Welcome to Green Internet Next Generation Internet With Drop Box Flexibility Any Device Any Plane Any Time Checkout Our New Value-Added Services Powered by IEEE 802.11ac Wi-Fi
Smart Living … With Smart Phone…
Outdoor Wi-Fi Proof of Concept
Required Proposed Solution Proposed solution for implementation of wireless networking technology that uses radio waves to provide high-speed wireless internet and Intranet connections. All wireless networking equipment must be based on the IEEE standards of 802.11a, 802.11b, 802.11g, 802.11n and 802.11ac compatible. Prospect solution should provide the following: Required Technology Required Commercials • Lesser TCO Higher ROI & ROR. • Affordable with multiple Internet Packages • Lesser Cables More Wireless. • Students & Teachers. • Lesser Hardware More Software. • Professionals & Frequent Guest. • Lesser Devices Higher Coverage • VIP & Business Consumers. • Lesser Software More Features. • Lesser Complex More Secure. • Professional Services for Campus • Lesser Energy More Power. • Lesser Downtime Higher Performance. /Commercial Market . • Lesser Cost Higher Value For Consumers. • WIFI Internet & Valued De Services • Easy To Deploy, Easy To Maintain . • WIFI Based Security Surveillance • Easy To Subscribe, Easy To Cancel. • Easy To Pay, Easy To Configure. Monitoring. • WIFI Based Utility Monitoring And Alerts . • Highly scalable and Highly Available. • WIFI Based B2C Inter-office • Centralized for distributed management • Secure at Point of Prance & for end user Communication. • WIFI Based B2B Call Center Services devices • WIFI Based M2M Communication
Infrastructure Proposed Solution Provided with Point to Point & Point to multi point wireless connection for fixed home and for mobile user through hotspot, consume lesser power, providing higher speed, prepaid/postpaid online billing, push to talk ling,24x7 helpdesk monitoring & on demand valued-added Services, with provision of end to end NAC/IDS security Phase 1 Features Detail • Build a secure broadband campus-wide wireless network • Highly scalable backhaul to 20,000 connection . • 1 to 10 GB backhauls point to multi point. • Total BYOD (Bring Your Own Device ) based solution. • Affordable internet package for anyone with new and legacy devices. • Prepaid billing for HOTSPOT for mobile and rooming subscribers. • Post-paid billing for FIXED point to point home and commercial subscriber. • MULTI-FACTOR authentication for mobile and home user. • Hassel free AUTOMATE marketing, sales, & real time subscriber registration. • Guest management with NAC level clear pass with dynamic VLAN. • Highly efficient billing for pre/postpaid subscriber with VALUE-ADDED services. • Internet access POLICY and PROFILING for Home , Institution and Office user. • Over the air PUSH-TO-TALK to sales and support agent. • IAAS Cloud Datacenter Virtualization to save infrastructure & maintenance cost. • Total network core and end point monitoring with SLA management . • On-Grid and Off-Grid Save power up to 60 % by PVC for zero down-time. • On the sport wireless troubleshooting with field analyzer. • Radius based AAA through cut through proxy. • 20/80 network rule to save bandwidth recurring expenses. • 60% cache optimized bandwidth save recurring cost. • Internet standby link with load balancing to minimize downtime.
2 Phase WISP Value Added Services With the “One Stop Shop” offer solutions include value-added services that generate additional income. This strategy is based on each customer is sure to find the solution that is most appropriate for his specific needs. this end-to-end control of the solutions portfolio guarantees that customers benefit lower cost to have the most complete service possible. Wireless IPTV with STB Virtual Desktop Integration IPTV Solution is a set of IPTV software and hardware that forms a Graphics are rendered by encoding pixels on the host, Client just decodes the protocol rather than rendering graphics commands scalable IPTV solution for medium and large IPTV installations. • PCoIP Host Encoding • Local TV WI-FI Experience With In 50 Km, • All Data Fully Encrypted • SET-TOP-BOXES To Hybrid PRIVATE Video recoding • Superior USB Authentication • Faster To Market With Less Development Risk. • Host Hardware & Client Delivers • Single-vendor Solution – Deployed And Field Proven. • High-performance Applications • Private News, Lectures And Advertisement • Eliminate Desktop Maintenance • Local Gaming Server. • Simplification Cost Reduction • Rating And Charging for The IPTV Service. • No OS & Drivers Required • Creation And Management Of Tariff Plans • No Viruses Or Spyware • Video And Audio Conferencing. • No Hard Drive Or Fan • Subscriber Database Maintenance • Low Power & Heat • Creation Of Accounts Invoices • Access Cards Management • Financial Reporting Drop Box • Windows, Apple ,Linux and Android • Bring Your Photos, Docs, And Videos Anywhere share . • Easily With Friends, Family, And Teammates your Files . • Are Always Safe free For Windows, Mac, Linux, And Mobile.
BYOD Affordable To Any One With New & Legacy Device New & Legacy Computer Multimedia Next Generation Smart System IEEE 802.11g/n IEEE 802.11n/Ac Self Home Security Monitoring Self Home Utility Monitoring IEEE 802.11g/n IEEE 802.11g/n
Mobile Hotspot Fixed PtmP Fixed PtmP MO B I LI Ty • Adoption Policy Restrict, Limit, Allow, Embrace • Device Ownership Corp, Employee, Mix, Guests • Support Model IT managed, IT assisted, Self-supported • Support Level Production, Guest+, Guest, Best Effort • Data Security Limited, Basic, Enhanced and Advanced
• Set up, manage and secure wireless • Repeating and bridging functionality networks NAC built-in wireless extends WI-FI to be harder break then controller. Use the voucher-based wired network. system or backend authentication to control access and usage by integrating • Set up wireless hotspots and guest access the NAC with WISP billing solution detail with a simple, customizable voucher- in billing section. based system • SMS-based, two-factor authentication combined with Phone number and Device auto MAC address is all anyone needs for first time registration. • Hassel free automated marketing, sales and online registration/billing with scratch card buying from nearest outlet Access points need no manual configuration and are instantly protected by the NAC
Point to Multipoint Area Coverage
Project Kick Start Survey 1. Existing internet services provider survey. 14. Number of wireless deployment area. • Each and every internet service provider services. • Total area for estimation. 2. Existing availability of technologies survey. 15. Value added services survey. • 3G, 4G, Vmax, DSL • Smart campus. 3. Current services packages including:- 16. Environment survey all seasons. • Internet. • Power control from PV cells. • Cable services. • Temperatures. • Pollution. 4. Cost of internet affordable pricing survey. • Sunlight availability. • Individual capability of paying for standard or enhanced 17. Survey Network cabling designing . services. 18. Network product compliance. 5. Consumer’s simplicity of connectivity. • Will select 5 to 6 vendors. • What are the minimum connectivity resources required. • Products and features. • ISO Standards compliance. 6. Number and type mobile/PC/Laptop devices. • FCC Standards. • Non-smart devices. • IETF Standards (Internet Engineering Task Force). • Smart devices. • IEEE Standards. • Type of TV in each house of the premises. 19. Federal Communications Commission Standards. 7. User’s satisfaction survey from the current services. 20. Competitive internet bandwidth assessment. 8. Electric power availability survey for each pole. • From various providers. 9. Wi-Fi hot spots locations. 21. Network services downtown estimate. • Number of APs according to the density of consumers and • If bandwidth down what will be our loss and down time. • How to overcome. other connectivity requirements. • Secondary provider. • Time of recovery. 10. Warless signal to nose ratio survey. • Backup services. • No cross talk. • Alternate services. • Air clarity. • Emergency services. • More noise more power. • Insurance. 11. Line of site survey 22. IWSP and hotspot required application. • Site buildings, • Software required for WISP and Hotspot solution. • house and other obstacles 23. Solar power cost estimation survey 12. Density of consumer per square survey 24. All winter and summers. 13. Other business area outlet survey. • Market. 25. Project accurate cost estimates according to all of the above • Schools. • Hospitals. surveys. • Other places for consumers.
WISP Project Technical Milestone 1a Software Application Planning 2a 802.11ac Radio Planning 3a Hardware Considerations POC • Admission control planning of complete equipment • 5 GHz operation • Physical Network Connections requirements, as outlined in the section, is • Channel width of 20, 40, and 80 MHz • Backbone connectivity an important step in understanding what • Dynamic bandwidth signaling • Power requirements the network needs to do. Many of those • Support of MCS 0 to 7 up to 64-QAM • Security & Intrusion detection requirements can be translated into a • Minimum number of spatial streams • Link-layer encryption tentative plan that helps guide selection of • A-MPDU reception • Fast roaming hardware. • Security: TKIP & WEP negative tests • Authentication & Guest management 1b Voice Application Planning 2b Equipment Selection 3b Optional tests • Quds (WMM) & priority queuing • Wi-Fi Alliance • MCS 8 & 9 (256-QAM support) • Enable admission control • interoperability certification • Short guard interval at 80 MHz • WMM-AC • High performance • Space-time block coding (STBC) • Enable fast roaming • Hardware quality and robustness • Transmission of A-MPDUs • Dynamic data rate • Software functionality, • low-density parity-check (LDPC • Beacon frame transmission • upgradability, and quality • Single-user (SU) • Shorten DTIM interval • Antenna options • Transmit beam forming • Reduce retry counters • Power options • Security &Quality of service 3c Checklist 1c Multicast Application Planning • Manageability • Local Type Approval • Client count, density, and mix • Shorten the DTIM interval • Applications • Dynamic multicast frames 2c Wireless network Plane • Backbone switching • multicast-to-unicast conversion • Power requirements • (IGMP) snooping • Data forwarding plane • Security planning • Management plane • Architecture 1d Access Point Design Planning • Control plane • Hardware selection • Available Radio Channel Plane • Coverage and capacity planning • Modular Access Point Design • Coverage & Capacity Plane • Building an 802.11ac Network • AP mounting location Plane • Channel Selection • 2.4 & 5 GHz coverage Plane • Network Tuning and Optimization 2d Architecture comparison • Autonomous Access Points • Controller-based Access Points • Distributed Access Points
What is BYOD? Bring Your Quite simply BYOD stands for Bring Your Own Device and it means exactly that. BYOD refers to the growing trend of bringing subscribers their own wireless or mobile devices without any addition requirement . Devices such as smart phones, tablets, and laptops can connect to the secure wireless network for personal and/or professional reasons. For education facilities, a centralized BYOD policy can enforce to cover concerns \"The most radical change to the economics and the culture of client computing in business.” BYOD is Popular-and Growing Own Of CIO were Expected Of surveyed companies Device to Support BYOD In 2015 allow some or all By the end of 2014 Use their own devices
What is driving BYOD? “By the end of this year, the number of mobile connected devices will exceed the world’s population.”
Wireless Technology Draft Note Orthogonal frequency-division multiplexing (OFDM) 2.4 GHz WLAN / Wi-Fi Channel availability is a method of encoding digital data on multiple carrier In view of the differences in spectrum allocations around frequencies. OFDM has developed into a popular scheme the globe and different requirements for the regulatory for wideband digital communication, whether wireless or authorities, not all the WLAN channels are available in over copper wires, used in applications such as digital every country. The table below provides a broad indication television and audio broadcasting, DSL Internet access, of the availability of the different Wi-Fi channels in wireless networks, power line networks, and 4G mobile different parts of the world. communications. 3.6 GHz Wi-Fi band Frequency-hopping spread spectrum (FHSS) is a method This band of frequencies is only allowed for use within the of transmitting radio signals by rapidly switching USA under a scheme known as 802.11y. Here high a carrier among many frequency channels, using powered stations can be used as backhaul for networks, a pseudorandom sequence known to etc. both transmitter and receiver Direct-sequence Spread Spectrum (DSSS) 5 GHz Wi-Fi channels & frequencies is a modulation technique. As with other spread As the 2.4 GHz band becomes more crowded, many users spectrum technologies, the transmitted signal takes up are opting to use the 5 GHz ISM band. This not only more bandwidth than the information signal that provides more spectrum, but it is not as widely used by modulates the carrier or broadcast frequency. Wi-Fi as well as many other appliances including items such as microwave ovens Double-sideband suppressed-carrier transmission Channel capacity (DSB-SC) is transmission in which frequencies produced by is the tightest upper bound on the rate of information that amplitude modulation (AM) are symmetrically spaced can be reliably transmitted over a communications above and below the carrier frequency and the carrier channel. By the noisy-channel coding theorem, the level is reduced to the lowest practical level, ideally being channel capacity of a given channel is the limiting completely suppressed. information rate (in units of information per unit time) that can be achieved with arbitrarily small error probability Multiple input and multiple output, or MIMO is the use of multiple antennas at both the transmitter and receiver to improve communication performance. It is one of several forms of smart antenna technology.
IEEE 802.11 PHY STANDARDS 1997 802.11 2.4 20 DSSS, FHSS N/A 2mbits/sec 1999 802.11b 1999 802.11g 2.4 20 DSSS N/A 11mbits/sec 2003 802.11g 2009 802.11n 5 20 OFDM N/A 54mbits/sec 2012 802.11ad 2013 802.11ac 2.4 20, 40 DSSS, OFDM N/A 54mbits/sec 2.4, 5 2160 OFDM MIMIO up to 60 40, 80, 160 4 spatial 600mbits/sec 2.4, 5 40, 80, 160 DSB-SC, streams OFDM Beam forming >1.0 GB OFDM MIMO, UN- >1.2 GB MIMO up to 8 spatial streams
Evolutionary 802.11AC • IEEE 802.11 • IEEE 802.11g/a=Wi-Fi start to • IEEE 802.11ac • Data Rate 2 MBPS • Data Rate Up to 3.6 Gbps • Use case Internet become ubiquitous • First solution is< 1.8 GBPS • Data Rate 54 MBPS • USE Case :Whole-home coverage Video • Use case Rich-data With experience 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 • IEEE 802.11b • IEEE 802.11n • Data Rate 2 Mbps • Data rate up to 600 Most common is 150 • Use case Email Mbps • Enhanced range due to use of MIMO • Use Case Medium-resolution video steaming 802.11g 802.11n(3x3) 802.11ac 10 MBITS/SEC 54 MBITS/SEC 1.2 GBITS/SEC
Battery Efficiency All Media Take less Power Share 1 P2P 802.11ac Share 802.11n 802.11g Application Aware Database Web Server Streaming Server
Signal Strength .11ac Gbps 4 Walls Fastest Better Converge Near Filed Beam-Forming Communication 2
BYOD Service Level Tightly Secure Basic Access Enhanced Security BYOD NAC • Limited accesses. • Addition devices set • Any devices anywhere • Anyone, anywhere any • IT managed devices. • Wide range of devices • Guest not allowed. with low permission. • Corp and employee device. • All other devices are • It managed devices. • Wide range of devices. • Guest allowed with own devices with full • Corp and employee prohibited. • Required permission for limited network access on-site and off-site own devices with full each addition device. like P2P sharing . access. on-site and off-site • No network access like • Employee owned and • Devices side-security. • Guest devices only. access. P2P sharing guest devices with • Auto secure and • Device side-security • Guest/customer devices limited internet access devices policies with enhance security. only. • Customized native application.
NAC Features for BYOD Centralized Management Two-Factor Authentication Self-Service User Portal A • Add an additional level of • Self-service portal helps admin, P reducing the workload on help security to access many key desk. It provides personalized • NAC centrally manage and email and remote access monitor your entire estate with areas of the NAC Manger . one- services to authorized users— a single panel and it’s simple to use. time password solution requires • Manage multiple NAC Policy • Access and manage email from a single console no infrastructure and gives quarantine to release marked as spam • Configure web, email and secure access to the Web Admin, network filtering policies across • Create email sender whitelists to multiple sites or customers User Portal, SSL VPN, IPSec VPN, stop legitimate mail being quarantined, and create POP3 • View threat, network and Wi-Fi Hotspots and SSH login. accounts too hardware resource status across • Compatible with all OATH all your NACs at a glance • Download remote access client authentication systems software and configuration • Aggregate reporting across all • Supports soft tokens, hardware files.(SSL, PPTP, L2TP) your NACs or view just a single installation keys and mobile applications • Mobile users just scan the QR- code to get their one-time password
Man In The Middle Attack
How to Monitor WISP Network
ARP Attack WISP Worm Activity Suspicious Conversation Security Monitoring TCP Port Scanning DoS Attack The Matrix Tab
How HTTPS WORKS: SSL Explain
SSL Session Key Inside Out Explain
Two Factor Authentication Process
NAC Features Web Malware • In addition to NAC, Web Malware Protect from web pages providing behind-the-scenes protection by scanning for malware to block viruses or infected content from being uploaded to web site which spread to other users. • With NAC support team can stay productive while giving the peace of mind meeting regulatory and compliance requirements. Advanced Threat Protection Customizable Web Filtering Web Malware Protection • Advanced Threat Protection (ATP) • Select from over 35 million sites in 96 • Advanced web threat protection: combines multiple technologies to categories to create safe web • High-performance web malware add an additional layer of defense browsing policies minimize legal against targeted attacks on your concerns around inappropriate engine inspects all web traffic in real- network. content and maximize productivity. time • Uses layered protection to effectively IMPORTANT FOR BYOD • Advanced techniques like JavaScript prevent ATPs, command and control • Set policy by users and time, using a traffic and targeted attacks emulation block the latest web threats variety of authentication options • Performance-optimized Intrusion including IP or MAC address, active before they reach the browser Prevention System (IPS) identifies and directory SSO, e-directory SSO and • NAC continuously updates our threat blocks attacks through deep-packet LDAP. And, it syncs with Any endpoint inspection protection and the enterprise console, intelligence via the cloud, keeping you providing a single web security policy • When combined with Web, selective for users everywhere. ahead of new and emerging threats analysis of unidentified traffic in a • Manage spam quarantine and search cloud helps to constantly improve the threat data by Anti-Virus a personalized mail log. • Antivirus scanning keeps infected emails out of your mailbox • Protect confidential emails and sensitive data from unauthorized access
Mobile Hotspot Fixed PtmP Fixed PtmP MO B I LI Ty • Adoption Policy Restrict, Limit, Allow, Embrace • Device Ownership Corp, Employee, Mix, Guests • Support Model IT managed, IT assisted, Self-supported • Support Level Production, Guest+, Guest, Best Effort • Data Security Limited, Basic, Enhanced and Advanced
Solar Panel Off Grid 100-200W Mono Access Pint monocrystalline solar panel is the perfect item for off-grid application Sector Antenna Point to Multipoint covers 60 to 180 degree WIFI 802.11ac Client Mode Point-to-Multipoint 450 MB Connected to Local or nearest Pole Sending to Receiving from Hotspot/Fixed Base Station • Rocket M5 Titanium airMAX RF Connector: 2 x waterproof RP-SMA BaseStation Edge Router PoE is a newest product in • Power Supply: 24V, 1A POE Supply Ubiquiti EdgeMax line. ERPOE-5 is a five Included ports Gigabit Ethernet router with passive PoE • Power Method: Passive PoE Exide Equipment Gel ES900 12V 80Ah 4 Enterprise deployments with support batteries required for 48 hours total off- for OSPF, IPv6, Firewall, NAT, VPN, grid dc power DHCP STECA PR 30 AMP 12/24 VOLT PWM Alternate AC current input, with ground CHARGE CONTROLLERHigh End State of AC cable. If solar is not working. Charge control (SOC) • Professional battery care • Full graphical display • Automatic battery voltage detection • Full load protection
Different Wireless Antenna Application • Omni - 2.4GHz 10dBi to 13dBi • 2.4GHz 15dBi 90 to 120 Degree • 5GHz 15dBi 90 to 120 Degree • Omni - 3GHz 13dBi • 2.4GHz 16dBi 90 to 120 Degree • 5GHz 16dBi 90 to 120 Degree • Omni - 5GHz 10dBi to 13dBi • 2.4GHz 19dBi 90 to 120 Degree • 5GHz 19dBi 90 to 120 Degree • 2.4GHz 20dBi 90 to 120 Degree • 5GHz 20dBi 90 to 120 Degree • 5G-30: 5GHz AirMax 2x2 MIMO PtP Dish Antenna • Wall mounted • Dual polarized Dish Style antenna • Canopy Reflector 4pk • Yagi 900mhz Antenna 2x2 MIMO Dual Pole
Planning a WISP Solar Powered Tower Rocket M5 Rocket M5 Access point Edge Router POE + ++ 8 watts/hour 8 watts/hour 22 watts/hour 10 watts/hour Total Power 48 avg 50 watts /hour How much MAX. power do pole use The Battery Bank Backup = 12 hours (12 hours X watts/hours = total watts required ) 12hx50w=600 watts 600 watts X 2 = 1200 watts (50 % Battery depletion) 1200 watts/12v = to 100 Amp/Hour 2xAh battery =160 What size panel do you need 200watts panel X 8 hours = 1600watts/12v=133 Ah
• Set up, manage and secure wireless • Repeating and bridging functionality networks NAC built-in wireless extends WI-FI to be harder break then controller. Use the voucher-based wired network. system or backend authentication to control access and usage by integrating • Set up wireless hotspots and guest access the NAC with WISP billing solution detail with a simple, customizable voucher- in billing section. based system • SMS-based, two-factor authentication combined with Phone number and Device auto MAC address is all anyone needs for first time registration. • Hassel free automated marketing, sales and online registration/billing with scratch card buying from nearest outlet Access points need no manual configuration and are instantly protected by the NAC
How BYOD Works with Secure NAC Router Switch VLAN Server NAC RDIUS Auth VLAN Over Fiber Link Distance 100 Meters WISP Billing Wireless Controller & Other Local Vm Backup Application Servers (Mikrotik) PtMp works as PtMP PtMP PtMP PtMP PtMP Green Premium Network Transparent Bridge 0 1 2 3 4 Distance 3000 Meters Intermediate POE VLAN Over Point to Multi Point Wireless Link 5 port Switch Yellow Standard Network VLAN Server Client PtMP PtMP PtMP PtMP PtMP Guest Standard Network 0 1 2 3 4 Distance 5 Meters AP0 AP1 AP2 AP3 AP4 AP5 VLAN Over Access Point Wireless Link Distance 100 Meters Each Subscriber have their own Secure VLAN
Ipv6 Adoption !!! Reality That The World Is Running Out Of Ipv4 Addresses APNIC, which running out Internet Protocol addresses in the Asia-Pacific region, got two of the remaining seven blocks of 16.8 million IPv4 addresses from central authority IANA. Internet Assigned Numbers Authority (IANA) What is the Solution?
How Real Network Works (Nonat) WISP-Internal WISP Boundary Bandwidth Provider
NAC Security Picture for Green Network Point-to-Point Point-to-Multipoint Local Router Center Switch Office NAC RDIUS Secure protected network Wireless Controller protected protected network Local Vm Backup Unsecure protected network (Mikrotik) Green Premium Network Yellow Standard Network Guest Standard Network Internet
Wireless Mesh Topology Mesh Topology Pros Mesh Topology Cons • Architecturally, part mesh topology. • Weak QoS . • Break distances into a series of short hops. • Node failure, the rerouting causes severe delays • Interconnected intermediate radios/nodes. • Self-healing feature takes a toll on its performance • On failure, rerouted via other nodes dynamically. • increases the latency causing information • Wide converge self-forming and self-healing • Works on Nlos (non line of sight) conditions. • Single-network performance, versatility, reliability and resilience.
Smart Mesh Wireless Topology A1 A2 A3 B0 C0 A0 B1 B2 B3 A4 D0 E0 Wireless Controller C1 C2 C3
Smart Mesh Networking Think about it: you typically have to run wires to access points to enable a wireless LAN (WLAN). That didn’t sound right to us, either. So we developed our unique Smart Mesh Networking approach. With Smart Mesh Networking, you reduce cumbersome RF planning and costly cable backhaul, as Ethernet wiring is no longer needed to connect to individual access points. Enterprise WLAN deployment becomes dramatically faster, simpler, and less costly, as access points are simply plugged into any convenient power source. No extensive RF site surveys, cable runs, configuration, or optimization adjustments are required. Smart Mesh Networking is one of the first Wi-Fi meshing approach that combines high-gain smart antenna arrays, sophisticated RF routing, and centralized management in a single WLAN system. And it extends Smart Wi-Fi technology to create a new class of reliable WLANs that are self- organizing, self-optimizing, and self-healing. Smart Mesh Networking: • Offers high performance, by combining 802.11n with Smart Wi-Fi technology • Provides reliable connectivity between mesh nodes, using best path selection and interference mitigation techniques • Adapts in real time to environmental changes, ensuring highly- reliable and available wireless trunk links. Channel Fly, Ruckus’ novel approach to channel selection, improves capacity by up to 50 percent • Utilizes efficient “tree” topology that minimizes convergence risks and latency, while maximizing performance • Features easy, one-click setup and one-screen management • Half the time, half the cost, three times the performance
Smart Polling Smart Topology Smart polling • Limited hops between base station and end points • Enhances the link quality • Point -to-multipoint /point-to-point architecture. • Leveraging its smart-polling algorithm. • Packets dedicated streams. • Collisions cannot occur, • Information arrives at the right time • Allowing one transmit at a time • Minimal latency and delay. • Dynamically base station. • Aggregation Control Protocol (LACP) capable switches. • Asymmetric bandwidth. • Multiple-Input-Multiple-Output (MIMO) technology LACP switching
Link Aggregation Link aggregation is a computer networking term to describe various methods of combining (aggregating) multiple network connections in parallel to increase throughput beyond what a single connection could sustain, and to provide redundancy in case one of the links fail
NLoS Capability with MIMO Based on the Multiple-Input-Multiple-Output (MIMO) MIMO technology, multiple data. Multiple antennas for transmitter and the receiver to not just increase the odds of receiving g the signal but also offer performance gains by gathering and streamlining the reflected signal streams from various outdoor elements and obstacles. 90 Degree Angle Near Line of Site None Line of site 90 Degree Angle
Point to Multipoint Area Coverage 450MB+ link 4KM+ 2KM+ 50MB+LINK 0.5KM+ 2-4MB+LINK 0.25KM+
Point to Multipoint Area Coverage
Search