© 2007 Cisco Systems, Inc. All rights reserved.DESGN v2.08-1 Identifying Wireless Networking Considerations Understanding Wireless Network Controller Technology.

Презентация:



Advertisements
Похожие презентации
© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Wireless Networking Review Define the wireless requirements. Conduct an RF site survey to.
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved.ISCW v IPsec VPNs Cisco High Availability Options.
© 2005 Cisco Systems, Inc. All rights reserved.INTRO v Managing Your Network Environment Managing Cisco Devices.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v BGP Overview Establishing BGP Sessions.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v Customer-to-Provider Connectivity with BGP Connecting a Multihomed Customer to Multiple Service.
© 2006 Cisco Systems, Inc. All rights reserved.BCMSN v Wireless LANs Describing WLAN Topologies.
© 2006 Cisco Systems, Inc. All rights reserved. CIPT1 v Deployment of Cisco Unified CallManager Release 5.0 Endpoints Configuring Cisco Unified CallManager.
© 2003, Cisco Systems, Inc. All rights reserved. CSPFA Chapter 9 Routing.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v Extending Switched Networks with Virtual LANs Introducing VLAN Operations.
© 2006 Cisco Systems, Inc. All rights reserved. BSCI v Configuring EIGRP Using EIGRP in an Enterprise Network.
© 2006 Cisco Systems, Inc. All rights reserved.ISCW v IPsec VPNs Implementing the Cisco VPN Client.
Designing Virtual Private Networks © 2004 Cisco Systems, Inc. All rights reserved. Designing Site-to-Site VPNs ARCH v
© 2005 Cisco Systems, Inc. All rights reserved. BGP v BGP Overview Understanding BGP Path Attributes.
Copyright 2003 CCNA 4 Chapter 11 Scaling IP Addresses By Your Name.
© 2005 Cisco Systems, Inc. All rights reserved.INTRO v Operating and Configuring Cisco IOS Devices Configuring a Router.
© 2006 Cisco Systems, Inc. All rights reserved.IP6FD v Examining Mobility Examining Mobile IPv6.
© 2005 Cisco Systems, Inc. All rights reserved.INTRO v Building a Simple Serial Network Understanding the OSI Model.
© 2006 Cisco Systems, Inc. All rights reserved.ONT v Implement the DiffServ QoS Model Implementing QoS Preclassify.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v Determining IP Routes Introducing Distance Vector Routing.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v Route Selection Using Policy Controls Implementing Changes in BGP Policy.
Транксрипт:

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Identifying Wireless Networking Considerations Understanding Wireless Network Controller Technology

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v LWAPP Discovery 1. The access point issues a DHCPDISCOVER to get an IP address. 2. If the access point supports Layer 2 LWAPP, attempt Layer 2 discovery. 3.Else, attempt Layer 3 LWAPP discovery. 4. If no WLC response, then access point reboots and returns to Step 1.

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Layer 3 LWAPP Discovery Algorithm Access point sends Layer 3 LWAPP discovery requests: 1. As broadcasts on local subnet 2. As unicast LWAPP discovery requests to WLC IP addresses advertised by other access points, if OTAP enabled on the WLCs 3. To all previously stored WLC IP addresses 4. To IP addresses learned through DHCP Option To IP addresses learned through DNS resolution of CISCO-LWAPP-CONTROLLER.localdomain WLCs receiving the discovery message reply with a unicast LWAPP discovery response message. Access point compiles a list of candidate controllers.

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v WLC Selection Algorithm LWAPP discovery and selection mechanism is a design decision. LWAPP discovery response contains WLC information. After the LWAPP discovery interval timer, the access point selects a WLC to send an LWAPP join request based on: 1. Previously configured primary, secondary, or tertiary WLCs (specified in the controller sysName) 2. WLC configured as a master controller 3. WLC with the greatest capacity for access point associations The WLC validates the access point and sends an LWAPP join response. An encryption key is derived, and future messages are encrypted.

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Access Point Operations Access point downloads firmware from the WLC if its code version does not match the WLC. WLC provisions access point with the SSID, security, QoS, and other parameters. WLC periodically queries access points for status. Access point periodically sends an LWAPP heartbeat (every 30 seconds): –If heartbeat is not acknowledged, the access point resends. –If heartbeat is not acknowledged in five attempts, access point looks for a new WLC.

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v WLC Deployment Considerations Mobility Radio management Redundancy and load balancing Scaling IP addressing

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Mobility Defined Mobility is a key reason for wireless networks. Mobility means the end-user device is capable of moving to new location. Roaming occurs when a wireless client moves association from one access point and reassociates to another. Mobility presents new challenges: –Need to scale the architecture to support client roaming roaming can occur intracontroller and intercontroller. –Depending on the application, may need to support Layer 2 or Layer 3 roaming. –Need to support client roaming that is seamless (fast) and preserves security.

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Intracontroller Roaming Intracontroller roaming occurs when a client moves association to another access point joined to the same WLC. Client may need to be reauthenticated and new security session established. Controller updates client database entry with new access point and appropriate security context. No IP address refresh is needed.

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Intercontroller RoamingLayer 2 Traffic on same IP subnet Client database entry moved to new WLC Reauthenticated and new security session established as needed No IP address refresh needed

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Intercontroller RoamingLayer 3 Original WLC tagged as anchor Client database entry copied to new WLC, tagged as foreign Asymmetric traffic path New WLC uses different subnet; client IP address does not change

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Scaling the Architecture with Mobility Groups Mobility groups allow controllers to peer with each other to support seamless roaming across controller boundaries, access point load balancing, and controller redundancy. –Mobility messages are exchanged between controllers. –Data is tunneled between controllers in Ethernet-in-IP (EtherIP). Each WLC in a mobility group is configured with a list of other members. Access points learn the IP addresses of the other members of the mobility group after the LWAPP join process. Mobility groups support up to 24 controllers and 3600 access points. WLC should be placed in mobility groups when intercontroller roaming is possible and for controller redundancy.

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Mobility Group Requirements IP connectivity must exist between the management interfaces of all WLC devices. All WLCs must be configured with the same mobility group name. The mobility group name is case-sensitive. All WLCs must be configured to use the same virtual interface IP address. Each WLC is configured with the MAC address and IP address of all the other mobility group members. The WLCs exchange messages using UDP port (unencrypted) or UDP port (encrypted).

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Supporting Roaming Recommended Practices Minimize intercontroller roaming in your designs. Design the network for

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Controller Redundancy Design Access point selects its WLC with this sequence: [Deterministic] If an access point has been previously configured with a primary, secondary, or tertiary controller, the access point attempts to join these first (specified by controller sysName). [Initializing] The access point attempts to join a WLC configured as a master controller. [Dynamic] The access point attempts to join the WLC with the greatest availability for access point associations.

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Deterministic Controller Redundancy Administrator statically assigns each access point a primary, secondary, or tertiary controller. Advantages include: –Predictability (easier operational management) –More network stability –More flexible and powerful redundancy design options –Faster failover times –Fallback option in the case of failover Disadvantages include: –More upfront planning and configuration Recommended leading practice is to use deterministic redundancy.

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Example: Deterministic Controller Redundancy

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Dynamic Controller Redundancy Design relies on LWAPP to load-balance access points across controllers and populate access points with backup WLC information. –Design works better when controllers are clustered in a centralized design. Advantages include: –Easy to deploy and configure –Access points dynamically load-balance Disadvantages include: –More intercontroller roaming –Bigger operational challenges due to unpredictability –Longer failover times –No fallback option in the event of controller failure Recommended practice is not to use dynamic redundancy.

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Example: Dynamic Redundancy

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Deterministic Redundancy Designs: N + 1

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Deterministic Redundancy Designs: N + N

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Deterministic Redundancy Designs: N + N + 1

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Radio Resource Management Key RF challenges with : –Limited nonoverlapping channels –Physical characteristics of RF propagation –Contention for the medium –Transient nature of RF environments RRM addresses these challenges: –Continuous analysis of RF environment –Dynamic channel assignment –Interference detection and avoidance –Dynamic transmit power control –Coverage hole detection and correction –Client and network load balancing

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v RF Grouping 1. Access points send and receive neighbor messages.

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v RF Grouping 2. If access points on different WLCs hear neighbor messages in the same RF group at -80 dBm or stronger, they pass information to their WLC. 1. Access points send and receive neighbor messages.

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v RF Grouping 3. Controllers elect an RF group leader that analyzes RF data. 2. If access points on different WLCs hear neighbor messages in the same RF group at -80 dBm or stronger, they pass information to their WLC. 1. Access points send and receive neighbor messages.

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Access Point Self-Healing Access points receive neighbor messages from neighbor access points. Access points report a lost neighbor when they no longer receive neighbor messages at –65 dBm. RRM is used to increase power on access points near the lost access point. RRM can also adjust channel selection if needed.

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Summary A lightweight access point uses an LWAPP discovery and join process to connect to a WLC. Lightweight access points operate by communicating with a WLC. The Cisco Unified Wireless Network provides a high quality transparent roaming experience for clients supporting both intracontroller and intercontroller roaming. It is recommended using that you use deterministic controller redundancy over dynamic controller redundancy. RRM using RF groups is a foundation of the Cisco Unified Wireless Network architecture.

© 2007 Cisco Systems, Inc. All rights reserved.DESGN v