Cisco Blogs


Cisco Blog > Mobility

Cisco will ride the 802.11ac Wave2

If you recall, back in the early days of 802.11n, the Wi-Fi Alliance (WFA) rolled out the 802.11n certification program in phases.  Here we are several years later and in that same fashion, the WFA has split the IEEE 802.11ac specification into two certification phases: Wave 1 and Wave 2.

Last week we announced the availability of our 802.11ac Wave 1 Module for the 3600 Access Point and along with that, our intention to develop an 802.11ac adaptive radio module that will support the second phase of 802.11ac, or Wave 2. Most of the 802.11ac discussion in the last year has been focused on Wave 1, so we want to kick off the conversation about the second phase, Wave 2.

80211ac1
If Wave 1 promises increased wireless performance to address the increasing demand for higher performance including growing number of clients demanding higher performance for applications such as HD video streaming, then Wave 2 will stun you with its ability to provide even more throughput beyond the 1.3Gbps that Wave 1 provides as well as a number of other features that will further improve wireless connectivity. It is like taking a really good rock song and adding more cowbell to it.

SNL jokes aside, with the additional features packaged in Wave 2 comes the opportunity for further innovation in Cisco’s Wireless portfolio. We feel that it is important to stay ahead of the technology curve so that customers can plan and benefit from these advances sooner rather than later. So let’s discuss what features are coming with 802.11ac Wave 2. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , ,

Cisco Application Visibility with 3rd Party Tools

With the advent of BYOD and the proliferation of mobile applications – it’s become ever important to have visibility into your wireless network using deep packet inspection. By classifying the data flows that go through the wireless LAN, administrators now have visibility into the top users and top applications which are consuming bandwidth on their network. After analyzing this data and armed with visibility into these applications, Cisco AVC allows the administrator to then take action such as prioritize, deprioritize or block on the applications in their network.

Since Cisco has released Application Visibility and Control (AVC) for wireless -- our customers and partners have been highly interested in the technology and how it can be put to work for them.  Visibility into the applications is made possible on the controller web interface which is useful for diagnosing real-time issues or analyzing short-term application trends. The wireless LAN controller GUI is shown below depicting a network using a variety of applications as identified by AVC.

avc1 Read More »

Tags: , , , , , , , , , , , , ,

Have You Registered for the April 17th One Network Deep Dive?

Activate the IT Transformation with Cisco Unified Access” Webinar Series: Part II Network Deep Dive, April 17

Wired and Wireless

In just two days, Wednesday April 17, we will have the 2nd live broadcast of the Cisco Unified Access webinar series. We will have excellent technical content to dig deeper into the subject of “One Network”, specifically converged wired and wireless access (CLICK HERE TO REGISTER). Read More »

Tags: , , , , , , , , , , , , , , , ,

Deep Dive into Converged Wired and Wireless Access April 17

April 10, 2013 at 10:18 am PST

Last week we kicked off the first webinar of a new 5-part Cisco Unified Access webinar series. Many of you joined the event and I was very happy to see your questions and discussions during the broadcast. The event was a high level overview of industry challenges with BYOD, mobility and the Internet of Everything, as well as how Cisco Unified Access can help address these challenges with the One Policy, One Management, One Network approach.

Next week on Wednesday April 17, we will have the 2nd live broadcast of the Cisco Unified Access webinar series. We will have excellent technical content to dig deeper into the subject of “One Network”, specifically converged wired and wireless access (CLICK HERE TO REGISTER) and we will be covering a lot of technical topics such as your above questions. See more a the Borderless Blog.

Wired and Wireless

Read More »

Tags: , , , , , , , , , , , , , , , ,

Compliance versus Security

Rogue access points and unauthorized access, DDoS or penetration attacks, evil twin attacks – all mobile security issues that can keep you awake at night. But do you know the difference between compliance and enterprise security? Being compliant is not synonymous with being secure, that’s why our webcast on April 16, is focused on how to bridge the gap between PCI compliance and security to minimize the impact of an attack.

Read More »

Tags: , , , , , , , , , , , , , , , , , , , ,