When choosing a logical architecture, you must weigh several trade-offs. Some of these are security trade-offs are discussed in the next chapter. Many are, however, a matter of balancing performance, simplicity, or functionality.
Table 21-4 summarizes the different factors discussed in this chapter. Security is too complex to be reduced to a simple table entry, so it receives the full attention of the next chapter. As you consider this table and a purchase decision, keep in mind that some products work with certain topologies better than others.
Single subnet |
ET phone home |
Dynamic VLAN |
Virtual AP |
|
---|---|---|---|---|
Mobility |
High if VLAN is large; limited by maximum 802.1D diameter |
Depends on size of islands |
High |
High; but enforcing limitations may be important |
Performance |
Depends on choke point capacity |
Depends on concentrator capacity |
High due to distributed encryption |
Same as dynamic VLAN |
Backbone |
High; though may depend on existing network |
Varies with range of mobility[a] |
Depends on type of connection to network core |
Same as dynamic VLAN |
Client |
Depends on client software[b] |
Depends on client software[b] |
Built-in to operating system |
Same as dynamic VLAN; handles multiple client security models better |
IP addressing |
High (new subnets and routing) |
High (new subnets and routing) |
Not required |
Same as dynamic VLAN |
[a] Newer products may reduce the backbone impact by logically attaching access points to a control device in the network.
[b] Both the single subnet and central concentrator architectures are typically used with VPN software for additional security. Obviously, if VPN software is used, the amount of client integration work is much larger.
[b] Both the single subnet and central concentrator architectures are typically used with VPN software for additional security. Obviously, if VPN software is used, the amount of client integration work is much larger.
Introduction to Wireless Networking
Overview of 802.11 Networks
11 MAC Fundamentals
11 Framing in Detail
Wired Equivalent Privacy (WEP)
User Authentication with 802.1X
11i: Robust Security Networks, TKIP, and CCMP
Management Operations
Contention-Free Service with the PCF
Physical Layer Overview
The Frequency-Hopping (FH) PHY
The Direct Sequence PHYs: DSSS and HR/DSSS (802.11b)
11a and 802.11j: 5-GHz OFDM PHY
11g: The Extended-Rate PHY (ERP)
A Peek Ahead at 802.11n: MIMO-OFDM
11 Hardware
Using 802.11 on Windows
11 on the Macintosh
Using 802.11 on Linux
Using 802.11 Access Points
Logical Wireless Network Architecture
Security Architecture
Site Planning and Project Management
11 Network Analysis
11 Performance Tuning
Conclusions and Predictions