White Paper Tropos Mesh OS: Foundation of the Tropos mesh network architecture
|
|
|
- Noah Henry
- 10 years ago
- Views:
Transcription
1 White Paper Tropos Mesh OS: Foundation of the Tropos mesh network architecture Tropos broadband wireless mesh networks from ABB Communication Networks provide a reliable, secure, scalable, high performance communications platform upon which customers operate one or many mission critical applications. Customers use their Tropos broadband mesh networks to communicate with mobile workers and thousands of automation devices in the field and in large industrial facilities. Tropos high performance networks have successfully been deployed by customers for over a decade in markets such as utilities, oil and gas production, mining, industrial facilities and smart cities. Tropos networks are constructed using fixed and mobile Tropos wireless mesh routers. Tropos mesh routers combine the industry s most sophisticated mesh networking intelligence, designed from the ground up to optimize throughput in a dynamic, large-scale networks, with purpose-built hardware that is ruggedized and weatherized to withstand extreme environmental conditions. Each router includes one or more open-standards-based a/b/g/n radios optimized for outdoor use. Fixed and mobile routers can be mixed on a single network to create a mesh with dynamic coverage areas. Each mesh router provides wireless connectivity to standard a/b/g/n clients and extends the coverage area of the network without the need for communications cabling. A Tropos network is organized into nodes, gateways and clients. Tropos mesh routers can be configured as either nodes or gateways. Gateways are attached to a wired network connection which injects capacity into the wireless network. Nodes operate completely wirelessly, sending and receiving packets to clients as well as forwarding them to other mesh routers. All Wi-Fi (802.11) end-devices, whether those used by consumers and business people or those employed for machine-to-machine (M2M) applications, are defined as clients. Clients can access the network through any Tropos mesh router.
2 Laptop Client Mesh router Node Ethernet Mesh router Gateway iphone Client Mesh router Node Figure 1 Tropos Mesh Network Elements M2M controller Client Each Tropos wireless mesh router includes all of the robust features of Tropos Mesh OS. Tropos Mesh OS is the foundation of the distributed, controller-free Tropos mesh network architecture. A common software platform that runs on each router across the network, Tropos Mesh OS leverages the router s onboard intelligence to monitor and maximize performance and reliability. Tropos Mesh OS Explained Tropos Mesh OS is not a separate product. Rather, it is a common software operating system that runs on each Tropos mesh router in the network. Tropos Mesh OS leverages each router s on-board intelligence to minimize network congestion and adapt on a real-time, packet-by-packet basis. This distributed approach optimizes performance and throughput by minimizing control traffic, delivers a highly scalable solution, and provides high levels of network availability. Tropos Mesh OS is the key to delivering high throughput, scalability and reliability. It is the industry s only mesh routing software that dynamically selects end-to-end paths through the mesh based on maximizing client-server throughput and minimizing latency. Tropos Mesh OS can be best understood by examining the operation and interaction of its components, as is done in following sections of this white paper. Predictive Wireless Routing Protocol (PWRP) The patented Predictive Wireless Routing Protocol (PWRP) continually analyzes the quality of active and inactive mesh links to dynamically configure the ideal combination of paths to optimize network performance. PWRP streamlines deployments and preserves performance by dynamically configuring and optimizing mesh connections. It improves overall throughput by selecting optimal routing paths while enhancing network resiliency by providing graceful rerouting of traffic in the event of RF interference, backhaul failures, or other disruptions in the wireless mesh. PWPR supports standard Wi-Fi client mobility without the need for special client hardware, software, or network 2 Tropos Mesh OS: Foundation of the Tropos mesh network architecture
3 reconfigurations, although mobility reliability and performance is enhanced when Tropos mobile mesh routers are employed. Because PWRP is a lightweight protocol, it enables the network to be scaled to thousands of nodes covering the largest geographical areas in the industry. PWRP: Auto-Discovery Using PWRP, Tropos mesh routers automatically discover one another and self-organize into a seamlessly interconnected wireless mesh network. Upon deployment, the routers automatically discover one another. Each mesh router determines the presence of both clients and other mesh routers. Once a mesh router has identified the existence of other like devices, it builds a table of neighboring devices and the corresponding paths through the network that each neighbor provides. The mesh router then identifies the optimal path to send data across the network, to a wired gateway. Optimal paths are chosen on the basis of throughput, packet success, signal-to-noise ratios, and other key criteria. Figure 2 below shows how PWRP creates a mesh network. Figure 2 Mesh Routers Self-Organize into a Totally Wireless Network As new mesh routers are added to the network, they participate in the autodiscovery process, and self-organize to become part of the network. Figure 3 shows how other routers immediately join the network. Figure 3 Additional Mesh Routers Immediately Join the Network 3 Tropos Mesh OS: Foundation of the Tropos mesh network architecture
4 A Tropos network can operate with only one wired gateway, although multiple wired backhaul connections are typically deployed to ensure redundancy and to provide increased network bandwidth to meet performance and reliability requirements. PWRP: Predictive Path Optimization PWRP selects the optimal communication paths from each router to a wired gateway. These paths are based on various metrics designed to optimize the overall end-to-end quality of the wireless path, not just distance vectors. The quality of a wireless link depends on several factors, including the distance between the transmitter and receiver, the radio transparency of any obstructions between them, interference from other radios and multi-path effects. The optimal path is determined from a variety of link quality criteria available to each mesh router, as well as the cumulative effects of each subsequent link in the path. By ensuring that only the highest quality links are selected, high performance is maintained across the entire path. The end result is a connection that experiences minimal packet loss, ensuring optimal performance in the wireless environment. Unlike the Tropos system, traditional routing methods cannot discriminate among paths with varying latency and packet loss characteristics. Instead, typical solutions choose the path with the fewest hops between the source and the destination (i.e., the shortest path). In wireless environments, the shortest path sometimes exhibits poorer performance than longer, alternate paths based on high quality links. As a result, traditional routing approaches frequently lead to sub-optimal path selections, resulting in poor end-to-end throughput. The Tropos system is intelligent enough to make those determinations and identify the path that will offer the best possible performance. The Tropos approach to determining the optimal path via predictive path optimization is illustrated in Figure 4 below. Figure 4 Optimal Path Selection 4 Tropos Mesh OS: Foundation of the Tropos mesh network architecture
5 In this example, Tropos Mesh OS would select the green path, which is the path with highest overall path quality. Note that this is not the shortest path, but rather the path that has the highest end-to-end quality, as measured by packet loss, throughput and other measures. Introducing the variable of path quality raises additional challenges. Because the wireless environment is inherently dynamic, the quality of any given link (and correspondingly, any path that utilizes that link) varies over time. The Tropos path selection algorithms intelligently refine path selection on an ongoing basis to adapt to these changes. As a result, PWRP with predictive path optimization ensures rapid response to significant environment changes and delivers high throughput over the entire network. PWRP: Adaptive Clustering ABB Communication Networks designed PWRP to be fully scalable from both a coverage and capacity perspective. Adding network capacity is as easy as connecting a backhaul link to any mesh router on the network. The newly wired mesh router then becomes a wired gateway on the network. The Tropos network seamlessly incorporates new gateways, automatically partitioning the network into clusters to intelligently distribute the additional capacity. This adaptive clustering technique allows network owners to incrementally scale network capacity in direct response to changing usage needs and traffic patterns. Importantly, network managers are not required to modify any existing network settings or topologies network reconfiguration is seamless and automatic. The effect of automatic reconfiguration when adding backhaul capacity is shown below in Figure 5. Figure 5 Automatic Reconfiguration with Added Backhaul Capacity Two additional wired gateways have been added to the network. The other mesh routers automatically identify the wired gateways and reconfigure their wireless backhaul paths to take advantage of the additional connections. In the process, the mesh routers add alternate paths to their routing tables, enabling fail-over protection in the event of a wired outage. 5 Tropos Mesh OS: Foundation of the Tropos mesh network architecture
6 PWRP: Self-Healing PWRP provides several levels of fail-over protection. For example, if a link between active nodes becomes disrupted, the mesh routers identify the problem and automatically switch to an alternative path, effectively routing round the disruption. The following diagrams illustrate the effect. In Figure 6 a link is lost due to interference. As shown in Figure 7, the optimal solution is to assign the affected node from the green cluster to the blue cluster. Tropos Mesh OS reclusters the network automatically. Figure 6 Interference Causes Transient Link Failure Figure 7 Network Reconfigures to Route Around Failure The following diagrams illustrate what happens in the case of an outage on a backhaul connection. Figure 8 shows the backhaul failure condition while Figure 9 shows the automatic network reconfiguration in response to the outage. 6 Tropos Mesh OS: Foundation of the Tropos mesh network architecture
7 Figure 8 Backhaul Failure Threatens Entire Cluster Figure 9 Automatic Reroute Around Failed Backhaul In this case, the Tropos network adapts to the outage to ensure continued connectivity for all mesh routers. Individual mesh routers automatically detect the outage and the network reorganizes around the remaining backhaul points, as shown. Full service and connectivity is maintained. All Tropos network configurations are operationally redundant and self-healing. The redundancy operates in real time and is transparent to end-points. PWRP: Multi-Radio/Multi-Mode Routing Tropos Mesh OS dynamically chooses the optimal path to maximize network performance. In deployments using dual-radio Tropos mesh routers (e.g., the Tropos 7320 or Tropos 6320), Tropos Mesh OS in every router constantly scans the radio network and characterizes the performance of every link, whether active or unused, around it. Tropos Mesh OS can be configured to use 5 GHz links for inter-router connectivity when available and to fall back to 2.4 GHz inter-router links when the 5 GHz links perform sub-optimally. In this way, Tropos Mesh OS leverages the benefits of using additional spectrum to increase capacity while eliminating the pitfalls of the 5 GHz spectrum, which often only operates acceptably when line-of-sight is available between routers. An example is shown below in Figure Tropos Mesh OS: Foundation of the Tropos mesh network architecture
8 Figure 10 Multi-Radio, Multi-Mode Routing Makes Most Efficient Use of Spectrum Scalability and capacity are less about the number of radios and more about spectral efficiency. Tropos Mesh OS makes the most efficient use of spectrum by constantly adapting to radio domain changes and by using the most optimal channel in the best available spectrum. Combining auto-channel and auto-band feature sets along with intelligent routing enhances network performance and capacity. Additionally, combining 2.4 GHz and 5 GHz in mesh paths provides incremental capacity while maintaining reliability and economical node density. PWRP: Mobility Tropos Mesh OS provides seamless, session-persistent roaming for Wi-Fi clients at vehicular speeds for as long as they stay within the mesh coverage area. Clients, including those that have established an IPsec/VPN connection can move between nodes and gateways without losing connections. The following example outlines of PWRP s mobility capability. In Figure 11, a client is connected to a Tropos mesh router that is associated with cluster A. This client s IP address belongs to the subnet that also includes both the wired and wireless interfaces of gateway A and gateway B. Figure 11 Client Connects to Cluster A 8 Tropos Mesh OS: Foundation of the Tropos mesh network architecture
9 In Figure 12, the client has moved and is now connected to a Tropos mesh router that is associated with cluster B. Again, note that the client s IP address belongs to the subnet that also includes both the wired and wireless interfaces of gateway A and gateway B. Gateway A and gateway B communicate such that they know the client has moved to cluster B. The client s sessions, including TCP, VPN and application sessions, are transparently preserved during and after the move. Note that, when Tropos mobile mesh routers are employed, make-beforebreak connections are used when mobile mesh routers transition from being connected to one Tropos fixed mesh router to being connected to another Tropos fixed mesh router in the coverage area. Using Tropos mobile mesh routers, handoffs employ make-before-break connections, reducing handoff times and making the persistence of client connections even more reliable. When mobile routers are used, mobile clients connect to them rather than to the Tropos fixed mesh infrastructure. Figure 12 Client Moves to Cluster B In Figure 13, the example client has moved again, this time to cluster C. Note that, while the wired and wireless interfaces for gateway C belong to a subnet different than gateways A and B, the IP address of the example client does not change. Gateway C opens a tunnel to gateway B and the client s traffic is forwarded through it. The client s sessions, including TCP, VPN and application sessions, are transparently preserved during and after the move. 9 Tropos Mesh OS: Foundation of the Tropos mesh network architecture Figure 13 Client Moves to Cluster C
10 For more information regarding mobility in Tropos mesh networks, see the ABB white paper, Seamless Mobility in Tropos Wireless Mesh Networks. PowerCurve A distributed algorithm that leverages PWRP, PowerCurve maximizes network performance and capacity by automatically optimizing power and rate parameters on a per-connection and per-packet basis. This advanced, distributed algorithm continually adjusts transmit power to maximize the number of wireless links that can operate concurrently. Unlike alternative approaches where transmit power is configured as a static setting, PowerCurve tightly couples power and bit rate control. This enables the router to make continuous and dynamic adjustments that can enhance throughput and provides better client connectivity and performance. PowerCurve dynamically monitors and adjusts transmit power and rate on a per-packet, per-link basis, delivering maximum capacity possible given RF conditions. It enhances network reliability, capacity and scalability beyond the capabilities of static, controller-based architectures. Because of its dynamic nature, PowerCurve streamlines network planning, deployment and optimization. SmartChannel Designed to optimize performance in both single- and dual-radio networks, this distributed algorithm continually samples available channels to analyze link performance and interference trends. Channel decision logic is integrated into PWRP so that the quality of end-to-end paths on different RF channels across the network are assessed and the optimum path selected. In dual-radio routers, fine-grained channel allocations are implemented within individual clusters to dynamically optimize each cluster for client coverage and spatial reuse of spectrum. SmartChannel s network analysis is non-disruptive to user traffic and sessions. SmartChannel optimizes capacity and reliability by predicting and using the channels that are least likely to experience interference. Airtime Congestion Control Airtime Congestion Control (ACC) is designed to provide consistent performance for large numbers of users, even under extreme load conditions. The algorithm addresses a well-known shortcoming of the MAC, where network capacity decreases as the amount of traffic attempted to be transferred increases beyond a certain threshold. ACC is an airtime fairness algorithm, but because it only activates when total airtime utilization is about to cause capacity degradation, its implementation results in a net increase in throughput. When airtime utilization is low, ACC is completely inactive and clients are allowed to pass traffic without restriction. Only when a router approaches saturation are nearby routers alerted to conserve airtime. This is not done by capping throughput, but by allocating airtime on a per-client basis. Adaptive Noise Immunity Adaptive Noise Immunity (ANI) adjusts chip-level packet detection parameters in real time to minimize false detection events and maximize receiver sensitivity. Outdoor environments differ significantly from indoor environments in the variety and strength of interference sources, and dynamic detection parameter adjustment is critical to maintaining high performance. Tropos ANI algorithms have been developed through real-world testing and refined to perform in challenging interference environments where other devices stall, reset, or lose sensitivity. 10 Tropos Mesh OS: Foundation of the Tropos mesh network architecture
11 Virtual Network Infrastructure Different networked applications in the wireless world require virtual networks as robust as those found in the wired world. Tropos networks enable many different applications to use the same wireless broadband IP network and yet operate within their own private network, with its own address space, quality of service and security settings. The Tropos network architecture provides all the capabilities necessary to create a secure virtual network infrastructure. These capabilities include: Multiple ESSID support. The Tropos network architecture supports up to 16 ESSIDs and 40 VLAN tags. VLAN tags can be defined by IP address or ESSID. Different IP address spaces. Each application can have its own IP address space, DNS server, etc., allowing IP policies to be administered and enforced by the group responsible for that application. Different security settings. Each application can have its own security settings. See the section titled Multi-Layer Security for more details. Different quality of service settings. Each application can have its own quality of service settings. See the section titled Quality of Service for more details. All aspects of each virtual network can be centrally monitored and managed using Tropos Control. The network administrator can add or change any network setting to respond to increased security concerns, add new applications and more. Quality of Service Tropos networks support e, providing prioritization of data packets into four queues including a strict priority queue for voice applications. The system can classify and prioritize upstream traffic based on SSID and downstream traffic based on DSCP or 802.1p. It can reclassify traffic priorities received from clients; rewrite 802.1p bits; classify VoIP traffic using heuristics based on packet size/rates, ESSID, DSCP and destination subnet; reclassify packets which exceed packet rate and size expected for VoIP into lower priority queues; limit client airtime consumption and rate limit clients based on the amount of data transmitted. Tropos networks enforce QoS and rate-limiting policies at each wireless mesh router, ensuring that airtime is not wasted sending traffic through the mesh to a centralized controller only to have the controller drop the traffic. The network can also classify and prioritize traffic for downstream wired devices connected to a wired client interface on a Tropos mesh router. Tropos mesh routers also support rate limiting to limit the bandwidth used by egregious clients and to provide service differentiation and fair access to the media. Rate limiting and service differentiation may be applied on a per SSID and per VLAN basis. Multi-Layer Security Tropos Mesh OS has been designed from the outset to deliver the same security options over the wireless network that is available over wired networks. The system provides a number of functions to monitor, report, and mitigate security threats to the network. The system includes a multi-layer, defense-in-depth security model with login reporting, evil twin monitoring, DoS identification, compliance reporting and mitigation. Tropos network security is compliant with both FIPS (NIST standard for military and federal use) and NERC CIP Tropos Mesh OS: Foundation of the Tropos mesh network architecture
12 Application HTTPS Transport SSL/TLS Network Link Physical IPsec Packet filtering firewall IP ACLs 802.1x access control i authentication AES encryption MAC ACLs and whitelists/blacklists DoS dectection and mitigation Hardened outdoor enclosure Tamper-detection Encrypted filesystem Protection of critical security parameters Figure 14 Tropos Multi-Layer Security Architecture Authentication: Tropos Mesh OS supports Open, WPA-PSK, WPA-1x and WPA2 security mechanisms. Tropos supports WPA 802.1x authentication, using EAP- TLS/TTLS, SIM, PEAP, etc and has implemented a full RADIUS dictionary of standard and vendor specific AAA attributes. Networks that do not have a centralized authentication server can still take advantage of strong WPA authentication security by using the WPA preshared key (PSK) option. In the WPA-PSK approach, each network device that requires authentication is configured with the same password, or key. Clients access the network by presenting the password. As with RADIUS authentication, WPA-PSK uses EAP to send authentication messages. WPA2/WPA/802.1x and WPA-PSK are compatible with a variety of data encryption options. Tropos currently supports the Advanced Encryption Standard (AES) and Temporal Key Integrity Protocol (TKIP). The encryption method is determined by settings on the client station. Tropos wireless routers support the option of forgoing authentication and encryption entirely and thereby permitting any clients to access the network with no protection for data traffic. This option provides no protection for clients and should not be selected if network security is of concern. Encryption: WPA/WPA2/802.1x and WPA-PSK are compatible with a variety of data encryption options. Tropos currently supports WEP, the Advanced Encryption Standard (AES) and Temporal Key Integrity Protocol (TKIP). VPN support: Tropos supports VPN with IPsec/3DES for FIPS compliance. Tropos has implemented a number of standard methodologies to identify, report, and mitigate security threats. DOS attacks are identified and reported by Tropos to the management system. The attacks are immediately mitigated using rate limiting and prevented by black listing the MAC of the attacker. Additionally Tropos networks identify other Layer 2 DoS attacks such as management frame flooding and MAC spoofing by constantly monitoring the network and reporting attacks to the management system. Rogue AP is an enterprise term used to describe unauthorized access points (APs) that use a company Ethernet connection to provide wireless service to an 12 Tropos Mesh OS: Foundation of the Tropos mesh network architecture
13 area. Rogue APs are an issue in the enterprise since they may inadvertently pose a security risk to the corporate LAN. In large-scale environments, other APs are assumed to be present. Tropos security provisions as well as the proprietary handshake required to join the mesh, prevent unauthorized APs from joining a Tropos network. In this manner, the security of the infrastructure is protected. Evil twin is a term used to denote an AP that picks up beacons from the legitimate network and transmits identical beacons trying to snare unwary clients. As long as wireless security is enabled, this type of attack cannot compromise the subscriber. Tropos detects the presence of evil twins by challenging non Tropos nodes with a request-response mechanism and, upon failure, reports them to the management system. No external equipment is needed. Tropos provides Access Control Lists to create a list of clients, specified by MAC addresses to be explicitly permitted or denied to associate to the Tropos mesh. This provides an additional capability to control the network by denying access to blacklisted clients or limiting access to whitelisted clients. The Tropos multi-layer security architecture prevents man in the middle and replay attacks through the use of AES encryption and 802.1x RADIUS Authentication to users and end-point devices like meters and data collectors. Because hackers can spoof the MAC address of a valid endpoint, MAC address based authentication, while an effective element in a layered security architecture, should not be the only authentication mechanism used. MAC address authentication should be supplemented with other networks such as virtual private networks (VPNs). For more information regarding the Tropos multi-layer, defense-in-depth security architecture, see the ABB white paper Securing Tropos Wireless IP Broadband Networks and the tech brief Bringing Enterprise-Class Security to IP-Based Field Area Communication Networks. Summary Tropos networks are based on a fully distributed mesh architecture. With no centralized controller, the architecture eliminates single-points-of-failure, performance bottlenecks and unnecessary network traffic. With Tropos Mesh OS operating on each mesh router in the network, the Tropos mesh architecture s distributed intelligence dynamically selects the optimal endto-end paths through the network by evaluating multiple RF links, channels and bands. Tropos Mesh OS also performs functions such as advanced RF resource management, VLAN enablement, and security and QoS policy enforcement. Tropos Mesh OS enables self-organizing networks, simplifying deployment of new networks and enabling ease in expanding existing ones. It is the key to delivering the superior capacity, resiliency, security and scalability that are the hallmarks of Tropos wireless mesh networks. 13 Tropos Mesh OS: Foundation of the Tropos mesh network architecture
14 1KHA SEN Copyright 2014 ABB. All rights reserved. For more information please contact: ABB Inc. Tropos Wireless Communication Systems 555 Del Rey Avenue Sunnyvale, CA Phone: [email protected] abb.tropos.com
October 2014. Field Area Communication Networks for Digital Oil and Gas Fields
October 2014 Field Area Communication Networks for Digital Oil and Gas Fields The digital oil and gas field The challenge More wells More area More monitoring and control More information The old SCADA
Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions
Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions EXECUTIVE SUMMARY Outdoor wireless networks are playing a vital role in helping municipalities deliver critical services to citizens.
Portable Wireless Mesh Networks: Competitive Differentiation
Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.
Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN
Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN Copyright 2005, Meru Networks, Inc. This document is an unpublished work protected by the United States copyright laws and
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Municipal Mesh Network Design
White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Defining the Smart Grid WAN
Defining the Smart Grid WAN WHITE PAPER Trilliant helps leading utilities and energy retailers achieve their smart grid visions through the Trilliant Communications Platform, the only communications platform
Cisco Wireless Control System (WCS)
Data Sheet Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform for wireless LAN planning, configuration,
Design and Implementation Guide. Apple iphone Compatibility
Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new
Link Layer and Network Layer Security for Wireless Networks
Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.
Best Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
Using Wireless Mesh Networks for Video Surveillance Version: 1. Using Wireless Mesh Networks for Video Surveillance
Using Wireless Networks for Video Surveillance Version: 1 White Paper Using Wireless Networks for Video Surveillance Using Wireless Networks for Video Surveillance Version: 1 White Paper Table of Contents
Deploying a Secure Wireless VoIP Solution in Healthcare
Deploying a Secure Wireless VoIP Solution in Healthcare Situation Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants
Cisco Outdoor Wireless Network Serves Up Automatic Meter Reading
Cisco Outdoor Wireless Network Serves Up Automatic Meter Reading Summary Cisco outdoor wireless solutions make it practical to deploy and manage Wi-Fi on a citywide scale. This application note describes
Chapter 2 Configuring Your Wireless Network and Security Settings
Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless
Configuring Security Solutions
CHAPTER 3 This chapter describes security solutions for wireless LANs. It contains these sections: Cisco Wireless LAN Solution Security, page 3-2 Using WCS to Convert a Cisco Wireless LAN Solution from
Demystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
Cisco Outdoor Wireless Mesh Enables Alternative Broadband Access
Cisco Outdoor Wireless Mesh Enables Alternative Broadband Access Cisco ServiceMesh defines a network design for service providers delivering valueadded municipal wireless services over a mesh network.
Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security [email protected]
Introduction to WiFi Security Frank Sweetser WPI Network Operations and Security [email protected] Why should I care? Or, more formally what are the risks? Unauthorized connections Stealing bandwidth Attacks
Cloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers. Product Highlights. Relay2 Enterprise Access Point RA100 Datasheet
Cloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers The Relay2 Smart Access Point (RA100) is an enterprise-class access point designed for deployment in high-density environments
Best Practices for Deploying Wireless LANs
Best Practices for Deploying Wireless LANs An overview of special considerations in WLAN implementations As wireless LANs (WLANs) continue to grow in popularity, particularly in enterprise networks, the
Industrial Communication. Securing Industrial Wireless
Industrial Communication Whitepaper Securing Industrial Wireless Contents Introduction... 3 Wireless Applications... 4 Potential Threats... 5 Denial of Service... 5 Eavesdropping... 5 Rogue Access Point...
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
Wireless Controller DWC-1000
Network Architecture Manage up to 6 wireless APs, upgradable to 24 APs 1 per controller Control up to 24 wireless APs, maximum 96 APs 1 per cluster Robust Network Security Wireless Instruction Detection
Deploy WiFi Quickly and Easily
Deploy WiFi Quickly and Easily Table of Contents 3 Introduction 3 The Backhaul Challenge 4 Effortless WiFi Access 4 Rate Limiting 5 Traffic Filtering 5 Channel Selection 5 Enhanced Roaming 6 Connecting
How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility
w h i t e p a p e r How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility So much is happening today to give you a chance to rethink your wireless architecture. Indeed, you
CABLING REQUIREMENTS:
CABLING REQUIREMENTS: All cabling (copper and fiber) should be Belden or be of equivalent specifications. All cabling (copper and fiber) should be installed to meet or exceed manufacturer s warranty requirements.
Computer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Cisco Aironet 1520 Series Lightweight Outdoor Access Points
. Data Sheet Cisco Aironet 1520 Series Lightweight Outdoor Access Points Outdoor Access Points Flexible, Secure Mesh Platform for Demanding Environments Self-configuring and self-healing mesh in response
Enterprise A Closer Look at Wireless Intrusion Detection:
White Paper Enterprise A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Josh Wright Senior Security Researcher Introduction As wireless enterprise networks become
Intelligent WLAN Controller with Advanced Functions
Intelligent WLAN Controller with Advanced Functions Centralized WLAN management and auto provisioning Manages up to 512 APs with granular access control ZyMESH simplifies complex, inconvenient cabling
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
Applying Mesh Networking to Wireless Lighting Control
White Paper Applying Mesh Networking to Wireless Lighting Control www.daintree.net Abstract Recent advances in wireless communications standards and energy-efficient lighting equipment have made it possible
Lucent VPN Firewall Security in 802.11x Wireless Networks
Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper
Chapter 2 Wireless Settings and Security
Chapter 2 Wireless Settings and Security This chapter describes how to set up the wireless features of your WGT624 v4 wireless router. In planning your wireless network, select a location for the wireless
Design Guide for Pervasive Wireless Networks
Design Guide Design Guide for Pervasive Wireless Networks This document describes how to design and install a pervasive wireless network based on the Meru Networks Wireless LAN (WLAN) System. A pervasive
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Table of Contents Introduction 3 Deployment approaches 3 Overlay monitoring 3 Integrated monitoring 4 Hybrid
Making the Case for Satellite: Ensuring Business Continuity and Beyond. July 2008
Making the Case for Satellite: Ensuring Business Continuity and Beyond July 2008 Ensuring Business Continuity and Beyond Ensuring business continuity is a major concern of any company in today s technology
Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT)
Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Course Number: 642 845 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP Exam 642 845:
ENHWI-N3. 802.11n Wireless Router
ENHWI-N3 802.11n Wireless Router Product Description Encore s ENHWI-N3 802.11n Wireless Router s 1T1R Wireless single chip can deliver up to 3x faster speed than of 802.11g devices. ENHWI-N3 supports home
Tranzeo s EnRoute500 Performance Analysis and Prediction
Tranzeo s EnRoute500 Performance Analysis and Prediction Introduction Tranzeo has developed the EnRoute500 product family to provide an optimum balance between price and performance for wireless broadband
Advanced Transportation Management Systems
Advanced Transportation Management Systems Summary Many Department of Transportation agencies are looking for cost-saving ways to improve the efficiencies of roadways without making actual surface improvements
VoIP Reliability in Managed Service Deployments
1 VoIP Reliability in Managed Service Deployments Technical White Paper Introduction This White Paper introduces the Aspen 365 family of network appliances and explains how service providers offering a
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations
Comparing Mobile VPN Technologies WHITE PAPER
Comparing Mobile VPN Technologies WHITE PAPER Executive Summary Traditional approaches for encrypting data in transit such as IPSec and SSL are intended for wired networks with high speed, highly reliable
The following chart provides the breakdown of exam as to the weight of each section of the exam.
Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those
Welch Allyn Connex, VitalsLink by Cerner, and Connex CSK Network installation. Best practices overview
Welch Allyn Connex, VitalsLink by Cerner, and Connex CSK Network installation Best practices overview ii Welch Allyn Network installation 2015 Welch Allyn. All rights are reserved. To support the intended
All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices
Wireless Security All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices Portability Tamper-proof devices? Intrusion and interception of poorly
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
CISCO WIRELESS CONTROL SYSTEM (WCS)
CISCO WIRELESS CONTROL SYSTEM (WCS) Figure 1. Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform
Deploy and Manage a Highly Scalable, Worry-Free WLAN
Deploy and Manage a Highly Scalable, Worry-Free WLAN Centralized WLAN management and auto provisioning Manages up to 512 APs with granular access control simplifies complex, inconvenient cabling Wi-Fi
ALTAI WIRELESS BROADBAND NETWORK DESIGN WHITE PAPER
ALTAI WIRELESS BROADBAND NETWORK DESIGN WHITE PAPER Comparing with enterprise network planning, public network planning is different. The characteristic and requirement of a public access network contributes
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki
Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science
Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer
WAN Traffic Management with PowerLink Pro100
Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management
Tropos Networks User Guide
Tropos Networks User Guide Release 5.1 Tropos Networks, Inc. 555 Del Rey Avenue Sunnyvale, CA 94085 Copyright 2005 Tropos Networks, Inc. All rights reserved. Part No. 200033-04 Published December 2005
Wireless Security. New Standards for 802.11 Encryption and Authentication. Ann Geyer 209-754-9130 [email protected] www.tunitas.
Wireless Security New Standards for 802.11 Encryption and Authentication Ann Geyer 209-754-9130 [email protected] www.tunitas.com National Conference on m-health and EOE Minneapolis, MN Sept 9, 2003 Key
Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost.
Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost. Peplink. All Rights Reserved. Unauthorized Reproduction Prohibited Presentation Agenda Peplink Balance Pepwave MAX Features
Private Cloud Solutions Virtual Onsite Data Center
ZEROOUTAGES WHITE PAPER Private Cloud Solutions Virtual Onsite Data Center ZEROOUTAGES - WHITE PAPER Single Side / Balancing The ZeroOutages solution makes for a perfect link bonding/balancing device for
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia
TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents
WHITE PAPER TrustNet CryptoFlow Group Encryption Table of Contents Executive Summary...1 The Challenges of Securing Any-to- Any Networks with a Point-to-Point Solution...2 A Smarter Approach to Network
Application Note Secure Enterprise Guest Access August 2004
Application Note Secure Enterprise Guest Access August 2004 Introduction More and more enterprises recognize the need to provide easy, hassle-free high speed internet access to people visiting their offices,
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...
WHITE PAPER. WEP Cloaking for Legacy Encryption Protection
WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area
Honeywell s OneWireless Network - The Building Blocks of Reliability Vibhor Tandon, Honeywell Process Solutions
White Paper Honeywell s OneWireless Network - The Building Blocks of Reliability Vibhor Tandon, Honeywell Process Solutions Executive Summary User expectations for network availability and tolerance for
VLANs. Application Note
VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static
Wireless Security with Cyberoam
White paper Cyberoam UTM Wireless Security with Cyberoam Robust, Fault-tolerant security is a must for companies sporting wireless networks. Cyberoam UTM strengthens the existing Wireless Security Architecture
Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers
SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
white paper Motorola s Wireless network Indoor/Outdoor Solution
Motorola s Wireless network Indoor/Outdoor Solution Executive Summary: IDC Research estimates that the mobile worker population will reach one billion worldwide by 2011, accounting for 30.4 percent of
WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network
WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Executive Summary Wireless
Link Layer and Network Layer Security for Wireless Networks
White Paper Link Layer and Network Layer Security for Wireless Networks Abstract Wireless networking presents a significant security challenge. There is an ongoing debate about where to address this challenge:
A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter with RangeBooster User Guide Model No. WUSB54GR Copyright and Trademarks Specifications are subject to change without
Solving the Wireless Mesh Multi-Hop Dilemma
Access/One Network White Paper Solving the Wireless Mesh Multi-Hop Dilemma 210-0008-01 Executive Summary 1 Introduction 2 Approaches to Wireless Mesh 4 The Multi-Hop Dilemma 6 Executive Summary A New Breed
OmniAccess Wireless LAN Switching Systems. The Next Generation of Wireless LAN Connectivity Secure mobility for the enterprise
OmniAccess Wireless LAN Switching Systems The Next Generation of Wireless LAN Connectivity Secure mobility for the enterprise Alcatel OmniAccess WLAN switching system changes how 802.11 networks are deployed,
Developing Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC
Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC As wireless standards develop and IPv6 gains widespread adoption, more and more developers are creating smart devices
BYOD in Healthcare. Improving Clinician Productivity and Patient Satisfaction May 2013 WHITEPAPER
WHITEPAPER BYOD in Healthcare Improving Clinician Productivity and Patient Satisfaction May 2013 WHITEPAPER Meru BYOD in Healthcare Table of Contents Introduction... 1 BYOD Requirements... 3 BYOD Deployment
Legacy 802.11 Security
Legacy 802.11 Security Contents Authentication Open System Authentication Shared Key Authentication Wired Equivalent Privacy (WEP) Encryption Virtual Private Networks (VPNs) Point-to-Point Tunneling Protocol
How To Use An Ipad Wireless Network (Wi Fi) With An Ipa (Wired) And An Ipat (Wired Wireless) Network (Wired Wired) At The Same Time
IdentiFiTM IDENTIFI Experience Matters IdentiFi wired-like Wi-Fi experience for the wireless world Extreme Networks IdentiFi is a purpose-built Wi-Fi solution that provides a wiredlike Wireless Local Area
ESR-9750. (Go Green Series) Wireless-N Broadband Router / AP / Repeater. 2.4 GHz 802.11b/g/n 300 Mbps
PRODUCT DESCRIPTION ESR-9750 is a Wireless 11N Broadband Router that delivers up to 6x faster speeds and 3x extended coverage than 802.11g devices. ESR-9750 supports home network with superior throughput
Testing a Wireless LAN
Chapter 17 Testing a Wireless LAN This chapter will introduce you to: Wireless LAN Testing Considerations Signal Coverage Testing Performance Testing In-Motion Testing Security Vulnerability Testing Acceptance/Verification
SCADA/Business Network Separation: Securing an Integrated SCADA System
SCADA/Business Network Separation: Securing an Integrated SCADA System This white paper is based on a utility example but applies to any SCADA installation from power generation and distribution to water/wastewater
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
Motorola SMART Branch. Easy, cost-effective 802.11n wireless networking for branch offices
Motorola SMART Branch Easy, cost-effective 802.11n wireless networking for branch offices Deliver easy and affordable 802.11n business critical voice and data to one branch office or thousands... with
Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
APPENDIX 3 LOT 3: WIRELESS NETWORK
APPENDIX 3 LOT 3: WIRELESS NETWORK A. TECHNICAL SPECIFICATIONS MAIN PURPOSE The Wi-Fi system should be capable of providing Internet access directly to a user using a smart phone, tablet PC, ipad or Laptop
