|By RealWire News Distribution||
|April 4, 2013 04:27 AM EDT||
Ian Kilpatrick, chairman Wick Hill Group, specialists in secure IP infrastructure solutions, looks at the rapidly growing adoption of wireless and what it means for our future IT networks.
2012 saw a huge growth in the use of wireless, fuelled by factors such as mobility, strong tablet sales, BYOD and the consumer deployment of devices which support the upcoming wireless standards, 802.11ac and 802.11ad.
2013 and beyond will see continuing growth in wireless networks, with a move in many organisations to wireless actually replacing wired networks. This move, which already has many early adopters, will create a sea change in working practises and operational management.
The new wireless standard 802.11ac is on track to be ratified in the second half of 2013 and will provide WLAN throughput of at least 1Gbps, first generation, and up to 7Gbps in the future. 802.11ad, with multi Gbps throughput, is likely to be ratified in 2014.
However, manufacturers are already delivering consumer devices designed to both these standards. Home users are already getting the improved performance and user experience that these standards will deliver and are increasingly bringing these expectations into the office.
Currently, in many organisations, wireless is not of the same standard as wired. Most of today's wireless implementations provide limited, rather than total coverage, with cold spots, performance limitations and access limitations. This contrasts unfavourably with the mobile environment increasingly experienced elsewhere.
The situation is not sustainable in the medium term. Mobility is an unstoppable wave. Smartphone and tablet use are soaring; desktop sales are declining, below laptop sales; 4G will drive further performance expectations; and organisations need the increased productivity that mobile devices can bring.
The move to wireless raises many challenges and opportunities. Security is a significant challenge, raising a number of issues to be addressed, such as network access control, ID management, mobile device management, device remediation, intrusion prevention and management infrastructure. Key to success, in this significantly changed environment, will be deployment pre-planning, risk assessment and determining the policies to apply.
The changes in wireless standards provide a key opportunity for strategic planning. Most wireless deployments have been tactical, with more access points added, often unstructured, to meet increasing user demand or deal with cold spots.
802.11ac will deliver the unfulfilled promise of the previous standard 802.11n, but with a focus on 5GHz rather than 2.4GHz. With 5GHz providing shorter range, but higher throughput, existing access point (AP) based systems will be inadequate for the new requirements. As users increasingly have 5GHz devices, the old 2.4GHz APs will become obsolete. This gives organisations a one time opportunity to plan for a future working environment based on wireless, rather than wired LANs.
This is particularly relevant given the challenges that 5GHz and beyond will create for the old AP-based approach to coverage. With 2.4GHz, providing more coverage typically involves adding more APs. However, that has been shown to be increasingly self-limiting because interference between APs reduces coverage, rather than increasing it.
To migrate, will require entirely new APs, new antennas, upgraded or replaced controllers, and new switches or PoE injectors. Similar to 802.11n, there will be multiple versions and phases of 802.11ac, so AP-based organisations will need to budget for ongoing infrastructure upgrading and replacement.
This is a tough challenge, since it involves planning for growth driven by staff's home experience of high throughput access and app usage, and of course 4G. While the much faster and even shorter range (10m) 802.11ad 60GHz standard is likely to deliver high capacity, short-range cordless (back-up to docking station, etc.) to the wireless office, it can't be ignored in the planning process.
Already, we have seen unprecedented pressure for ever faster and more pervasive wireless, and with tablets and smartphones supporting the standard from 2013, this pressure will only grow. An increasingly popular alternative to the AP approach (sometimes characterised as 'breeding') is the modular array approach.
With this method, an array can hold multiple directionally tuneable APs. Unlike traditional broadcasting, directional focus minimises interference and enables clear control over geo overspill. Additionally, with the array-based approach, the APs can be slot-in cards, so can be easily and inexpensively replaced or upgraded, as traffic usage and capacity evolve.
We are at the beginning of a radical shift in the IT world. Mobility, BYOD, multi Gbps wireless and 4G are creating an unstoppable wave of change, fundamentally altering the working environment and creating some major challenges and opportunities for security and access.
The key beneficiaries will be those who recognise that this is a sea change and plan accordingly, rather than treat it as an evolutionary change and have to play catch up. Given the repeated historic issues of back-fitting security after deployment, planning and budgeting for security at the beginning are essential for success in this new environment. http://www.wickhill.com or www.twitter.com/wickhill
Bio of author
Ian Kilpatrick is chairman of international value added distributor Wick Hill Group plc, specialists in market development for secure IP infrastructure solutions and convergence. Kilpatrick has been involved with the Group for more than 35 years. Wick Hill supplies organisations from enterprises to SMEs, through an extensive value-added network of accredited VARs.
Kilpatrick has an in-depth experience of IT and unified communications (UC) with a strong vision of the future. He looks at these areas from a business point-of-view and his approach reflects his philosophy that business benefits, ease-of-use and cost of ownership are key factors, rather than just technology. He has authored numerous articles and publications, as well as being a regular speaker at conferences, exhibitions and seminars. For more information about Wick Hill, please visit http://www.wickhill.com or www.twitter.com/wickhill
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Sep. 27, 2016 09:30 PM EDT Reads: 2,947
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Sep. 27, 2016 09:30 PM EDT Reads: 445
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
Sep. 27, 2016 08:30 PM EDT Reads: 2,032
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
Sep. 27, 2016 08:15 PM EDT Reads: 2,226
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
Sep. 27, 2016 07:30 PM EDT Reads: 2,147
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Sep. 27, 2016 07:00 PM EDT Reads: 2,854
Whether they’re located in a public, private, or hybrid cloud environment, cloud technologies are constantly evolving. While the innovation is exciting, the end mission of delivering business value and rapidly producing incremental product features is paramount. In his session at @DevOpsSummit at 19th Cloud Expo, Kiran Chitturi, CTO Architect at Sungard AS, will discuss DevOps culture, its evolution of frameworks and technologies, and how it is achieving maturity. He will also cover various st...
Sep. 27, 2016 06:45 PM EDT Reads: 1,815
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
Sep. 27, 2016 06:30 PM EDT Reads: 3,565
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
Sep. 27, 2016 06:30 PM EDT Reads: 2,200
SYS-CON Events announced today that Niagara Networks will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
Sep. 27, 2016 06:15 PM EDT Reads: 398
SYS-CON Events announced today that Secure Channels will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The bedrock of Secure Channels Technology is a uniquely modified and enhanced process based on superencipherment. Superencipherment is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.
Sep. 27, 2016 06:00 PM EDT Reads: 1,700
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
Sep. 27, 2016 05:45 PM EDT Reads: 1,662
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
Sep. 27, 2016 05:30 PM EDT Reads: 2,026
[session] Understanding the Inscrutable Chinese Internet By @CDSGlobalCloud | @CloudExpo #API #Cloud
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
Sep. 27, 2016 05:15 PM EDT Reads: 314
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Sep. 27, 2016 05:15 PM EDT Reads: 2,770
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
Sep. 27, 2016 05:00 PM EDT Reads: 1,601
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...
Sep. 27, 2016 04:00 PM EDT Reads: 2,666
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
Sep. 27, 2016 03:15 PM EDT Reads: 2,765
SYS-CON Events announced today that eCube Systems, a leading provider of middleware modernization, integration, and management solutions, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. eCube Systems offers a family of middleware evolution products and services that maximize return on technology investment by leveraging existing technical equity to meet evolving business needs. ...
Sep. 27, 2016 03:15 PM EDT Reads: 1,415
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
Sep. 27, 2016 03:15 PM EDT Reads: 2,878