Cisco Blogs


Cisco Blog > Mobility

Cisco Live San Diego Mobility Events 2015

Welcome to Cisco Live San Diego 2015!

We are excited to showcase our Enterprise Mobility booth, announcements and events at #CLUS. This page is a resource page to help you in planning for all of the exciting Mobility activities at Cisco Live San Diego. Feel free to bookmark this page and come back to learn about all of the latest news at the event.

General Information

Cisco Live is Cisco’s premier education and training destination for IT professionals worldwide. Mark your calendar for Cisco Live 2015, June 7 – 11 in San Diego. Visit the Enterprise Mobility booth to learn more about new products, announcements, demos, sessions and win prizes!

 

Venue Information: San Diego Convention Center
111 West Harbor Drive, San Diego, CA 92101
(619) 525-5000

speaking sessions

Featured Sessions (and other sessions visit here)

Monday, June 8

Innovation Talk: Future of the Network (with CMX live demo) – Rob Soderbery, 1:00-2:00pm PT

PSO Session: 3-Steps to Creating an Effective Mobility Strategy – Prashanth Shenoy, 8:30-9:30am PT

Tuesday, June 9

Booth Theatre Session: Developing an Enterprise Mobility Strategy – Raakhee Mistry, 3:15-3:30pm PT

Wednesday, June 10

Booth Theatre Session: Prepare for the Next Wave of Mobility (.11ac Wave 2 Innovations) – Bill Rubino, 11:30-11:45am PT

PSO Session: Customer Experience – The New Competitive Battleground – George Wilson, Stephen Smith 1:00–2:00 pm PT

Thursday, June 11

PSO Session: CMX: The Latest in Location Innovations and Analytics – Jagdish Girimaji, 8-9am PT

Booth Theatre Session: Engage Your Customers With Connected Mobile Experiences – Jolene Tam, 1:30-1:45pm PT

Technical Sessions

Read More »

Tags: , , , , , , , , , , ,

Building the Foundation for the Next Wave in Mobility

We’ve come a long way since the first mobile devices hit the network. Our use of these devices has evolved beyond basic tasks such as checking email. They help us collaborate in real-time, stay healthy, directly connect with our favorite things, and even find true love.

Today, mobility is driving the future of digitization.

As mobility continues to permeate many facets of life, there will be a landslide of new connected devices beyond the smartphone and tablet — think wearables, sensors, and other “things” that we have yet to imagine. And with them, there will be an increased demand for speed and bandwidth from the network.

 

So how does IT prepare for the next wave in mobility? At Read More »

Tags: , , , ,

Enhancing HDX: Improved Mitigation of Wi-Fi Interference through Wi-Fi-Triggered Event-Driven Radio Resource Management (ED-RRM)

Cisco Systems is announcing a new set of features that enhance its HDX (High Density Experience) suite. This blog is the fourth in a series that explains the new features that comprise the enhancements to HDX.

The first three blogs in the Enhancing HDX series are here and here and here.

The rapid and massive adoption of Wi-Fi into handheld devices has created new challenges for managing a wireless network.

As a consequence, the traditional view of a rogue Access Point has to change. The advent of mobile APs and Wi-Fi Direct (client to client networking without requiring infrastructure) means that rogue devices don’t need to be “connected” to the infrastructure in order to create a potential for nuisance.

Effectively these capabilities mean that “Bring Your Own Device” (BYOD) may also mean “Bring Your Own AP” or “Bring Your Own Network” and therefore “Bring Your Own Interferer”. Thus the threat from a rogue becomes less about security and more about consuming excessive air time (a so-called “spectrum hog”) thus degrading performance in the WLAN. This can be especially troublesome in high density pubic venues but can also be problematic in enterprises.

So in addition to Cisco CleanAir (which mitigates and reports on non Wi-Fi interference) and RRM (which primarily prevents self induced neighboring AP interference via DCA and TPC for the entire WLAN) Cisco is effectively merging aspects of both of these solutions in order to provide improved mitigation of Wi-Fi that is not affiliated with the production WLAN.

Enhancing HDX 1

Accounting for rogue Wi-Fi interference is accomplished by configuring a trigger threshold for ED-RRM. This is effectively a severity indicator so that the affected access point that has ED-RRM is additionally triggered by Wi-Fi interference.

Enhancing HDX2

Since rogue severity is now added to the ED-RRM metrics, this provides the capability of a faster channel change than the typical DCA cycle. In other words, if a rogue is interfering with airspace, then instead of waiting until the next DCA cycle to elapse, change the channel as quickly as possible. This is the same behavior as for mitigating non-Wi-Fi interferers with Cisco CleanAir technology.

Since Wi-Fi interference is becoming more prevalent, rogue APs that are serving traffic to clients (e.g., mobile APs) or client devices creating networks in real time means that air quality will be affected. Wi-Fi needs to be prevented from becoming a problem by reacting to the presence of client devices that are legitimately acting as independent, unaffiliated networks.

 

Please feel free to comment, share and connect with us on Facebook, Google+ and @Cisco_Mobility!

Tags: , , , , , , , ,

Mitigating Wireless Threats with Cisco Adaptive WIPS

Controlling the wireless network can some times feel like trying to stop a river.  Employees, customers and vendors have their favored mobile devices and they want to be able to use them for work and play. The momentum for this trend is strong and the promise of productivity high so it’s becoming increasingly difficult to fight this trend. As a result, companies are opening their network to guest traffic.

As you well know, this new openness isn’t without risk. The devices that people bring may not always be productive. And sometimes those devices become rogues that can impact network performance and security.

Let’s be clear that not all rogue devices have evil in mind. In fact, many employees innocently bring their own IP cameras and personal hotspots to “help expand” the capabilities of the network. At a minimum, these rogue devices can cause interference that degrades overall network performance or prohibits critical devices from connecting to the network.

The greater danger is that these rogue devices are the weak link that enables a hacker to breach network security. A hacker can tag onto a tethered personal hot spot for easy entry into the network or can sit outside the venue to gain access.

Whatever the intent of the rogue device, it’s critical that you have a solution that leverages location information to identify and mitigate these rogue devices before they compromise your network.

mitigating wireless 1

Omaha World-Herald, one of Warren Buffet’s Berkshire Hathaway companies, uses the location capabilities of Cisco Mobility Services Engine (MSE) to ensure rogue devices don’t derail its many offices. Using Cisco’s location and adaptive WIPS capabilities, Omaha World detects rogue devices in real time, determines their location, and mitigates the threat. Read More »

Tags: , , , , , ,

Enhancing HDX: Optimized Roaming extended with 11v BSS Transition Management

Cisco Systems is announcing a new set of features that enhance its HDX (High Density Experience) suite. This blog is the third in a series that explains the new features that comprise the enhancements to HDX.

The first blog in the Enhancing HDX series is here. The second blog in the Enhancing HDX series is here.

What is 802.11v? What is BSS Transition Management? Why are these Important?

In this blog, two different series are intersecting: Enhancing HDX and the series looking at the lesser known but undeservedly underappreciated amendments to 802.11 and the features/benefits they provide.

Previous blogs briefly explained the basics of 802.11k “WLAN Radio Measurements” and specifically zoomed in on the Neighbor Request/Report and also explained the basics of 802.11r “Fast BSS Transition”

This blog will briefly explain the basics of 802.11v “Wireless Network Management” and will also explain how 802.11k Neighbor Request/Report and 802.11r “Fast BSS Transition” can provide a “better together” solution with 802.11v. It also explains where it fits in with High Density Experience (HDX).

Wireless Network Management (802.11v)

Wireless network management (WNM) enables devices comprising the WLAN to exchange information with the goal of improving the quality of experience when using the WLAN. Network administrators benefit from using WNM by having additional ability to fine tune the WLAN in order to provide improved reliability of services to their end users and the end users benefit in turn from using a WLAN that has been designed to provide more than mere connectivity.

Client devices and infrastructure may both use WNM to exchange operational information so that both clients and infrastructure have additional awareness of the WLAN conditions. That awareness can help provide a firm foundation for self-correcting events and actions to be implemented. In other words, WNM isn’t about being a “control freak”; it’s about raising the bar in the Wi-Fi ecosystem so as to create better Wi-Fi networks.

But not only does WNM provide information on the state of network conditions, it also provides a means to exchange location information, supports efficient delivery of multicast (group addressed) frames, and enables a power savings mode in which a client can sleep for longer periods of time without receiving frames or being disassociated from the AP.

Given this, it can be easily appreciated why WNM has often been described as a “kitchen sink” of features. This blog won’t take the time to go through each and every feature introduced in the 802.11v amendment. But in order to emphasize the potential richness of the feature set, the following is an alphabetized list:

HDX1

The remainder of this blog is going to focus on BSS Transition Management. Future blogs will cover other aspects of 802.11v.

BSS Transition Management Read More »

Tags: , , , , , , , , , , ,