SlideShare a Scribd company logo
1 of 49
WORKSMART
Wireless in the Data Centre
“Decoding the Spin” Seminar
16th July 2014 – FINAL 3
Copyright 2014, All rights reserved 122/07/2014
WORKSMART
Enterprise Class Wi-Fi
Copyright 2014, All rights reserved 222/07/2014
Enterprise WLAN Development
22/07/2014
Copyright 2014, All rights reserved 3
WLM (Wireless LAN Management)
WLC (Wireless LAN Controller)
WLA (Wireless Access Point)
WLA/ WLM (at edge)
WLA/ WLM (at edge switch)
Enterprise WLAN Components
22/07/2014
Copyright 2014, All rights reserved 4
WLM (Wireless LAN Management)
WLM (Management)
– Configuration
– Monitoring/ Reporting
– Location
– Intruder detection
WLC (Wireless LAN Controller)
WLC (Control)
– Radio Resource Management
– Encryption
– Authentication
– Roaming
WLA (Wireless Access Point)
WLA (Access)
– Client Traffic
Enterpise Class Wi-Fi (Aerohive Networks)
Cloud-managed Mobile Networking Company
– Cloud (Public & Private),
Controller-less Wi-Fi, Routing,
VPN, Switching
– Visionary Vendor - Gartner
MQ for Wired & Wireless
LAN 2013
22/07/2014
Copyright 2014, All rights reserved 5
Branch &
Teleworker
RoutersEnterprise Wi-Fi
Cloud Services Platform
Public Partner Private
(on-premise)
Access
Switches
Firewall (L2 –L7)
– UTM level integration
– Application control
– Deep packet inspection
– 712 application signatures
User Profile
– Identity based networking
– Granular separation of users and devices
– Separate by device classification
Security
22/07/2014
Copyright 2014, All rights reserved 6
Wireless Intrusion Prevention
– Wireless DoS detection and prevention
– Rogue detection (AP and client)
– Countermeasures
– Compliance monitoring
Security
22/07/2014
Copyright 2014, All rights reserved 7
Authentication
– 802.1x with RADIUS, Active Directory, OpenLDAP
• Aerohive APs can act as RADIUS server(s) or RADIUS proxy
– Captive Web Portal (CWP) authentication
Private Pre Shared Key
– Dedicated key per user
– People know PSKs
– Secure (AES encryption)
– Flexibility of PSK with enterprise security of 802.1x
Security
22/07/2014
Copyright 2014, All rights reserved 8
Trusted vs Untrusted
Trusted Devices
– White list
• Corporate Laptops
• 802.1x
• Directory Services
Integration
Untrusted Devices
– Black list
• Non corporate
guests
22/07/2014
Copyright 2014, All rights reserved 9
Everything in between
– Shades of grey
• BYOD
• Staff owned
• Corporate Owned
personal
• Corporate Owned
shared
BYOD/ CYOD
Corporate Owned
Devices
– Choose Your Own
Device
– Tablets
– Smartphones
– Corporate owned
data
– Remote wipe
22/07/2014
Copyright 2014, All rights reserved 10
Staff Owned
Devices
– Bring Your Own
Device
– Corporate Data
– Ring fenced
– Containerised apps
Staff Owned
Devices (2)
– No corporate data
– Guest Access
Mobile Device Management (MDM)
Mobile Device Onboarding
– Configuration profiles
• Wi-Fi configuration/ keys/ certs
• Mail/ VPN
Mobile Content Management
– Secure content access
• Data Loss Prevention
Mobile Application Management
– App store front/ redirection
– Authentication enforcement
22/07/2014
Copyright 2014, All rights reserved 11
WORKSMART
Wireless Guest Access / ID Manager
Copyright 2014, All rights reserved 1222/07/2014
Guest Access
Aerohive ID Manager
– Cloud Enabled Guest Management
– Private PSKs more secure than
traditional “Starbucks” style CWP
– Key delivery options (Mail, SMS,
Printed Voucher, Twitter!)
– Kiosk Mode
22/07/2014
Copyright 2014, All rights reserved 13
Secure Guest Access in Data Centre’s
Key management
– Temporary PPSKs
– Role based key drops into specific user profile/ VLAN
– Different user profiles for different customers
– Key dies as soon as customer leaves building
22/07/2014
Copyright 2014, All rights reserved 14
Secure Separation of Guest Networks
22/07/2014
Copyright 2014, All rights reserved 15
Core Switch
Edge Switch
Access
Points
Internet
DMZ
Guest Network
separation using tunneling
Corporate Gateway
GRE Tunnel
Normal Traffic
Secure Separation of Guest Networks
22/07/2014
Copyright 2014, All rights reserved 16
DMZ
Edge DMZ
Core Switch
Edge Switch
Access
Points
Internet
Guest Network
separation using physical separation
Corporate Gateway
Dual
Ports
Normal Traffic
Guest Traffic
Independent Monitoring Network
22/07/2014
Copyright 2014, All rights reserved 17
DMZ
Edge DMZ
Core Switch
Edge Switch
Access
Points
Internet
Monitoring Network
Can be separate to Corporate Network
Corporate Gateway
Dual
Ports
Traffic via DMZ
Not under your control
WORKSMART
Wireless Power & Environmental
Copyright 2014, All rights reserved 1822/07/2014
Intelligent Vs Non-Intelligent Rack PDUs
22/07/2014
Copyright 2014, All rights reserved 19
Millions of $s
iPDU Adoption Life Cycle – varies by region
22/07/2014
Copyright 2014, All rights reserved 20
Wired Monitoring Connectivity
IP Address per device
– 5 per cabinet
– 350 cabinets = 1750 IP addresses
Proprietary Solution
– Single point of failure
– 350 cabinets = 200+ IP addresses
22/07/2014
Copyright 2014, All rights reserved 21
T1
T2
T3
IP 1
T1
T2
T3
IP 1 IP 2 IP 3 IP 5IP 4
Wireless Monitoring Connectivity
22/07/2014
Copyright 2014, All rights reserved 22
IP Address per access point
– 5 per data centre (or less)
Wireless iPDUs now available
Easy deployment of best practice
monitoring of each rack
– Temperature - top middle & bottom
– Humidity
Saves ethernet ports
– hundreds of PDUs per access point
Can be an ‘isolated’ Wi-fi network
– This one has its own ‘SSID’
Typical Wi-Fi Dongle shown
22/07/2014
Copyright 2014, All rights reserved 23
Wi-Fi Dongle
PX-IOS App PDView
Tablet based PDU management
Features:
– View PDU configuration
– See kW, VA, pF, kWh etc
– Switch outlets on and off
22/07/2014
Copyright 2014, All rights reserved 24
PDView – Per Outlet View
22/07/2014
Copyright 2014, All rights reserved 25
Control – On/Off
Per Outlet Power
Power Management Reports
22/07/2014
Copyright 2014, All rights reserved 26
Sophisticated reports via web browser
Health Map of Demo Data Centre
22/07/2014
Copyright 2014, All rights reserved 27
Tabular Reports - Bill Back Report per Customer
22/07/2014
Copyright 2014, All rights reserved 28
Tabular Reports - Load per IT Device
22/07/2014
Copyright 2014, All rights reserved 29
Tabular Reports- Rack KW per cabinet
22/07/2014
Copyright 2014, All rights reserved 30
Secure Cabinet Access Authentication System
What is SCAAS?
– Door locking application for
Cabinets and Containment
Example
– French Bank
– 3 Containments, 84 Cabinets,
174 Doors, 6 Card Readers,
72 iPDUs
22/07/2014
Copyright 2014, All rights reserved 31
Secure Cabinet Access Authentication System
SCAAS VA software
Door Control Sensor
EMKA door handle
Benefits
Connects into PX iPDUs
Can be wireless
22/07/2014
Copyright 2014, All rights reserved 32
SCAAS Features (1)
Collective Door Access Control
– Containment Doors, Cabinet Doors (front and back)
– A single ID-card reader controls a collection of doors
according to privileges of card-owner
Centralized Management of
– Operation (unlock/lock, history-log)
– Access Administration (cards, card-owners, privileges)
– Site Setup (Containment, Cabinets, Doors, etc.)
22/07/2014
Copyright 2014, All rights reserved 33
SCAAS Features (2)
Access Log
– All activity is logged: presented card, user, unlocked/locked
doors, opened/closed doors, alarms.
– Length of log is configurable
Audible Alarms
– Unlocked doors by timeout or inside containment
– Make use of iPDU buzzer
22/07/2014
Copyright 2014, All rights reserved 34
Connectivity Summary
The following functionality could potentially use 5
switch ports per rack;
– 2 x iPDU
– 3 x temperature/humidity
– 1 x access control
– 1 x web cam
This would be 300 switch ports in a 60 rack data
centre compared to 5 (or less) if wireless enabled
– Multi-use, non-proprietary, open standards
– Easily scalable
22/07/2014
Copyright 2014, All rights reserved 35
Summary
Speed of deployment
Reduced cost of deployment
No dead patch panel ports to worry about
No delays while IT services team provision a switch port
for each iPDU or environmental management appliance
Non proprietary solution – all product is based on open
standard
Up to 6,400 sensors and 2,000 metered outlets on a
single AP!
Cost of a Wi-Fi dongle circa £25
22/07/2014
Copyright 2014, All rights reserved 36
Qs on Wireless Power & Environmental?
WORKSMART
Real Time Tracking of Assets
Copyright 2014, All rights reserved 3822/07/2014
Real Time Tracking of Assets within the DC
RTLS - Real Time Location Solution
Uses same wireless infrastructure – not zigbee or 433.92MHz
Tracking where people go (security/alerting)
Lone-worker safety (man down)
Asset Tracking & Sensors (locating equipment)
22/07/2014
Copyright 2014, All rights reserved 39
Asset tags:
Wearable tags:Staff badge/pager:
Temp/RH sensors:
Tracking Personnel in the DC
22/07/2014
Copyright 2014, All rights reserved 40
 A complete Wi-Fi-based Real Time Location System
for tracking the location and status of assets, inventory
and people.
Ekahau Applications
Ekahau RTLS Controller
Ekahau Wi-Fi Tags
Ekahau Site Survey
Asset tags:
Wearable tags:Staff badge/pager:
Temp/RH sensors:
Location beacons:
Staff Safety and Alarm Escalation
22/07/2014
Copyright 2014, All rights reserved 41
SOS key
Man-down
SOS
Alert with detail location
Send email,
Screen popup
Send alerts to local staff,
remotely open doors.
reposition video cameras etc
Patented RSSI Modeling Approach for Indoor Positioning
1. Patented, probabilistic
multi-hypothesis tracking
algorithms enable the
industry’s leading
location accuracy and
reliability
2. RF characteristics such as
multi-path reflections are
recorded during the site
calibration.
3. Calibration data is stored
in the location server
4. Based on the calibration
data and the information
received from the
tag/client, the server
software calculates the
real-time location
Ekahau RTLS - Technology
WLAN Best Practice
• Physical design of the WLAN and placement of access points plays a critical role in RTLS
accuracy
• RTLS accuracy relies on ‘Location Coverage’, a combination of access point density and
placement, signal quality, and signal differentiation.
• Triangulation is important
• Access points (green circles), placed every 50 to 75 feet around the edge, as well as
centre of building
Airmagnet WLAN Survey
Passive Survey Active Survey
22/07/2014
Copyright 2014, All rights reserved 44
WORKSMART
Working at the Rack
Copyright 2014, All rights reserved 4522/07/2014
Mobile Devices & DCIM software
WLAN enables tablets, laptops and mobiles installed with
DCIM apps to update at the rack
22/07/2014
Copyright 2014, All rights reserved 46
Mobile Devices & DCIM software
Speeding up the auditing and importing of data
Manage change control by issuing work orders directly to mobile devices
Making it easier to maintain accurate records including photographs
22/07/2014
Copyright 2014, All rights reserved 47
WORKSMART
Summary
Copyright 2014, All rights reserved 4822/07/2014
Contact – www.ait-pg.co.uk
tel: 0845 293 2790
email: customer.services@ait-pg.co.uk
How Enterprise WLAN enables Best Practise!
Reduce the cost, and speed up the time, of deploying iPDUs,
sensors, access control, asset tracking and DCIM software.
Use 90% less switch ports then wired networks saving costs
and reducing dependency on corporate IT teams
An open 802.11 infrastructure will support mobile computing,
as well as monitoring and management applications which
means you no longer have to depend on multiple proprietary
point solutions.
AIT have the expertise to convince your IT teams that security
is no longer a valid objection to implementing a WLAN in a
data centre.
22/07/2014
Copyright 2014, All rights reserved 49

More Related Content

What's hot

Blaze automation profile home automation
Blaze automation profile home automation Blaze automation profile home automation
Blaze automation profile home automation Blaze_Hyd
 
The Role of RFID in the Identification of Things (IoT) - November 15, 2017 ID...
The Role of RFID in the Identification of Things (IoT) - November 15, 2017 ID...The Role of RFID in the Identification of Things (IoT) - November 15, 2017 ID...
The Role of RFID in the Identification of Things (IoT) - November 15, 2017 ID...Laura Stiff
 
Home automation - SMART HOME
Home automation - SMART HOME Home automation - SMART HOME
Home automation - SMART HOME Ankur Mehra
 
How to control your Smart Appliances (and why) with JEMMA & Arduino Yùn
How to control your Smart Appliances (and why) with JEMMA & Arduino YùnHow to control your Smart Appliances (and why) with JEMMA & Arduino Yùn
How to control your Smart Appliances (and why) with JEMMA & Arduino Yùnric_iot
 
Smart Homes: becoming a reality
Smart Homes: becoming a realitySmart Homes: becoming a reality
Smart Homes: becoming a realityJeffrey Funk
 
Graduation Project Documentation.PDF
Graduation Project Documentation.PDFGraduation Project Documentation.PDF
Graduation Project Documentation.PDFMostafa Elhoushi
 
Smart Home Automation - An Overview
Smart Home Automation - An OverviewSmart Home Automation - An Overview
Smart Home Automation - An OverviewSmart Automation
 
Wulian smart home catalog 2014
Wulian smart home catalog 2014Wulian smart home catalog 2014
Wulian smart home catalog 2014Wulian Smart Home
 
Wulian Smart Home Products Catalog
Wulian Smart Home Products CatalogWulian Smart Home Products Catalog
Wulian Smart Home Products CatalogWulian Smart Home
 
Life going beyond the smart home
Life going beyond the smart homeLife going beyond the smart home
Life going beyond the smart homeCOMPUTEX TAIPEI
 
Track 2 session 7 - st dev con 2016 - witricity - wireless power revolution...
Track 2   session 7 - st dev con 2016 - witricity - wireless power revolution...Track 2   session 7 - st dev con 2016 - witricity - wireless power revolution...
Track 2 session 7 - st dev con 2016 - witricity - wireless power revolution...ST_World
 
Archos Android based connected home solution - DroidCon Paris 2014
Archos Android based connected home solution - DroidCon Paris 2014Archos Android based connected home solution - DroidCon Paris 2014
Archos Android based connected home solution - DroidCon Paris 2014Paris Android User Group
 
Venture through Internet of Things
Venture through Internet of ThingsVenture through Internet of Things
Venture through Internet of ThingsDarren Tang
 
Track rf link access control
Track rf link   access controlTrack rf link   access control
Track rf link access controltrfl
 
Smart house (Move to Easy Life)
Smart house (Move to Easy Life)Smart house (Move to Easy Life)
Smart house (Move to Easy Life)chirag thakkar
 
Smart home and internet of things transformation of the existing concept of a...
Smart home and internet of things transformation of the existing concept of a...Smart home and internet of things transformation of the existing concept of a...
Smart home and internet of things transformation of the existing concept of a...iRidiumMobile365
 
Graduation Project on "SMART HOMES & RENEWABLE ENERGY" PowerPoint Presentation
Graduation Project on "SMART HOMES & RENEWABLE ENERGY" PowerPoint PresentationGraduation Project on "SMART HOMES & RENEWABLE ENERGY" PowerPoint Presentation
Graduation Project on "SMART HOMES & RENEWABLE ENERGY" PowerPoint PresentationAhmed Khalil Ibrahim
 
Telecommunications in the logistic sector lodz
Telecommunications in the logistic sector lodzTelecommunications in the logistic sector lodz
Telecommunications in the logistic sector lodzJustino Lourenço
 
Srr automation smart home presentation
Srr automation smart home presentationSrr automation smart home presentation
Srr automation smart home presentationVijaykumar swaminathan
 

What's hot (20)

Blaze automation profile home automation
Blaze automation profile home automation Blaze automation profile home automation
Blaze automation profile home automation
 
The Role of RFID in the Identification of Things (IoT) - November 15, 2017 ID...
The Role of RFID in the Identification of Things (IoT) - November 15, 2017 ID...The Role of RFID in the Identification of Things (IoT) - November 15, 2017 ID...
The Role of RFID in the Identification of Things (IoT) - November 15, 2017 ID...
 
Home automation - SMART HOME
Home automation - SMART HOME Home automation - SMART HOME
Home automation - SMART HOME
 
How to control your Smart Appliances (and why) with JEMMA & Arduino Yùn
How to control your Smart Appliances (and why) with JEMMA & Arduino YùnHow to control your Smart Appliances (and why) with JEMMA & Arduino Yùn
How to control your Smart Appliances (and why) with JEMMA & Arduino Yùn
 
Smart Homes: becoming a reality
Smart Homes: becoming a realitySmart Homes: becoming a reality
Smart Homes: becoming a reality
 
The Design of Smart Home
The Design of Smart HomeThe Design of Smart Home
The Design of Smart Home
 
Graduation Project Documentation.PDF
Graduation Project Documentation.PDFGraduation Project Documentation.PDF
Graduation Project Documentation.PDF
 
Smart Home Automation - An Overview
Smart Home Automation - An OverviewSmart Home Automation - An Overview
Smart Home Automation - An Overview
 
Wulian smart home catalog 2014
Wulian smart home catalog 2014Wulian smart home catalog 2014
Wulian smart home catalog 2014
 
Wulian Smart Home Products Catalog
Wulian Smart Home Products CatalogWulian Smart Home Products Catalog
Wulian Smart Home Products Catalog
 
Life going beyond the smart home
Life going beyond the smart homeLife going beyond the smart home
Life going beyond the smart home
 
Track 2 session 7 - st dev con 2016 - witricity - wireless power revolution...
Track 2   session 7 - st dev con 2016 - witricity - wireless power revolution...Track 2   session 7 - st dev con 2016 - witricity - wireless power revolution...
Track 2 session 7 - st dev con 2016 - witricity - wireless power revolution...
 
Archos Android based connected home solution - DroidCon Paris 2014
Archos Android based connected home solution - DroidCon Paris 2014Archos Android based connected home solution - DroidCon Paris 2014
Archos Android based connected home solution - DroidCon Paris 2014
 
Venture through Internet of Things
Venture through Internet of ThingsVenture through Internet of Things
Venture through Internet of Things
 
Track rf link access control
Track rf link   access controlTrack rf link   access control
Track rf link access control
 
Smart house (Move to Easy Life)
Smart house (Move to Easy Life)Smart house (Move to Easy Life)
Smart house (Move to Easy Life)
 
Smart home and internet of things transformation of the existing concept of a...
Smart home and internet of things transformation of the existing concept of a...Smart home and internet of things transformation of the existing concept of a...
Smart home and internet of things transformation of the existing concept of a...
 
Graduation Project on "SMART HOMES & RENEWABLE ENERGY" PowerPoint Presentation
Graduation Project on "SMART HOMES & RENEWABLE ENERGY" PowerPoint PresentationGraduation Project on "SMART HOMES & RENEWABLE ENERGY" PowerPoint Presentation
Graduation Project on "SMART HOMES & RENEWABLE ENERGY" PowerPoint Presentation
 
Telecommunications in the logistic sector lodz
Telecommunications in the logistic sector lodzTelecommunications in the logistic sector lodz
Telecommunications in the logistic sector lodz
 
Srr automation smart home presentation
Srr automation smart home presentationSrr automation smart home presentation
Srr automation smart home presentation
 

Similar to Wireless In The Data Centre Presentation

Neudesic IoT HIMSS Healthcare
Neudesic IoT HIMSS HealthcareNeudesic IoT HIMSS Healthcare
Neudesic IoT HIMSS HealthcareMike Rossi
 
[CLASS 2014] Palestra Técnica - Ilan Barda
[CLASS 2014] Palestra Técnica - Ilan Barda[CLASS 2014] Palestra Técnica - Ilan Barda
[CLASS 2014] Palestra Técnica - Ilan BardaTI Safe
 
2012 Moxa Brazil Channel Partner's Workshop_Industrial Ethernet Solution_0424...
2012 Moxa Brazil Channel Partner's Workshop_Industrial Ethernet Solution_0424...2012 Moxa Brazil Channel Partner's Workshop_Industrial Ethernet Solution_0424...
2012 Moxa Brazil Channel Partner's Workshop_Industrial Ethernet Solution_0424...Eric Lo
 
Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1
Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1
Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1usman sarwar
 
Blueprint for creating a Secure IoT Product
Blueprint for creating a Secure IoT ProductBlueprint for creating a Secure IoT Product
Blueprint for creating a Secure IoT ProductGuy Vinograd ☁
 
New use cases thanks to adding crypto to RFID tags
New use cases thanks to adding crypto to RFID tagsNew use cases thanks to adding crypto to RFID tags
New use cases thanks to adding crypto to RFID tagsIhar Bayarenka
 
KazooCon 2014 - Range Networks, the Future of Mobile
KazooCon 2014 - Range Networks, the Future of Mobile KazooCon 2014 - Range Networks, the Future of Mobile
KazooCon 2014 - Range Networks, the Future of Mobile 2600Hz
 
A Comprehensive Guide to Acquire Information on 4G Router
A Comprehensive Guide to Acquire Information on 4G RouterA Comprehensive Guide to Acquire Information on 4G Router
A Comprehensive Guide to Acquire Information on 4G RouterE-Lins Technology Co. Ltd.
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...Community Protection Forum
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEurotech
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Eurotech
 
Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Real-Time Innovations (RTI)
 
Endüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriEndüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriElmarkPlusTurkiye
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Digital Bond
 
Nio100 product guide 20150520
Nio100 product guide 20150520Nio100 product guide 20150520
Nio100 product guide 20150520和得 王
 
Enabling embedded security for the Internet of Things
Enabling embedded security for the Internet of ThingsEnabling embedded security for the Internet of Things
Enabling embedded security for the Internet of Thingsteam-WIBU
 

Similar to Wireless In The Data Centre Presentation (20)

Neudesic IoT HIMSS Healthcare
Neudesic IoT HIMSS HealthcareNeudesic IoT HIMSS Healthcare
Neudesic IoT HIMSS Healthcare
 
[CLASS 2014] Palestra Técnica - Ilan Barda
[CLASS 2014] Palestra Técnica - Ilan Barda[CLASS 2014] Palestra Técnica - Ilan Barda
[CLASS 2014] Palestra Técnica - Ilan Barda
 
2012 Moxa Brazil Channel Partner's Workshop_Industrial Ethernet Solution_0424...
2012 Moxa Brazil Channel Partner's Workshop_Industrial Ethernet Solution_0424...2012 Moxa Brazil Channel Partner's Workshop_Industrial Ethernet Solution_0424...
2012 Moxa Brazil Channel Partner's Workshop_Industrial Ethernet Solution_0424...
 
Logitor new-11-10-2010
Logitor new-11-10-2010Logitor new-11-10-2010
Logitor new-11-10-2010
 
Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1
Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1
Architecting IoT by Mathew - Alcatel Lucent @ MIMOS IoT TWG Day1
 
Blueprint for creating a Secure IoT Product
Blueprint for creating a Secure IoT ProductBlueprint for creating a Secure IoT Product
Blueprint for creating a Secure IoT Product
 
New use cases thanks to adding crypto to RFID tags
New use cases thanks to adding crypto to RFID tagsNew use cases thanks to adding crypto to RFID tags
New use cases thanks to adding crypto to RFID tags
 
Envision - An Overview of Solutions & Services
Envision - An Overview of Solutions & ServicesEnvision - An Overview of Solutions & Services
Envision - An Overview of Solutions & Services
 
Envision Solution & Services Overview
Envision Solution & Services Overview Envision Solution & Services Overview
Envision Solution & Services Overview
 
KazooCon 2014 - Range Networks, the Future of Mobile
KazooCon 2014 - Range Networks, the Future of Mobile KazooCon 2014 - Range Networks, the Future of Mobile
KazooCon 2014 - Range Networks, the Future of Mobile
 
A Comprehensive Guide to Acquire Information on 4G Router
A Comprehensive Guide to Acquire Information on 4G RouterA Comprehensive Guide to Acquire Information on 4G Router
A Comprehensive Guide to Acquire Information on 4G Router
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT Solutions
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
 
Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)
 
Endüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriEndüstriyel Router Çözümleri
Endüstriyel Router Çözümleri
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security
 
Nio100 product guide 20150520
Nio100 product guide 20150520Nio100 product guide 20150520
Nio100 product guide 20150520
 
2012 ah emea advanced mobility design
2012 ah emea   advanced mobility design2012 ah emea   advanced mobility design
2012 ah emea advanced mobility design
 
Enabling embedded security for the Internet of Things
Enabling embedded security for the Internet of ThingsEnabling embedded security for the Internet of Things
Enabling embedded security for the Internet of Things
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Wireless In The Data Centre Presentation

  • 1. WORKSMART Wireless in the Data Centre “Decoding the Spin” Seminar 16th July 2014 – FINAL 3 Copyright 2014, All rights reserved 122/07/2014
  • 2. WORKSMART Enterprise Class Wi-Fi Copyright 2014, All rights reserved 222/07/2014
  • 3. Enterprise WLAN Development 22/07/2014 Copyright 2014, All rights reserved 3 WLM (Wireless LAN Management) WLC (Wireless LAN Controller) WLA (Wireless Access Point) WLA/ WLM (at edge) WLA/ WLM (at edge switch)
  • 4. Enterprise WLAN Components 22/07/2014 Copyright 2014, All rights reserved 4 WLM (Wireless LAN Management) WLM (Management) – Configuration – Monitoring/ Reporting – Location – Intruder detection WLC (Wireless LAN Controller) WLC (Control) – Radio Resource Management – Encryption – Authentication – Roaming WLA (Wireless Access Point) WLA (Access) – Client Traffic
  • 5. Enterpise Class Wi-Fi (Aerohive Networks) Cloud-managed Mobile Networking Company – Cloud (Public & Private), Controller-less Wi-Fi, Routing, VPN, Switching – Visionary Vendor - Gartner MQ for Wired & Wireless LAN 2013 22/07/2014 Copyright 2014, All rights reserved 5 Branch & Teleworker RoutersEnterprise Wi-Fi Cloud Services Platform Public Partner Private (on-premise) Access Switches
  • 6. Firewall (L2 –L7) – UTM level integration – Application control – Deep packet inspection – 712 application signatures User Profile – Identity based networking – Granular separation of users and devices – Separate by device classification Security 22/07/2014 Copyright 2014, All rights reserved 6
  • 7. Wireless Intrusion Prevention – Wireless DoS detection and prevention – Rogue detection (AP and client) – Countermeasures – Compliance monitoring Security 22/07/2014 Copyright 2014, All rights reserved 7
  • 8. Authentication – 802.1x with RADIUS, Active Directory, OpenLDAP • Aerohive APs can act as RADIUS server(s) or RADIUS proxy – Captive Web Portal (CWP) authentication Private Pre Shared Key – Dedicated key per user – People know PSKs – Secure (AES encryption) – Flexibility of PSK with enterprise security of 802.1x Security 22/07/2014 Copyright 2014, All rights reserved 8
  • 9. Trusted vs Untrusted Trusted Devices – White list • Corporate Laptops • 802.1x • Directory Services Integration Untrusted Devices – Black list • Non corporate guests 22/07/2014 Copyright 2014, All rights reserved 9 Everything in between – Shades of grey • BYOD • Staff owned • Corporate Owned personal • Corporate Owned shared
  • 10. BYOD/ CYOD Corporate Owned Devices – Choose Your Own Device – Tablets – Smartphones – Corporate owned data – Remote wipe 22/07/2014 Copyright 2014, All rights reserved 10 Staff Owned Devices – Bring Your Own Device – Corporate Data – Ring fenced – Containerised apps Staff Owned Devices (2) – No corporate data – Guest Access
  • 11. Mobile Device Management (MDM) Mobile Device Onboarding – Configuration profiles • Wi-Fi configuration/ keys/ certs • Mail/ VPN Mobile Content Management – Secure content access • Data Loss Prevention Mobile Application Management – App store front/ redirection – Authentication enforcement 22/07/2014 Copyright 2014, All rights reserved 11
  • 12. WORKSMART Wireless Guest Access / ID Manager Copyright 2014, All rights reserved 1222/07/2014
  • 13. Guest Access Aerohive ID Manager – Cloud Enabled Guest Management – Private PSKs more secure than traditional “Starbucks” style CWP – Key delivery options (Mail, SMS, Printed Voucher, Twitter!) – Kiosk Mode 22/07/2014 Copyright 2014, All rights reserved 13
  • 14. Secure Guest Access in Data Centre’s Key management – Temporary PPSKs – Role based key drops into specific user profile/ VLAN – Different user profiles for different customers – Key dies as soon as customer leaves building 22/07/2014 Copyright 2014, All rights reserved 14
  • 15. Secure Separation of Guest Networks 22/07/2014 Copyright 2014, All rights reserved 15 Core Switch Edge Switch Access Points Internet DMZ Guest Network separation using tunneling Corporate Gateway GRE Tunnel Normal Traffic
  • 16. Secure Separation of Guest Networks 22/07/2014 Copyright 2014, All rights reserved 16 DMZ Edge DMZ Core Switch Edge Switch Access Points Internet Guest Network separation using physical separation Corporate Gateway Dual Ports Normal Traffic Guest Traffic
  • 17. Independent Monitoring Network 22/07/2014 Copyright 2014, All rights reserved 17 DMZ Edge DMZ Core Switch Edge Switch Access Points Internet Monitoring Network Can be separate to Corporate Network Corporate Gateway Dual Ports Traffic via DMZ Not under your control
  • 18. WORKSMART Wireless Power & Environmental Copyright 2014, All rights reserved 1822/07/2014
  • 19. Intelligent Vs Non-Intelligent Rack PDUs 22/07/2014 Copyright 2014, All rights reserved 19 Millions of $s
  • 20. iPDU Adoption Life Cycle – varies by region 22/07/2014 Copyright 2014, All rights reserved 20
  • 21. Wired Monitoring Connectivity IP Address per device – 5 per cabinet – 350 cabinets = 1750 IP addresses Proprietary Solution – Single point of failure – 350 cabinets = 200+ IP addresses 22/07/2014 Copyright 2014, All rights reserved 21 T1 T2 T3 IP 1 T1 T2 T3 IP 1 IP 2 IP 3 IP 5IP 4
  • 22. Wireless Monitoring Connectivity 22/07/2014 Copyright 2014, All rights reserved 22 IP Address per access point – 5 per data centre (or less)
  • 23. Wireless iPDUs now available Easy deployment of best practice monitoring of each rack – Temperature - top middle & bottom – Humidity Saves ethernet ports – hundreds of PDUs per access point Can be an ‘isolated’ Wi-fi network – This one has its own ‘SSID’ Typical Wi-Fi Dongle shown 22/07/2014 Copyright 2014, All rights reserved 23 Wi-Fi Dongle
  • 24. PX-IOS App PDView Tablet based PDU management Features: – View PDU configuration – See kW, VA, pF, kWh etc – Switch outlets on and off 22/07/2014 Copyright 2014, All rights reserved 24
  • 25. PDView – Per Outlet View 22/07/2014 Copyright 2014, All rights reserved 25 Control – On/Off Per Outlet Power
  • 26. Power Management Reports 22/07/2014 Copyright 2014, All rights reserved 26 Sophisticated reports via web browser
  • 27. Health Map of Demo Data Centre 22/07/2014 Copyright 2014, All rights reserved 27
  • 28. Tabular Reports - Bill Back Report per Customer 22/07/2014 Copyright 2014, All rights reserved 28
  • 29. Tabular Reports - Load per IT Device 22/07/2014 Copyright 2014, All rights reserved 29
  • 30. Tabular Reports- Rack KW per cabinet 22/07/2014 Copyright 2014, All rights reserved 30
  • 31. Secure Cabinet Access Authentication System What is SCAAS? – Door locking application for Cabinets and Containment Example – French Bank – 3 Containments, 84 Cabinets, 174 Doors, 6 Card Readers, 72 iPDUs 22/07/2014 Copyright 2014, All rights reserved 31
  • 32. Secure Cabinet Access Authentication System SCAAS VA software Door Control Sensor EMKA door handle Benefits Connects into PX iPDUs Can be wireless 22/07/2014 Copyright 2014, All rights reserved 32
  • 33. SCAAS Features (1) Collective Door Access Control – Containment Doors, Cabinet Doors (front and back) – A single ID-card reader controls a collection of doors according to privileges of card-owner Centralized Management of – Operation (unlock/lock, history-log) – Access Administration (cards, card-owners, privileges) – Site Setup (Containment, Cabinets, Doors, etc.) 22/07/2014 Copyright 2014, All rights reserved 33
  • 34. SCAAS Features (2) Access Log – All activity is logged: presented card, user, unlocked/locked doors, opened/closed doors, alarms. – Length of log is configurable Audible Alarms – Unlocked doors by timeout or inside containment – Make use of iPDU buzzer 22/07/2014 Copyright 2014, All rights reserved 34
  • 35. Connectivity Summary The following functionality could potentially use 5 switch ports per rack; – 2 x iPDU – 3 x temperature/humidity – 1 x access control – 1 x web cam This would be 300 switch ports in a 60 rack data centre compared to 5 (or less) if wireless enabled – Multi-use, non-proprietary, open standards – Easily scalable 22/07/2014 Copyright 2014, All rights reserved 35
  • 36. Summary Speed of deployment Reduced cost of deployment No dead patch panel ports to worry about No delays while IT services team provision a switch port for each iPDU or environmental management appliance Non proprietary solution – all product is based on open standard Up to 6,400 sensors and 2,000 metered outlets on a single AP! Cost of a Wi-Fi dongle circa £25 22/07/2014 Copyright 2014, All rights reserved 36
  • 37. Qs on Wireless Power & Environmental?
  • 38. WORKSMART Real Time Tracking of Assets Copyright 2014, All rights reserved 3822/07/2014
  • 39. Real Time Tracking of Assets within the DC RTLS - Real Time Location Solution Uses same wireless infrastructure – not zigbee or 433.92MHz Tracking where people go (security/alerting) Lone-worker safety (man down) Asset Tracking & Sensors (locating equipment) 22/07/2014 Copyright 2014, All rights reserved 39 Asset tags: Wearable tags:Staff badge/pager: Temp/RH sensors:
  • 40. Tracking Personnel in the DC 22/07/2014 Copyright 2014, All rights reserved 40  A complete Wi-Fi-based Real Time Location System for tracking the location and status of assets, inventory and people. Ekahau Applications Ekahau RTLS Controller Ekahau Wi-Fi Tags Ekahau Site Survey Asset tags: Wearable tags:Staff badge/pager: Temp/RH sensors: Location beacons:
  • 41. Staff Safety and Alarm Escalation 22/07/2014 Copyright 2014, All rights reserved 41 SOS key Man-down SOS Alert with detail location Send email, Screen popup Send alerts to local staff, remotely open doors. reposition video cameras etc
  • 42. Patented RSSI Modeling Approach for Indoor Positioning 1. Patented, probabilistic multi-hypothesis tracking algorithms enable the industry’s leading location accuracy and reliability 2. RF characteristics such as multi-path reflections are recorded during the site calibration. 3. Calibration data is stored in the location server 4. Based on the calibration data and the information received from the tag/client, the server software calculates the real-time location Ekahau RTLS - Technology
  • 43. WLAN Best Practice • Physical design of the WLAN and placement of access points plays a critical role in RTLS accuracy • RTLS accuracy relies on ‘Location Coverage’, a combination of access point density and placement, signal quality, and signal differentiation. • Triangulation is important • Access points (green circles), placed every 50 to 75 feet around the edge, as well as centre of building
  • 44. Airmagnet WLAN Survey Passive Survey Active Survey 22/07/2014 Copyright 2014, All rights reserved 44
  • 45. WORKSMART Working at the Rack Copyright 2014, All rights reserved 4522/07/2014
  • 46. Mobile Devices & DCIM software WLAN enables tablets, laptops and mobiles installed with DCIM apps to update at the rack 22/07/2014 Copyright 2014, All rights reserved 46
  • 47. Mobile Devices & DCIM software Speeding up the auditing and importing of data Manage change control by issuing work orders directly to mobile devices Making it easier to maintain accurate records including photographs 22/07/2014 Copyright 2014, All rights reserved 47
  • 48. WORKSMART Summary Copyright 2014, All rights reserved 4822/07/2014 Contact – www.ait-pg.co.uk tel: 0845 293 2790 email: customer.services@ait-pg.co.uk
  • 49. How Enterprise WLAN enables Best Practise! Reduce the cost, and speed up the time, of deploying iPDUs, sensors, access control, asset tracking and DCIM software. Use 90% less switch ports then wired networks saving costs and reducing dependency on corporate IT teams An open 802.11 infrastructure will support mobile computing, as well as monitoring and management applications which means you no longer have to depend on multiple proprietary point solutions. AIT have the expertise to convince your IT teams that security is no longer a valid objection to implementing a WLAN in a data centre. 22/07/2014 Copyright 2014, All rights reserved 49