Networking blogs: Tips to address the bring-your-own-device trend

A wireless expert discusses ways to deploy 802.11ac to ease capacity issues created by the continuing growth in BYOD.

The bring-your-own-device trend is continuing to create capacity issues for enterprises forced to handle an escalating number of devices. Combine the growth of users with bandwidth-hungry video- and audio-streaming services and the pressure being put on networks is nearly unmanageable. Fortunately, AirWise blogger Karthik Krishnaswamy said, 802.11ac offers some needed relief. Krishnaswamy offers five tips to enterprises as they set up new hardware that supports the standard:

  • Design for capacity. Although 80211.ac supports higher capacity and performance, the WLAN must be carefully planned and deployed. Take into account key performance factors such as increased channel width and higher modulation and coding scheme values.
  • Ensure backward compatibility. Identify areas where legacy devices need to be supported and plan 802.11ac deployment accordingly.
  • Survey your site prior to deployment.
  • Plan your network carefully and use survey results to limit rollout issues.
  • Follow up after deployment to see how well the network is working.

The most important thing to remember, according to Krishnaswamy, is to plan with the end user in mind. As long as webpages load quickly and video and audio streams smoothly, your 802.11ac migration will be a success.

Read a detailed description of Krishnaswamy's tips for 802.11ac deployment.

FireEye makes its mark as a go-to resource for cybersecurity

Enterprise Strategy Group (ESG) senior principal analyst, Jon Oltsik, said that the security industry made the most notable contributions to the technology world in 2013. And one company in particular, FireEye Inc., is at the forefront of that discussion. Oltisk said that even though FireEye will face competition from Cisco, McAfee Inc. and Trend Micro Inc., it is positioned as a leader in cybersecurity. Citing an ESG survey of 198 security professionals, Oltsik writes that FireEye is set up for tremendous market growth. The company will also benefit from enterprises allocating more money to their security budgets in 2014. "FireEye," Oltsik writes, is synonymous with "advanced malware detection technology." To that end, he said, FireEye is in the minds of security professionals as the go-to for cyberprotection.

Read more about the ESG survey.

Intelligent WAN offers cost-saving alternatives to WAN services

ACG Research analyst Michael Kennedy explained four cost-saving approaches to replace all or some multiprotocol label switching, virtual private network and wide area network services with business broadband services, citing Cisco's Intelligent WAN (IWAN) offering as an example. Case studies found the following:

  • Transport service cost savings of 34% to 81%.
  • Payback on the IWAN investment of five to 11 months.
  • ROI of 199% to 1,220% for 99.998% availability (24 minutes a year of downtime).
  • Addition of a second router at each branch increases availability to 99.999% (five minutes a year of downtime).

The Cisco IWAN employs the Cisco ISR-AX integrated services router and dual transport links that allow IT to augment premium-priced WAN services without sacrificing network requirements.

Read more about ACG Research's findings.

Eliminating guest OS agents on VMs

Technology expert Bob Plankers advises anyone using a virtual machine (VM) to get rid of any agents on the guest operating system. The only information they ought to use should come directly from the hypervisor. The hypervisor is the only one with accurate data about CPU utilization and random access memory (RAM) usage, Plankers writes on The Lone Sysadmin blog. Because guest OSes don't know they aren't the only OS on the hardware, the hypervisor lies to them, giving them inaccurate data.

Plankers said users can save more than money by removing or disabling agents running on a VM. Receiving inaccurate facts about system performance will cause a user to make bad decisions. Plankers says it isn't worth the risk.

Read about how to remove agents from a guest OS.

This was first published in December 2013

Dig deeper on Wireless LAN Implementation

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchSDN

SearchEnterpriseWAN

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close