Where densities and advanced software feature capabilities are not as strong of a requirement, options with a more economical and common sparing preference are shown. Persistent Interference Avoidance—Allows the WLC to track and report non-Wi-Fi interferers to DCA. For instance, there may be a microwave oven that becomes quite active around lunchtime every day.
In typical deployments, one or more WLANs/service set identifiers are mapped to a VLAN interface, which is then mapped to a physical port. In a centralized design, wireless traffic is backhauled across the network infrastructure and terminated on the physical ports. how will an increase in temperature affect δg? With the use of a single physical port per WLAN, the throughput of each WLAN is limited to the throughput of the port. Therefore, an alternative is to deploy link aggregation across the distribution system ports, bundling them into a single high speed interface.
However, in grouping multiple channels to create a single channel, larger slices of the spectrum are consumed, decreasing the overall number of non-interfering channels to use with DCA. This can result in aggressive channel reuse if there are enough APs and increased co-channel interference, counter to the intended goal of throughput efficiency. RRM produces a network with optimal capacity, performance, and reliability. It frees you from having to continually monitor the network for noise and interference problems, which can be transient and difficult to troubleshoot. RRM ensures that clients enjoy a seamless, trouble-free connection throughout the Cisco wireless network. However, there is an additional consideration of power, equivalent to making lane wider or narrower .
One advantage of this design is that spanning tree dependence is minimized, and all uplinks from the access layer to the distribution are active and passing traffic. The primary function of the distribution layer is to aggregate access layer switches in a given building or campus. The distribution layer provides a boundary between the Layer 2 domain of the access layer and the Layer 3 domain that provides a path to the rest of the network. On the Layer 2 side, the distribution layer creates a boundary for spanning tree protocol , limiting propagation of Layer 2 faults. On the Layer 3 side, the distribution layer provides a logical point to summarize IP routing information when it enters the network. The summarization reduces IP route tables for easier troubleshooting and reduces protocol overhead for faster recovery from failures.
Classification—Managed using rogue location discovery protocol and switch port tracing in order to identify whether the rogue device is connected to the wired network. Rogue device classification rules also assist in filtering rogue devices into specific categories based on the characteristics of a device. It is significant to highlight that mDNS addresses used by Bonjour are link-local multicast addresses and are only forwarded within the local Layer 2 domain, because link-local multicast is meant to stay local by design.
Cisco ISE operates as a centralized AAA server that combines user authentication, user and administrator access control, and policy control in a single solution. Cisco ISE uses a rule-based policy model, which allows for security policies that grant access privileges based on many different attributes and conditions in addition to a user’s identity. Typically, the AAA server will implement the RADIUS protocol between itself and the WLC.
Capacity planning and trending—Baselining the network to gain a clearer understanding of what applications are consuming bandwidth and trending application use in order to help network administrators plan for infrastructure upgrades. Application Visibility on the Cisco Catalyst 9800 Series WLC by enabling Application Visibility for any WLAN wireless policy profile configured. Once you enable Application Visibility, the NBAR engine classifies applications for the configured WLAN. You can view Application Visibility on the WLC at an overall network level, per WLAN or per client. A key functional advantage of the Bonjour gateway is that it can be configured to selectively reply to Bonjour service requests, thus allowing for administrative control of Bonjour services within the enterprise. For Cisco Catalyst 9800 Series WLCs, Bonjour service policies are applied to Policy Profiles .
Using distribution switches to aggregate traffic logically creates ‘distribution blocks’. Each building has two distribution switches, and eight access layer switches. Traffic can route between distribution blocks through the core layer. The spine switch can also be configured to send EVPN routes learned in the Layer 2 VPN EVPN address family to the IPv4 or IPv6 unicast address family and advertise them to the external routing device. With this design, tenant traffic needs to take only one underlay hop to reach the external network. However, the spine switch needs to run the BGP-EVPN control plane and IP routing and the VXLAN VTEP function.
Cisco Catalyst switches provide both port aggregation protocol , which is a widely deployed Cisco designed protocol, and link aggregation protocol , which is based on IEEE 802.3ad. In a large campus deployment, the core layer switches may be located in a centralized data center in a different building. If insufficient optical pairs exist, then additional optical cabling would need to be pulled between the centralized data center and each of the buildings. Installing new conduit may involve getting the necessary right-of-way to trench and install underground conduit – on top of the cost to install the new fiber optic cable.