SlideShare a Scribd company logo
1 of 10
Components of today’s centralized wireless networks:<br />Wireless Access Points: Access points are placed at various locations to communicate with the backend wired network and wireless clients. A single Access Point can connect with multiple clients and they can have multiple radios and built-in antennas or external antennas.<br />Wireless Controllers: Wireless controllers are generally installed in a central location/ core switch in the data centre and it gives a centralized management interface for all the access points installed across multiple locations inside the campus as well as in remote sites. <br />      <br />Wireless Adaptors / Clients:  Laptops come with built-in wireless adaptors to connect with wireless networks, PC’s can be wireless enabled by connecting external wireless adaptors, many cell phones/PDA’s come with built in wi-fi adaptors. Even IP Cameras, VoWLAN phones, MFP’s, Scanners etc come with built in wireless adaptors.  <br />        <br />                                    <br />Why go for a Wireless Network today?<br />Wired Equivalent Performance:  Today’s Wireless Networks come with the latest 802.11n Technology which gives a performance of 300 Mbps today and shortly upgradeable to 600 Mbps per access point. <br />Wider area coverage: 802.11n technology covers up to one and a half times the area covered by earlier wireless technologies, along with the higher throughput. <br />Lesser Cost: A centrally managed wireless network is any day cheaper than the wired network active/ passive components required for connecting the same number of computers. <br />Eliminating Clutter: The clutter due to the multiple cables connecting to the desktop/ passive components / structured networking etc. can be reduced drastically by implementing a wireless network.<br />Comfort:  The wireless network can be accessed comfortably from any where in the campus, including lawns, cafeteria, conference hall etc. It is easier for any staff member to relocate, without the intervention of the IT department.<br />                                         <br />  <br />Why go for a controller based Centralized Wireless Network today?<br />Centralized Authentication: No more individual MAC address tables and updation in each access point, controller provides for a centralized authentication mechanism through individual username-password based Radius Server/ Active Directory/ LDAP Integration , centralized MAC address filtering or certificate/ shared key based authentication for all the clients from a central location. <br />                                         <br />Centralized Radio Management for all Access Points:<br />,[object Object],                                                    <br />,[object Object],                                                  <br />,[object Object]
Failover: Clients are automatically shifted to neighboring access points if any access point suddenly fails, thereby introducing redundancy in the network.                                                  <br />RF Visualization:<br />Another advantage of today’s centralized wireless networks are the visualization capablities of the Controller. Once the Floor plan of the campus is integrated with the controller, the coverage pattern, signal strength, users associated in each access point and various parameters can be viewed LIVE over a PC monitor (through a web based application) sitting in a central location. This makes monitoring and trouble shooting of networks very easy. You can also locate any active Wireless client in the network map by just typing its MAC ID in the s/w.<br /> <br />Network Access Control based on User Identity:<br />With today’s centralized Controller based Wireless networks, wireless users can be further segregated in to sub-groups and each group can be given separate network access policies. For example, all the wireless users accessing the network from the finance department can be given SAP/ERP access while the sales department can be denied the same. Internet access for the junior management staff can be blocked and guests can be given temporary internet access without giving access to internal network. IT department and senior management can be given full unrestricted access to the network resources. Certain laptops/ wireless clients can even be blocked network access if they do not have the latest versions of the antivirus/ OS patch running on their systems. You thought all this is possible only with wired networks?? Not any more.<br />                                  <br />Security:  After authentication, all the wireless packets are encrypted end to end using 128 bit encryption technology making it difficult for any casual intruders to get in to your network. <br />Wireless Intrusion Detection/ Prevention Systems (Where dedicated access points can act as scanners for wireless threats) can identify and block a whole range of wireless attacks like:<br />,[object Object]
Mis-association of AP/Client to other network access points
Rogue Access Points detection and prevention
Multiple futile attempts to connect to the wireless network
Honeypot attacks/ Man-In-The-Middle Attacks
Denial of Service Attacks etc. Branch offices and remote offices are also protected as the controller can form a Secure VPN tunnel between the HO and branch locations. <br /> <br />Rogue Access Points and Laptop’s can be even located using location visualizers.  <br />Mesh Connectivity:<br />Connect even the Access Points without Cables!!<br />                         <br />Bandwidth Restriction per user/ per group:<br />You can prevent a few wireless users from clogging the entire network by restricting the bandwidth available to them at any point of time. You can also reserve a minimum bandwidth to all the critical users. <br />
Centralized wireless networks: access points, controllers, clients, security & management
Centralized wireless networks: access points, controllers, clients, security & management
Centralized wireless networks: access points, controllers, clients, security & management

More Related Content

What's hot

Wireless network ppt
Wireless network pptWireless network ppt
Wireless network pptBasil John
 
Three types of wireless technology
Three types of wireless technologyThree types of wireless technology
Three types of wireless technologyRashmi Joaa
 
Carrier grade wi fi integration architecture
Carrier grade wi fi integration architectureCarrier grade wi fi integration architecture
Carrier grade wi fi integration architectureSatish Chavan
 
Ethernet networks and media converter
Ethernet networks and media converterEthernet networks and media converter
Ethernet networks and media converterRichTull
 
Wireless components
Wireless componentsWireless components
Wireless componentslyndyv
 
Wireless router
Wireless routerWireless router
Wireless routerroza921
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAAiman Hud
 
Trends in Networking
Trends in NetworkingTrends in Networking
Trends in NetworkingHardik Mistry
 
shawn.rainbolt.it241.week1.2
shawn.rainbolt.it241.week1.2shawn.rainbolt.it241.week1.2
shawn.rainbolt.it241.week1.2Shawn Rainbolt
 
Router vs Modem-A Complete Comparison
Router vs Modem-A Complete ComparisonRouter vs Modem-A Complete Comparison
Router vs Modem-A Complete ComparisonArohi Roy
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and StandardsRubal Sagwal
 
A University Network Design Exercise
A University Network Design ExerciseA University Network Design Exercise
A University Network Design Exercisejoelavery
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking SecurityAnshuman Biswal
 

What's hot (19)

Ap7131 tech brief
Ap7131 tech briefAp7131 tech brief
Ap7131 tech brief
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network ppt
 
Three types of wireless technology
Three types of wireless technologyThree types of wireless technology
Three types of wireless technology
 
Carrier grade wi fi integration architecture
Carrier grade wi fi integration architectureCarrier grade wi fi integration architecture
Carrier grade wi fi integration architecture
 
Ethernet networks and media converter
Ethernet networks and media converterEthernet networks and media converter
Ethernet networks and media converter
 
Wireless components
Wireless componentsWireless components
Wireless components
 
Wlan(1)
Wlan(1)Wlan(1)
Wlan(1)
 
Wireless router
Wireless routerWireless router
Wireless router
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
ERP AAM 2017
ERP AAM 2017ERP AAM 2017
ERP AAM 2017
 
Trends in Networking
Trends in NetworkingTrends in Networking
Trends in Networking
 
shawn.rainbolt.it241.week1.2
shawn.rainbolt.it241.week1.2shawn.rainbolt.it241.week1.2
shawn.rainbolt.it241.week1.2
 
Router vs Modem-A Complete Comparison
Router vs Modem-A Complete ComparisonRouter vs Modem-A Complete Comparison
Router vs Modem-A Complete Comparison
 
Kira128i
Kira128iKira128i
Kira128i
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
 
Dial up security
Dial up securityDial up security
Dial up security
 
A University Network Design Exercise
A University Network Design ExerciseA University Network Design Exercise
A University Network Design Exercise
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 

Similar to Centralized wireless networks: access points, controllers, clients, security & management

Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networksSweta Kumari Barnwal
 
wifi-technology
 wifi-technology wifi-technology
wifi-technologytardeep
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN securityRajan Kumar
 
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxWireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxalanfhall8953
 
Wireless communication technologies
Wireless communication technologiesWireless communication technologies
Wireless communication technologiesChandrakant Choure
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networkingM Sabir Saeed
 
System and networkpresentation(sadaf noor)
System and networkpresentation(sadaf noor)System and networkpresentation(sadaf noor)
System and networkpresentation(sadaf noor)SadafNoor13
 
8. Wireless (1).ppt
8. Wireless (1).ppt8. Wireless (1).ppt
8. Wireless (1).pptSAMBIT34
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityGurpreet Singh
 
Types of Computer Networks bba 1st sem.pptx
Types of Computer Networks bba 1st sem.pptxTypes of Computer Networks bba 1st sem.pptx
Types of Computer Networks bba 1st sem.pptxPankaj Chandel
 
wirless lan 802.11
wirless lan 802.11wirless lan 802.11
wirless lan 802.11mankuuu
 

Similar to Centralized wireless networks: access points, controllers, clients, security & management (20)

Networking devices
Networking devicesNetworking devices
Networking devices
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networks
 
wifi-technology
 wifi-technology wifi-technology
wifi-technology
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxWireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
 
WIRELES NETWORK
WIRELES NETWORKWIRELES NETWORK
WIRELES NETWORK
 
Wireless communication technologies
Wireless communication technologiesWireless communication technologies
Wireless communication technologies
 
Wireless
WirelessWireless
Wireless
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networking
 
Rkp internet part i
Rkp internet part iRkp internet part i
Rkp internet part i
 
System and networkpresentation(sadaf noor)
System and networkpresentation(sadaf noor)System and networkpresentation(sadaf noor)
System and networkpresentation(sadaf noor)
 
8. Wireless (1).ppt
8. Wireless (1).ppt8. Wireless (1).ppt
8. Wireless (1).ppt
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 
Ruckus brief customer_Medley
Ruckus brief customer_MedleyRuckus brief customer_Medley
Ruckus brief customer_Medley
 
Wi te-pp
Wi te-ppWi te-pp
Wi te-pp
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless Fidelity
 
Wireless and intranet
Wireless and intranetWireless and intranet
Wireless and intranet
 
Types of Computer Networks bba 1st sem.pptx
Types of Computer Networks bba 1st sem.pptxTypes of Computer Networks bba 1st sem.pptx
Types of Computer Networks bba 1st sem.pptx
 
wirless lan 802.11
wirless lan 802.11wirless lan 802.11
wirless lan 802.11
 

Recently uploaded

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Centralized wireless networks: access points, controllers, clients, security & management

  • 1.
  • 2.
  • 3. Mis-association of AP/Client to other network access points
  • 4. Rogue Access Points detection and prevention
  • 5. Multiple futile attempts to connect to the wireless network
  • 7. Denial of Service Attacks etc. Branch offices and remote offices are also protected as the controller can form a Secure VPN tunnel between the HO and branch locations. <br /> <br />Rogue Access Points and Laptop’s can be even located using location visualizers. <br />Mesh Connectivity:<br />Connect even the Access Points without Cables!!<br /> <br />Bandwidth Restriction per user/ per group:<br />You can prevent a few wireless users from clogging the entire network by restricting the bandwidth available to them at any point of time. You can also reserve a minimum bandwidth to all the critical users. <br />