013, 4ipnet, Inc. All rights reserved. All other trademarks mentioned are the property of their respective owners.3 OPTIMAL CLIENT FILTERING Earlier in this feature guide we described Wi-Fi as a form of a wireless communication that utilizes CSMA/CA to avoid collisions during data transmission. As mentioned, one caveat of this protocol is that anyone who wishes to use the medium to transmit must wait until the medium is free (unused). Therefore, if a device or client takes a long time to transmit a small amount of data, overall network throughput is decreased. Now let us consider the case where a network consists of only 802.11n (or 802.11ac) clients. Theoretically, everyone can get in and out of the medium in a short amount of time, since under 802.11n/ac standards data can be transmitted at relatively fast rates. In this case, is network performance optimized? Legacy clients are not the only issue in a wireless environment – even though all clients may utilize the most up- to-date standard, some clients will inevitably have poorer transmission rates than others due to interference, physical obstructions, or large distances between themselves and the AP. As a result, these clients have to stay on the medium longer to complete data transmissions, which creates the exact same phenomenon as legacy clients. If you’ve ever wondered why the network feels very slow even when you have “full bars” of connection in the taskbar, it may be because others using the same network have less than ideal connectivity. For a wireless network to perform optimally, not only should clients comply with the newest standards, they should also connect to APs that offer them best connection. However, this is a best-case scenario that cannot always be guaranteed, since all Wi-Fi users usually think about is getting “connected”. Should everyone be allowed to connect to the network even when under conditions of poor connectivity (which drags down the entire network’s throughput)? Or do you prevent these devices from connecting to let others enjoy higher throughput? This is a question that many network administrators struggle with as Wi-Fi becomes more pervasive and common in our daily lives. OPTIMAL CLIENT FILTERING is a method that helps 4ipnet APs filter out clients that will negatively impact the AP’s overall throughput. Through a set of thresholds, such as Dropped Packet Threshold, Transmission Rate Threshold, and Receiving RSSI Threshold, the AP is able to remove (kick) clients that have poor connectivity. This ensures that all clients connected to an AP have an acceptable connection quality, minimizing the number of packet retries and increasing airtime efficiency. How does this translate to real-life deployments? Some environments such as hospitals may be very strict on 2. The AP rejects 2.4 GHz connections from the client, even if the client were to know the SSID and manually connect. This is the more aggressive method of Band Steering, and in essence forces all 5 GHz clients to only connect to 5 GHz networks. Band Steering is a feature that can be enabled or disabled individually for each AP, but it does not make much sense if the setting is not consistent between neighboring APs. For example, if the purpose is to reduce congestion in the 2.4 GHz frequency band, then network administrators should enable Band Steering for all APs to redirect as many connections to 5 GHz as possible. If only a few of the APs have the function enabled, then 5 GHz clients will still be able to connect to other 2.4 GHz SSIDs, meaning that actual spectrum usage and medium access in 2.4 GHz is still the same. Although at times Band Steering can be viewed as a feature to load balance clients between different APs, ultimately its end goal to lower 2.4 GHz medium access contention. LOW RSSI HIGH RSSI 4ipnet AP 4ipnet AP Figure 3: Client connections are filtered based on pre-defined connectivity thresholds
  • 4. Copyright © 2013, 4ipnet, Inc. All rights reserved. All other trademarks mentioned are the property of their respective owners.4 In Wi-Fi networks, multicast packets are typically sent at slower rates to ensure that devices at the edge of an AP’s cell are able to receive the packets without error. This may be useful in environments where most clients are a certain distance (further away) from the AP. However, if the cell size is very small and most clients are densely packed around the AP, this would be an inefficient use of airtime. Why send at 11M when you can send at 300M? MULTICAST TO UNICAST CONVERSION is a method that 4ipnet APs employ to convert multicast transmissions to unicast so that they can be sent at unicast rates. When clients are close to an AP, high transmission rates can be more easily sustained, and thus unicast is more efficient. On the other hand, attempting to use the same rate with clients far away from the AP will lead to a high number of retransmissions, which lowers efficiency. As a result, Multicast to Unicast Conversion is not a universally beneficial feature – it merely allows network administrators to optimize performance based on how clients are spatially distributed around APs. MULTICAST TO UNICAST CONVERSION If you’ve ever observed VoIP over Wi-Fi working flawlessly even when there were tons of other applications simultaneously using the network, then you’ve seen WMM (WI-FI MULTIMEDIA) in action. WMM provides fundamental QoS (Quality of Service) functionality to wireless networks by increasing the performance of differentiated wireless traffic, such as audio, video, and traditional application data. Based on the needs of each type of data, they are placed in one of four different queues, BE (Best Effort), BK (Background), VI (Video), and VO (Voice). Recall the earlier description of Wi-Fi medium access using CSMA/CA – clients must wait for a random amount of time before retrying transmission if a busy medium is detected. WMM assigns shorter or longer average back- off periods to each of the four queues, which in essence gives each queue a different priority. The queue with the shorter average random back-off period (e.g. Voice) will forward traffic faster and more easily (with higher priority) than queues with longer average random back-off periods (e.g. Best Effort). On 4ipnet access points, traffic is automatically prioritized and placed into one of the four queues based on its 802.1p priority tag or DiffServ Code Point (DSCP) value. Along with the traffic remarking function on 4ipnet wireless WI-FI MULTIMEDIA (WMM) ENABLE MULTICAST TO UNICAST DISABLE MULTICAST TO UNICAST 4ipnet AP4ipnet AP Figure 4: Multicast to Unicast Conversion is ideal in environments where the majority of clients are densely packed around APs connectivity and performance issues (where delays may be the difference between life and death), while other environments may be more tolerant towards devices with slow connectivity. With 4ipnet’s Optimal Client Filtering, network administrators can fine-tune each threshold value depending on the needs of each deployment to ensure optimal wireless performance.
  • 5. Copyright © 2013, 4ipnet, Inc. All rights reserved. All other trademarks mentioned are the property of their respective owners.5 ARP (Address Resolution Protocol) is an essential protocol in networking (both wired and wireless) that resolves IP addresses to MAC addresses when data needs to be sent between two hosts. Whenever a host wishes to obtain the physical address (MAC) of another, it will broadcast an ARP request onto the network. On wireless networks this may sometimes be additional and unnecessary traffic that decreases overall network performance. 4ipnet access points address this issue by employing PROXY ARP to reduce the amount of ARP packets in the wireless medium, handling ARP requests itself instead of forwarding them onto the wireless medium when possible. As long as the AP’s own ARP table has a record of the address requested, it can respond on behalf of the actual host. As a result, the amount of ARP packets in the air diminishes and hosts learn MAC addresses much more quickly, increasing overall network throughput. PROXY ARP In enterprise-grade deployments security is one of the most commonly emphasized features and requirements. The first line of defense is usually at the point of access to the network, which back in the old days was composed primarily of network switches, but is now shifting rapidly towards wireless access points. Similar to the port-based authentication features on Ethernet switches, wireless access points also have methods to authenticate devices. Furthermore, the evolution of Wi-Fi in recent years has begun to invalidate the notion that data transmission over wireless is insecure – with authentication and encryption protocols such as WPA2-ENTERPRISE, organizations can rest assured that confidential information will remain confidential. WPA2-Enterprise provides 802.1X authentication with the access point acting as the authenticator, blocking access until successful authentication. For deployments where security is not as stringent, network administrators can use WPA2-Personal and simply perform passphrase verification in order to gain access to the network. Both methods utilize AES data encryption, which would theoretically take longer than the age of the universe to be cracked via brute-force by even by the most powerful supercomputers today. WI-FI PROTECTED ACCESS II (WPA2) In many Wi-Fi environments, it is not uncommon to see upwards of twenty or thirty devices connected to a single access point. Allowing direct communication between these clients would be a security concern for network operators, as malicious traffic from one client could potentially affect another. The STATION (CLIENT) ISOLATION feature on 4ipnet APs allows network operators to prevent devices connected to the same AP from communicating with one another, essentially creating a virtual network per client. Imagine that you have a bunch of strangers connected to the same access point in a coffee shop, all of whom are assigned IP addresses by the same DHCP server, which usually means that they are on the same network (subnet). If a user were to have file sharing turned on STATION ISOLATION ISOLATED 4ipnet AP Figure 5: Station Isolation prevents direct communication between clients on the same AP LAN controllers, network administrators have a complete arsenal of tools at their disposal to guarantee reliable, latency-free operation of mission-critical applications. It is important to note that WMM and Airtime Fairness both utilize priority assignment but with very different purposes. WMM performs prioritization based on the type of traffic, while Airtime Fairness performs prioritization based on the type of client.
  • 6. Copyright © 2013, 4ipnet, Inc. All rights reserved. All other trademarks mentioned are the property of their respective owners.6 In order for a device to begin using network services after connecting to an access point, it must first obtain an IP address from the network’s DHCP server. This is a point of vulnerability, as attackers can install their own DHCP server and assign clients arbitrary IP addresses and default gateways. In the worst case, a rogue DHCP server controlled by a hacker could potentially cause network administrators to lose control of their entire network, which is a major security flaw. The DHCP SNOOPING feature on 4ipnet APs prevents this type of network failure by allowing network administrators to specify the IP and MAC addresses of trusted DHCP servers. As a result, the APs will filter out DHCP messages from unrecognized servers, preventing them from ever reaching client devices. Although DHCP attacks are typically not as big of a concern for small-sized networks, enterprise and government networks requiring the tightest of security measures will find DHCP snooping to be a beneficial added-layer of security. DHCP SNOOPING For security purposes, network administrators may sometimes want to block specific types of traffic directly at the access point, preventing them from ever reaching associated wireless devices, such as applications running on specific ports, or traffic originating from specific IP addresses. For example, if a school discovers that students are using the school’s network to play online games during class time, the school may want to block the port(s) that are used by the game to serve content. To address requirements such as these, 4ipnet access points are equipped with a LAYER 2 FIREWALL feature that help network administrators enforce usage policies. Another usage of the Layer 2 Firewall feature is to improve wireless performance by preventing unnecessary traffic from being sent out by the AP. Throughout this feature guide we constantly reiterated how a wireless network’s throughput is affected by the number of hosts contending for medium access – even network maintenance packets such as STP (spanning tree protocol), which do not necessarily need to be sent to edge nodes (e.g. wireless devices), can negatively impact a network’s performance. By blocking these packets, the airtime that would have been required to send them is freed for transmissions other devices. Although firewall features are also available on 4ipnet wireless LAN controllers, there are a few major reasons for blocking packets directly at the network edge (at the access points): 1. Specific types of packets from the wired end of the access point will not be flooded out onto the LAYER 2 FIREWALL 4ipnet AP ONLY ALLOWED Figure 6: Layer 2 Firewall can be configured to prevent unnecessary traffic from entering the wireless medium, improving overall performance (e.g. Windows-based system), then all of the other users on the network would be able to browse the files of the exposed system. So while the user may have only wanted to get coffee and browse the Internet, he/she actually ended up sharing all of his/her personal documents to every other coffee-goer. This illustrates why Station Isolation is a crucial security feature, and why it is imperative for network administrators to enable the feature, especially when providing public Wi-Fi service.
  • 7. Copyright © 2013, 4ipnet, Inc. All rights reserved. All other trademarks mentioned are the property of their respective owners.7 By introducing the various performance and security features on 4ipnet access points, the difference between consumer and enterprise-grade APs should now be much clearer – many of these features deal with applications and usage scenarios only found in large-scale deployments. In today’s smartphone and tablet environment, it is not uncommon to see an average of five to ten Wi-Fi enabled devices in traditional households. However, public Wi-Fi hotspots such as coffee shops, hotels, or office buildings may have ten times that amount or even more. The need for enterprise-grade APs is real. Enterprises and organizations have to address the ever increasing number of mobile devices and the seemingly insatiable desire for bandwidth. 4ipnet’s wireless LAN solution is well-aligned to help organizations of all types and scales face this rapidly evolving Wi-Fi landscape. CONCLUSION wireless medium, decreasing interference and increasing overall wireless throughput. 2. Malicious traffic from wireless clients can be blocked before ever entering the network, limiting the amount of potential damage.