Yesterday was a whirlwind of activity for Cisco at Mobile World Congress 2012, and a big day for our smallest networking devices.
On the heels of the past week’s 4G/LTE announcements with Magyar Telekom, LG U+ , Vodafone Hungary, Telefonica Spain, and Bell Canada, yesterday we stood with business partners Orange, and Shaw to announce a new era in the evolution of the mobile Internet: the era of the small cell.
Cisco CEO John Chambers declared “We are now entering the post-macrocell era, where small cells also will play a critical role in delivering the next-generation mobile Internet.”
Read More »
Tags: 4G, 4G LTE, Bell Canada, BT, Cisco, DT, john chambers, lg u+, magyar telekom, mobile internet, mobile video, mobility, mwc, Orange, PCCW, Service Provider, Shaw, smart, Telefonica Spain, True, V2oLTE, videoscape, vodafone hungary, wi-fi
In 97 countries around the world, there are now more mobile devices than people. No wonder mobile networks are clogged with massive amounts of new traffic! Mobile operators are struggling with how to provide the mobile broadband experience customers expect, in a cost-effective, scalable, and profitable manner. I believe that Wi-Fi, the “silent sleeper” of wireless access networks, may hold the answer.
The mobile industry is on the brink of a fundamental change. Just think of some recent key developments:
Read More »
Tags: broadband, Cisco, IBSG, integrated providers, mobile, mobile operators, service providers, Smartphones, wi-fi, Wi-Fi network providers, wireless access, wireless network
Over a billion mobile devices are online today. Just last quarter, Apple sold 52.4 million iPhones and iPads. The airwaves are humming, and there’s already traffic congestion along the mobile services highway.
The Cisco Visual Networking Index (VNI) report released on February 14, 2012 predicts that the volume of mobile data traffic will grow 18 times over by 2016. That totals 10.8 exabytes per month by 2016, nearly 11 quintillion (1018) bytes: a staggering number, five times the volume of the entire global Internet in 2005.
Will your mobile infrastructures be ready for all that traffic?
Read More »
Tags: mobile data traffic, mobile world congress, mwc, next generation internet, Service Provider, wi-fi, wifi
Last week, I took my girls to their first Stanford Women’s Basketball game, a well played game against the University of Oregon. While there, I noticed that almost every person had a smartphone out at least once during the game—and for good reason. Stanford has upped the live sport experience for spectators.
By connecting to the pavilion’s Wi-Fi network with a smartphone, you can order and pay for concession-stand food from your seat. So, you don’t have to worry about missing anything. Plus, you’re able to view replays, participate in contests to win prizes and even play mini-games.
From connected stadiums like Poland’s new National Stadium, which will host the 2012 European Football Championship, to connected cities like Songdo South Korea, Cisco is helping to dramatically improve our experiences and quality of life by capitalizing on the power of the network.
Read More »
Tags: connected sports, Poland, Songdo, Stanford, wi-fi
Not too long ago I was assigned to a troubleshooting and remediation project for a hospital here in the SF bay area. The problem, after much troubleshooting and lab recreations, was determined to be due to an unique issue with client roaming and authentication. During the course of troubleshooting my coworker and myself often found ourselves explaining 802.1X and 802.11i to others working on the troubleshooting effort, or requesting technical updates. So based on that experience, I started thinking this might a be a good topic to cover here.
Let’s review the some of typical components of the enterprise wireless security model.
What is 802.1X?
802.1X is not a protocol, but rather a framework for a “port-based” access control method. 802.1X was initially created for use in switches, hence the port-based terminology, which really doesn’t fit too well in wireless since users don’t connect to a port. In the end it’s meant to be a logical concept in the 802.11 world. 802.1X was adopted for wireless networks with the creation of 802.11i to provide authenticated access to wireless networks. At a high level. the framework allows for a client that has connected to the WLAN to remain in a blocked port status until it has been authenticated by a AAA server. Essentially the only traffic allow through this virtual blocked port is EAP traffic, things like HTTP would be dropped.
What is EAP?
EAP (Extensible Authentication Protocol) is the authentication method used by 802.1X. It can take on various forms, such as PEAP, EAP-TLS, EAP-FAST, to name a few. There is one thing to remember when determining what EAP type to use in your network, is that it is dependent upon what your client and AAA server supports. This is it, your AP or AP/Controller hardware or code version will play no part in version is supported. Unless your AP/controller is acting as the AAA server, but I’ll stay away from that in this post. I think this can be a point of confusion for people who haven’t read much or anything about EAP methods. So, if some one asks what version of EAP the AP will support, all you need to do is ask them, what does their Client and AAA server support.
What is 802.11i?
Simply put, 802.11i is an amendment to the original 802.11 standard to address the well documented security short comings of WEP. It incorporates WPA as a part of the 802.11i amendment and adds the fully approved WPA2 with AES encryption method. 802.11i introduces the concept of a Robust Security Network (RSN) with the Four-way handshake and the Group key Handshake.
Read More »
Tags: 802.11, 802.11i, 802.1x, AAA server, access point, access points, EAP, EAP-FAST, EAP-TLS, engineer, engineers, PEAP, wi-fi, wifi, wireless, wireless controller, wireless LAN, wlan, WLC