Presentation is loading. Please wait.

Presentation is loading. Please wait.

Confidential Wireless Network Designs WS-5000 / VLAN Capabilities.

Similar presentations


Presentation on theme: "Confidential Wireless Network Designs WS-5000 / VLAN Capabilities."— Presentation transcript:

1 Confidential Wireless Network Designs WS-5000 / VLAN Capabilities.

2 Confidential Port Encapsulation Using Header :A0:F8:53:B7:4C = :A0:F8:A2:42:22

3 Confidential = Data Path: Wireless Device to a Wired Server Server Farm Router WWW Intranet Wired Devices “Yahoo.com” = ESS 101 -> Eth Frame YahooMU DASA Data Frame WS5000 Switch Access Port DMAC SMAC Data DA SA Frame Yahoo Data DA SA DASA Data MU Data DA SA 00:A0:F8:3A:96:ED :A0:F8:A2:42:22 00:A0:F8:53:B7:4C

4 Confidential Port Encapsulation Using Header 8783

5 Confidential VLAN Ethernet port Configuration 1.) Flat network 2.) Trunk and Flat 3.) Flat and Trunk 4.) Trunk and Trunk Eth1 = AP discovery (L2) Eth2 = RON (L3)

6 Confidential Ethernet port Configuration Layer 2 / 8783 Frame only RON port Rest Of Network Layer 2 and 3 A user cannot send a L3 ICMP ping between ports 1 and 2 on the wire…. …but can do so over the wireless!

7 Confidential Schematic of the WS-5000 Solution  A wired network, separated by routers Router ARouter B WAN Ether-Switch A Ether-Switch B Network B X Network A X

8 Confidential Schematic of the WS-5000 Solution  WS 5000 can extend a layer 2 tunnel through the “A” network and continue network “B”’s VLAN support without loop-back! WAN Ether-Switch A Ether-Switch B Router BRouter A Network A X Network B X

9 Confidential The wired Topology #1 – Full redundant – each access switch is it’s own VLAN for wired users. Access – Plain Layer 2 Switch Distribution / Core Router WAN

10 Confidential Warm Standby The wired Topology #1 – Full redundant – each access switch is it’s own VLAN. “VLAN in a box” (Eth 1 and 2 trunked) Distribution / Core Router WAN Four separate and unique VLANs over the air ! POTS Just add the number of switches need to support the application! Voice 3270/5250/ANSI Emulation Data Access – Plain Layer 2 Switch

11 Confidential The wired Topology #1 – Full redundant – each access switch is it’s own VLAN. “VLAN in a box” (Eth 1 trunked Eth 2 Flat) Distribution / Core Router WAN Warm Standby POTS Just add the number of switches need to support the application! 3270/5250/ ANSI Emulation Data Access – Plain Layer 2 Switch

12 Confidential The wired Topology #2 – Full redundant – each access switch supporting all VLAN trunking. Access /VLAN Trunk supported Router WAN Fiber VLAN Trunks, etc. Distribution / Core

13 Confidential The wired Topology #2 – Each access switch supporting all VLAN trunking.(Eth1 Flat & Eth2 Trunked) Access /VLAN Trunk supported Router WAN Four separate and unique VLANs over the air ! POTS Voice 3270/5250/ANSI Emulation Data Ports are seen on one assigned VLANS but are sent out over the VLANs built for wireless Fiber VLAN Trunks, etc. Distribution / Core

14 Confidential The wired Topology #2 – Full redundant – each access switch supporting all VLAN trunking..(Eth1 Flat & Eth2 Trunked) Access /VLAN Trunk supported Router WAN Four separate and unique VLANs over the air ! POTS Voice 3270/5250/ANSI Emulation Data Ports are seen on one assigned VLANS but are sent out over the VLANs built for wireless Fiber VLAN Trunks, etc. Distribution / Core

15 Confidential Cisco’s implementation: Standards Based Management Interfaces Does not roam across VLANs Must rely on software to keep roam alive Session failure. Must re-authenticate when roaming to new VLAN. Creates STP (Spanning Tree) issues. Defeats Cisco’s “VLAN in a box” wired design. Must have supporting ethernet equipment to take advantage of AP feature sets.

16 Confidential Wireless Demonstration Overview

17 Confidential Wireless Demonstration Coverage Areas


Download ppt "Confidential Wireless Network Designs WS-5000 / VLAN Capabilities."

Similar presentations


Ads by Google