Cisco Cisco 5520 Wireless Controller 기술 참조
1
Cisco Systems, Inc.
www.cisco.com
Device Classification Guide
Revised Date: May, 2015
Introduction
Designing networks for BYODs implies offering RF conditions that will allow these devices to properly connect, maintain
their connection while in the cell, and roam seamlessly when needed. All BYODs offer the same functions such as Wi-Fi
connection management, support for real time applications over Wi-Fi, roaming, and so on. However, the chipset and
the underlying operating system both dictate variations in the behavior that might affect your design. For example, some
devices are dual band, and some are not. Some devices probe often, making them easy to locate even in the sleep mode.
Some devices stop probing when the screen is turned off, conserving battery but making the location of the devices
challenging.
their connection while in the cell, and roam seamlessly when needed. All BYODs offer the same functions such as Wi-Fi
connection management, support for real time applications over Wi-Fi, roaming, and so on. However, the chipset and
the underlying operating system both dictate variations in the behavior that might affect your design. For example, some
devices are dual band, and some are not. Some devices probe often, making them easy to locate even in the sleep mode.
Some devices stop probing when the screen is turned off, conserving battery but making the location of the devices
challenging.
Some operating systems partially implement roaming optimization protocols, such as 802.11r (Fast Transition—to
expedite secure roaming), 802.11k (Radio Resource Measurements—to discover neighboring APs faster), 802.11v
(Wireless Network Management—to increase the lifetime of the battery by reducing unnecessary exchanges with the AP
while the BYOD is in the sleep mode), or 802.11u (Internetworking with External Networks—to automatically associate
with Wi-Fi networks connecting to your phone service provider network in a secure manner).
expedite secure roaming), 802.11k (Radio Resource Measurements—to discover neighboring APs faster), 802.11v
(Wireless Network Management—to increase the lifetime of the battery by reducing unnecessary exchanges with the AP
while the BYOD is in the sleep mode), or 802.11u (Internetworking with External Networks—to automatically associate
with Wi-Fi networks connecting to your phone service provider network in a secure manner).
Some devices also offer enhanced security with 802.11w (Protection of Management Frames—to protect from spoofing
attacks). To help you design your wireless network, and decide what options to configure on your controller, see the
following table that lists the main BYOD models in the market, their probing and roaming behavior, and their support for
roaming or security optimization protocols.
attacks). To help you design your wireless network, and decide what options to configure on your controller, see the
following table that lists the main BYOD models in the market, their probing and roaming behavior, and their support for
roaming or security optimization protocols.