Presentation is loading. Please wait.

Presentation is loading. Please wait.

Presented to: MAG January 15, 2004 By Client Technologists: Chris Colby & Randy Kendzior.

Similar presentations


Presentation on theme: "Presented to: MAG January 15, 2004 By Client Technologists: Chris Colby & Randy Kendzior."— Presentation transcript:

1 Presented to: MAG January 15, 2004 By Client Technologists: Chris Colby & Randy Kendzior

2 Agenda Wireless Landscape & Technology Trends Dell Wireless Products & Services Applications of Wireless Implementation Considerations Q & A

3 Wireless Landscape and Technology Trends

4 Wireless Technology Positioning Each wireless technology category provides an unique set of capabilities and options... ` ` WPAN WLANWWAN Personal spaceHome, campus, hotspotsMetros, countries, global AttributeWPAN (Bluetooth) WLAN (802.11b/g/a) WWAN (GPRS) Usage Model Object exchange, cable replacement LAN extension & hotspot coverage On-the-road remote access Network Ad-hocDedicated enterprise or “hotspot” infrastructure Operator owned infrastructure Data-rate 1 Mbps  10 Mbps?11 Mbps  54 Mbps40 Kbps  384 Kbps Range / coverage 10m, personal proximity area 50m, “hotspot” coverageMetro/global coverage with vehicular support Power LowMediumHigh Cost LowMediumHigh (with access) Volume Driver Cell phones & headsetsNotebooksCell phones

5 2006+ 2005 2004 2003 Past WPAN WLAN WWAN Bluetooth 1.1 Bluetooth 1.1 802.11b GPRS cdma2000 1xRTT cdma2000 1xRTT 802.11g 802.11a WCDMA EDGE 802.11n (HTSG) 802.11n (HTSG) Bluetooth 2.x Bluetooth 2.x 802.15.3a UWB 802.15.3a UWB 54Mbps at 5GHz 1xEV-DO 54Mbps at 2.4GHz 180Kbps ?Kbps 140Kbps Data overlay 11Mbps 35kbps 721Kbps 3Mbps (Medium rate) 10Mbps(High-data rate) Next generation 100+ Mbps thruput Wireless technologies, categorized by mobility and range, will continue to evolve to higher data rates... 100Mbps+ Bluetooth 1.2 Bluetooth 1.2 AFH, Improvements Dual-Band Wireless Technology Roadmap 1xEV-DV HSPDA 300Kbps 600Kbps 60kbps

6 Dell Wireless Products & Services

7  Notebook  Wi-Fi standard on all Latitude notebooks  Bluetooth internal module  Cellular PC Cards  Desktop  WLAN USB adapters  Bluetooth (combo) dongle  Axim  WLAN / Bluetooth CF and SDIO cards  Internal wireless modules (WWAN, BT, WLAN)  Assessment  Needs, wants, requirements, restraints, roadblocks  Design  Design spec based on assessment & site survey  Deployment  Install, configure, verify – transfer of knowledge  Support  On-going support and maintenance Client ServicesAccess  WLAN hotspot  Catalog, web-links, coupons, client SW / icons  Cellular  Cellular cards + Access  Convergent  Bundled WLAN+Cellular Access Infrastructure  Consumer & Small Business  WLAN router AP  WLAN print server and media servers  Enterprise  Access Point  Corporate e-mail middleware server Beyond simple client enablement, Dell is adding emphasis on other primary pieces… Dell Areas of Focus

8 WLAN Reference Model SoHo / Consumer Broadband Enterprise Adapters for CE devices Wireless Media server Wireless BB routers Notebook cards Desktop cards Axim cards & modules Enterprise APs AP controllers Consumer Enterprise Beyond common client HW, the consumer and enterprise segments will motivate different product solutions… Public WLAN Access

9 Applications of Wireless

10 Public Utilities Meter reading Tax appraisals Preventative maintenance Public Safety Police reporting & Investigations (Mobile terminals) Mobile Hotspots (Fire & Police stations, Courthouses, etc.) Judicial Applications Courthouse law library access Attorney network access Medical Applications Prescription dispensing Mobile cart admissions Physician order entry General Administration Mobile email & scheduling Safety alerts

11 Implementation Considerations

12  Network perimeter is clearly defined  ‘Trusted’ users are only inside the network Past Evolving Security Usage Models Future A shift towards a less defined network and trusted-user base will require increased emphasis on end-user authentication and data encryption… Paradigm Shift Wireless Increasing On-line Info Remote Access Extranets Internet  Network perimeter is less defined  ‘Trusted’ users both inside and outside the network

13 General Security Framework In the room Ability to physically protect and secure systems and track assets In the room Ability to physically protect and secure systems and track assets At the keyboard Processes and policies to assure user identification, authorization and access privileges At the keyboard Processes and policies to assure user identification, authorization and access privileges In the box Real-time protection from data and programs that have entered a system In the box Real-time protection from data and programs that have entered a system On the net Ability to interact with internal and external users and remote systems in a secure manner On the net Ability to interact with internal and external users and remote systems in a secure manner Security is a “chain” of technologies/solutions Security is also a continuous process Interoperability requires security standards A security policy encompasses many different facets…and is only as secure as the weakest one..

14 Questions & Answers

15 THANK YOU


Download ppt "Presented to: MAG January 15, 2004 By Client Technologists: Chris Colby & Randy Kendzior."

Similar presentations


Ads by Google