|More about Lisa|
Wireless LANs are popular in homes, schools, small businesses, and key verticals like retail, manufacturing, and healthcare. But larger enterprises have been dragging their feet. Many have small pockets of deployment, but seem to be waiting for WLANs to mature before embarking upon company-wide rollout. What are they waiting for? Stable high-speed standards, security improvements, and quality of service are all concerns. But, when push...
comes to shove, what enterprises may be missing the most is centralized control over large, distributed WLANs.
Few companies would dream of building large wired LANs out of independent, unmanaged Ethernet hubs. So why they build large WLANs by knitting together a potpourri of hard-to-control wireless Access Points? Just as managed layer two switches tamed enterprise Ethernet LANs a decade ago, a new generation of wireless LAN switches are now emerging to enable consolidated control over large 802.11 WLANs.
Defining WLAN switchesStart-ups like Aruba, Airespace (BlackStorm), AirFlow, AirGo (Woodside), Chantry, Cranite, Vivato and established AP vendors like Cisco, Proxim , and Symbol have all announced WLAN systems that some have dubbed "wireless LAN switches." But features vary considerably, making it a challenge to understand exactly what a WLAN switch is and why you might want one.
One common thread is consolidated provisioning. Some enterprise-class APs can be remotely configured through SNMP, but most APs are fundamentally stand-alone devices. In contrast, WLAN switches are distributed systems that combine a central policy server with tightly-coupled APs that do the server's bidding. The administrator lays out WLAN topology and policies in one central GUI; the server implements that design by auto-magically pushing configurations to managed APs. Some systems can accommodate third-party APs, but for maximum benefit, you may need to buy the whole system (server and APs) from one vendor.
Another common thread is consolidated monitoring. Some enterprise-class APs can forward SNMP traps and SYSLOG records, and third-party analyzers and IDS products can sniff the air, alerting you to suspicious activity like unauthorized stations, rogue APs, or "NetStumblers." WLAN switches pull these activities together under one umbrella, using the server as a central surveillance system, and instrumenting APs to report unauthorized activity. Again, this is easier to achieve in homogenous WLANs.
Many WLAN switching systems distribute policy enforcement. APs are still responsible for most 802.11 physical and MAC functions, but the server usually off-loads some decision-making, adding functionality while keeping the APs "thin" to contain cost. Common examples include user/station authentication, load balancing across APs, and facilitating mobility when stations roam from one AP to another.
Differentiating WLAN switchesFrom 30,000 feet, WLAN switches don't sound all that difficult to understand. But look closer and you'll start appreciating their unique features and architectural differences. For example:
ConclusionWLAN switches are the newest kids on the block in a relatively new neighborhood. It will take time for customers to become familiar with products and fully understand what they offer - and for vendors to gain field experience and refine features. If you're faced with deploying a large enterprise WLAN, start tracking this emerging market and begin thinking about how switches might help you regain control over your wireless-enabled network.
Do you have comments about this article, or suggestions for Lisa to write about in future columns? Let us know!