The In-Between Fit AP

 < Day Day Up > 



The In-Between "Fit" AP

There are also APs that offer an amalgam of simple and smart. These devices are typically referred to as "fit" APs. They handle the radio side and encryption, and the network switch or an access controller takes care of the authentication, roaming, access limitations, and other by-user functions. Airflow, Extreme Networks and Trapeze are vendors offering "fit" AP products.

Let's examine Extreme Networks' intelligent box/fit AP solution, which Extreme refers to as the "Unified Access Architecture." By treating wireless as just another switch port, Extreme Networks' Unified Access Architecture establishes a single enterprise infrastructure that serves both wireless and wired users. It also features end-to-end management and mobility, along with the security and scalability demanded in today's organizations. Further, the Unified Access Architecture speeds and simplifies planning, configuration and troubleshooting. It also centralizes network management on a single console and can implement advanced policies.

The Unified Access Architecture is based on two building blocks: the Summit 300–48, a switch that can simultaneously handle wireless and wired applications, and the Altitude 300 wireless port, which is basically a simple access point with a bit of added functionality. Thus the Altitude 300 wireless port has the criteria of a "fit" AP—it is unburdened by expensive CPU, memory, system software, or power supply, and it implements the Advanced Encryption Standard (AES) and the Wi-Fi Protected Access (WPA) standard.

The Altitude 300 contains virtually no configuration data until it's connected to the Summit 300–48, which allows it to immediately download all pertinent information. That makes it easy to set up the Altitude 300s.

The Summit 300–48 and Altitude 300 are a powerful team. The Summit 300–48 can even detect and shut down rogue WLANs that can compromise enterprise security. The Unified Access Architecture relies on ExtremeWare to manage the fully integrated enterprise. Advanced policies, like Quality of Service (QoS), intrusion detection, and authentication, are defined and maintained using EPICenter software. Since these policies are heuristic, they keep tabs on end-users even after they've been granted network access.

Note 

The issue of whether network intelligence should be centralized or pushed to the edge of the network isn't new. In the early 90s 3Com Corp. tried to introduce what it termed "distributed management intelligence" by providing much of the network's intelligent in an adapter card that sit inside your everyday PC. The idea never caught on.



 < Day Day Up > 



Going Wi-Fi. A Practical Guide to Planning and Building an 802.11 Network
Going Wi-Fi: A Practical Guide to Planning and Building an 802.11 Network
ISBN: 1578203015
EAN: 2147483647
Year: 2003
Pages: 273

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net