SlideShare une entreprise Scribd logo
1  sur  26
© 2014 AirTight Networks, Inc. All rights reserved.
Is 802.11ac Right For Your Network?
MatthewSMullin
RAFerruolo
Blog.airtightnetworks.com@MatthewSMullin
@RAFerruolo
© 2014 AirTight Networks, Inc. All rights reserved.
Agenda
• Throughput and Client Density: 11n vs. 11ac
• Use Case #1: Retail – Big Box Electronics
• Use Case #2: Hospitality – Conference Room
• Use Case #3: Education – Classroom
• 11ac Performance ROI
• The Giveaway
2
© 2014 AirTight Networks, Inc. All rights reserved.
3
Use Case
(5 GHz)
11n
(40 MHz)
11ac Wave 1
(40 MHz)
11ac Wave 1
(80 MHz)
Single Radio Throughput
(5 GHz only)
96 Mbps*
(11n 2x2 clients)
128 Mbps*
(11ac 2x2 clients)
277 Mbps*
(11ac 2x2 clients)
Multi AP Throughput w/o DFS
(Single interference zone, US)
384 Gbps*
(11n 2x2 clients, 4 APs/channels)
512 Gbps*
(11ac 2x2 clients, 4 APs/channels)
555 Gbps*
(11ac 2x2 clients, 2 APs/channels)
Multi AP Throughput w/ DFS
(Single interference zone, US)
1.2 Gbps*
(11n 2x2 clients, 12 APs/channels)
1.5 Gbps*
(11ac 2x2 clients, 12 APs/channels)
1.7 Gbps*
(11ac 2x2 clients, 6 APs/channels)
Max Client Density
(4 APs, 3 Mbps SLA)
128 Clients*
(11n 2x2 clients)
144 Clients**
(11ac 2x2 clients)
232 Clients***
(11ac 2x2 clients)
Video Streaming
(1 AP, 3 Mbps video)
16 Tablets*
(11n 1x1 tablets)
36 Tablets**
(11ac 2x2 tablets)
58 Tablets***
(11ac 2x2 tablets)
Throughput and Client Density: 11n vs. 11ac
*Estimated moderate density (16 - 30 clients active simultaneously) aggregate throughput capacity = 32 % max data rate
**Estimated high density (31 - 45 clients active simultaneously) aggregate throughput capacity = 27 % max data rate
***Estimated very high density (46 - 60 clients active simultaneously) aggregate throughput capacity = 20 % max data rate
© 2014 AirTight Networks, Inc. All rights reserved.
Use Case #1: Retail – Environment
Large Electronics Retailer
• Approximately 20,000 square feet / 1,858 square meters
• 1 single interference zone
• DFS channels are available
4
© 2014 AirTight Networks, Inc. All rights reserved.
Use Case #1: Retail – Requirements
Large Electronics Retailer
• WLAN services for customers, staff, HD security cameras and
showroom floor demo devices (e.g. tablets, smart phones, smart
projectors, smart televisions, smart appliances etc.)
• 10 Mbps SLA for guests, staff, demo devices and HD security
cameras
• HD video content locally hosted (for demo purposes)
5
© 2014 AirTight Networks, Inc. All rights reserved.
Use Case #1: Retail - Clients
6
Customers
Staff
Demo Devices
HD Security Cameras
© 2014 AirTight Networks, Inc. All rights reserved.
Use Case #1: Retail - Applications
7
Customers Staff Demo Devices HD Security Cameras
© 2014 AirTight Networks, Inc. All rights reserved.
Use Case #1: Retail – AP Estimator
8
AP Estimator
*For estimation purposes only. Does not factor in client performance issues, ambient interference (WiFi and/or Non-WiFi), per
application throughput and latency requirements, etc.
WLAN
11n/1ss
40MHz
11n/2ss
40MHz
11n/3ss
40MHz
11ac/1ss
80MHz
11ac/2ss
80MHz
11ac/3ss
80MHz
Total/Avg
Radio %
Required
APs*
Required
Max
Clients
Customer Clients 10 10 20
Staff Clients 10 10
Demo Clients 10 5 5 10 5 5 40
Security Clients 5 5
Total Clients 25 5 5 20 15 5 75
MDR (Max Data Rate) - Mbps 150 300 450 433 867 1300 583
Aggregate MDR - Gbps 3750 1500 2250 8660 13005 6500 35665
Average MDR - Mbps 476
Estimated single client throughput = 60 % of MDR 285
Estimated low density (2 - 15 clients) aggregate throughput = 35 % of MDR 166 4.5 5 75
Estimated moderate density (16 - 30 clients) aggregate throughput = 32 % of MDR 152 4.9 5 150
Estimated high density (31 - 45 clients) aggregate throughput = 27 % of MDR 128 5.8 6 270
Estimated very high density (46 - 60 clients) aggregate throughput = 20 % of MDR 95 7.9 8 480
SLA - Mbps 10
Aggregate Throughput Required - Mbps 750
© 2014 AirTight Networks, Inc. All rights reserved.
Use Case #1: Retail – Solution
9
AirTight Management Console in the Cloud
5 Units
11ac AP
© 2014 AirTight Networks, Inc. All rights reserved.
Use Case #2: Hospitality – Environment
Hotel Conference Room
• Conference room approximately 10,000 square feet / 929 square meters
• 1 single interference zone
• DFS channels are available
10
© 2014 AirTight Networks, Inc. All rights reserved.
Use Case #2: Hospitality – Requirements
Hotel Conference Room
• WLAN services for guests, staff, HD security cameras and A/V
devices (e.g. projectors, digital signs, etc.)
• 3 Mbps SLA for guests, staff, A/V devices and HD security
cameras
11
© 2014 AirTight Networks, Inc. All rights reserved.
Use Case #2: Hospitality - Clients
12
Guests
Staff
A/V DevicesHD Security Cameras
© 2014 AirTight Networks, Inc. All rights reserved.
Use Case #2: Hospitality - Applications
13
Guests Staff Hotel A/V HD Security Cameras
© 2014 AirTight Networks, Inc. All rights reserved.
Use Case #2: Hospitality – AP Estimator
14
AP Estimator
WLAN
11n/1ss
40MHz
11n/2ss
40MHz
11n/3ss
40MHz
11ac/1ss
80MHz
11ac/2ss
80MHz
11ac/3ss
80MHz
Total/Avg
Radio %
Required
APs*
Required
Max
Clients
Guest Clients 30 20 10 20 15 5 100
Staff Clients 3 3
A/V Clients 4 4
Security Clients 3 3
Total Clients 37 20 10 20 18 5 110
MDR (Max Data Rate) - Mbps 150 300 450 433 867 1300 583
Aggregate MDR - Gbps 5550 6000 4500 8660 15606 6500 46816
Average MDR - Mbps 426
Estimated single client throughput = 60 % of MDR 255
Estimated low density (2 - 15 clients) aggregate throughput = 35 % of MDR 149 2.2 3 45
Estimated moderate density (16 - 30 clients) aggregate throughput = 32 % of MDR 136 2.4 3 90
Estimated high density (31 - 45 clients) aggregate throughput = 27 % of MDR 115 2.9 3 135
Estimated very high density (46 - 60 clients) aggregate throughput = 20 % of MDR 85 3.9 4 240
SLA - Mbps 3
Aggregate Throughput Required - Mbps 330
*For estimation purposes only. Does not factor in client performance issues, ambient interference (WiFi and/or Non-WiFi), per
application throughput and latency requirements, etc.
© 2014 AirTight Networks, Inc. All rights reserved.
Use Case #2: Hospitality – Solution
15
AirTight Management Console in the Cloud
3 Units
11ac AP
© 2014 AirTight Networks, Inc. All rights reserved.
Use Case #3: Education – Environment
Elementary School Classroom
• Approximately 1,000 square feet / 92 square meters
• 1 single interference zone
• DFS channels are available
16
© 2014 AirTight Networks, Inc. All rights reserved.
Use Case #3: Education – Requirements
High School Classroom
• WLAN services for students, staff, HD security cameras and A/V
devices (e.g. projectors, Apple TVs, printers, etc.)
• 5 Mbps SLA for guests, staff, A/V devices and HD security
cameras
• Some HD video content locally hosted for instruction purposes
17
© 2014 AirTight Networks, Inc. All rights reserved.
Use Case #3: Education - Clients
18
Students
A/V Devices
HD Security Cameras
Faculty
© 2014 AirTight Networks, Inc. All rights reserved.
Use Case #3: Education - Applications
19
Students A/V Devices HD Security CamerasFaculty
© 2014 AirTight Networks, Inc. All rights reserved.
Use Case #3: Education – AP Estimator
20
AP Estimator
WLAN
11n/1ss
40MHz
11n/2ss
40MHz
11n/3ss
40MHz
11ac/1ss
80MHz
11ac/2ss
80MHz
11ac/3ss
80MHz
Total/Avg
Radio %
Required
APs*
Required
Max
Clients
Student Clients 30 30
Faculty Clients 1 1 2
A/V Clients 2 2
Security Clients 1 1
Total Clients 4 1 0 0 30 0 35
MDR (Max Data Rate) - Mbps 150 300 450 433 867 1300 583
Aggregate MDR - Gbps 600 300 0 0 26010 0 26910
Average MDR - Mbps 769
Estimated single client throughput = 60 % of MDR 461
Estimated low density (2 - 15 clients) aggregate throughput = 35 % of MDR 269 0.7 1 15
Estimated moderate density (16 - 30 clients) aggregate throughput = 32 % of MDR 246 0.7 1 30
Estimated high density (31 - 45 clients) aggregate throughput = 27 % of MDR 208 0.8 1 45
Estimated very high density (46 - 60 clients) aggregate throughput = 20 % of MDR 154 1.1 2 120
SLA - Mbps 5
Aggregate Throughput Required - Mbps 175
*For estimation purposes only. Does not factor in client performance issues, ambient interference (WiFi and/or Non-WiFi), per
application throughput and latency requirements, etc.
© 2014 AirTight Networks, Inc. All rights reserved.
Use Case #3: Classroom – Solution
21
AirTight Management Console in the Cloud
1 Unit
11ac AP
© 2014 AirTight Networks, Inc. All rights reserved. 22
Use Case Considerations 11ac Gains
K-12/1-for-1 environment Just refreshed client base to 11n clients Low (near term)
K-12/1-for-1 environment Just refreshed client base to 11ac clients High
Quick Service Restaurant 10 Mbps internet link Low
Box/Electronic Store Fair number of 11ac demo devices High
Hotel Conference Room Higher ratio of 11n to 11ac clients Medium
University Lecture Hall High percentage of 11ac Macbooks High
Carpeted Enterprise Office Need to support Microsoft Lync High
Hospital Need to support Vo-Fi handsets High
11ac Performance ROI
© 2014 AirTight Networks, Inc. All rights reserved.
C-75 Trade-Up Program
23
Upgrade Your Wireless Network to 11ac Today!
Reduce the cost of your wireless network upgrade to 802.11ac with our
competitive trade-up promotion.
• Up to 50% off our industry leading 3x3x3 11ac products
• Up to 50% compared to AirTight 11n product
• Limited time only promotion that ends Oct 31st, 2014...
For more info email ask@airtightnetworks.com
#11acTradeUp
© 2014 AirTight Networks, Inc. All rights reserved.
Additional Resources
www.airtightnetworks.com/11ac
802.11ac Data Sheets
For C-75 and C-75-E Access
Points
802.11ac White Paper
Essential Considerations
802.11ac Migration
Qualifying and Planning Questions
24
© 2014 AirTight Networks, Inc. All rights reserved.
Session 1: Intro to 11ac
Session 2: 11ac Feature Deep Dive
Session 3: Is 11ac Right for Your Network?
Session 4: 11ac Deployment Best Practices
Session 5: 11ac Channel Capacity Planning
Session 6: 11ac Network Optimization
11ac Webinar Series
25
© 2014 AirTight Networks, Inc. All rights reserved.
Thank You!
Send inquiries to Ask@airtightnetworks.com
Next webinar: Tuesday, Aug 19th, 8am & 6pm Pacific.
“802.11ac Deployment Best Practices.”
@RAFerruolo & @MatthewSMullin
26
@AirTight AirTight NetworksBlog.airtightnetworks.com

Contenu connexe

Tendances

Synchronization protection & redundancy in ng networks itsf 2015
Synchronization protection & redundancy in ng networks   itsf 2015Synchronization protection & redundancy in ng networks   itsf 2015
Synchronization protection & redundancy in ng networks itsf 2015Daniel Sproats
 
ADVA, Acacia and Inphi demo best-in-breed 400ZR DCI solution
ADVA, Acacia and Inphi demo best-in-breed 400ZR DCI solutionADVA, Acacia and Inphi demo best-in-breed 400ZR DCI solution
ADVA, Acacia and Inphi demo best-in-breed 400ZR DCI solutionADVA
 
The Poacher and the Gamekeeper: Synchronization Delivery and Assurance
The Poacher and the Gamekeeper: Synchronization Delivery and AssuranceThe Poacher and the Gamekeeper: Synchronization Delivery and Assurance
The Poacher and the Gamekeeper: Synchronization Delivery and AssuranceADVA
 
Small Cell Backhaul Technology
Small Cell Backhaul TechnologySmall Cell Backhaul Technology
Small Cell Backhaul TechnologyAviat Networks
 
AnyCell Connectivity Supporting Any Mobile Radio Technology
AnyCell Connectivity   Supporting Any Mobile Radio TechnologyAnyCell Connectivity   Supporting Any Mobile Radio Technology
AnyCell Connectivity Supporting Any Mobile Radio TechnologyADVA
 
Introducing One Network Edge
Introducing One Network EdgeIntroducing One Network Edge
Introducing One Network EdgeADVA
 
Introducing the Future of Data Center Interconnect Networks
Introducing the Future of Data Center Interconnect NetworksIntroducing the Future of Data Center Interconnect Networks
Introducing the Future of Data Center Interconnect NetworksADVA
 
Ceragon Networks: Enabling Mobile Broadband in Asia - Creative Approaches
Ceragon Networks: Enabling Mobile Broadband in Asia - Creative ApproachesCeragon Networks: Enabling Mobile Broadband in Asia - Creative Approaches
Ceragon Networks: Enabling Mobile Broadband in Asia - Creative ApproachesCeragon
 
Get started on SIGFOX
Get started on SIGFOXGet started on SIGFOX
Get started on SIGFOXRyan Derouin
 
Conquering the 802.11ac Shift
Conquering the 802.11ac ShiftConquering the 802.11ac Shift
Conquering the 802.11ac ShiftCisco Mobility
 
PLNOG14 - Wireless Cloud, a new business for operators - Jochen Müdsam
PLNOG14 - Wireless Cloud, a new business for operators - Jochen MüdsamPLNOG14 - Wireless Cloud, a new business for operators - Jochen Müdsam
PLNOG14 - Wireless Cloud, a new business for operators - Jochen MüdsamPROIDEA
 
NETCONF Call Home
NETCONF Call Home NETCONF Call Home
NETCONF Call Home ADVA
 
Cisco Unified Wireless Network and Converged access – Design session
Cisco Unified Wireless Network and Converged access – Design sessionCisco Unified Wireless Network and Converged access – Design session
Cisco Unified Wireless Network and Converged access – Design sessionCisco Russia
 

Tendances (20)

Synchronization protection & redundancy in ng networks itsf 2015
Synchronization protection & redundancy in ng networks   itsf 2015Synchronization protection & redundancy in ng networks   itsf 2015
Synchronization protection & redundancy in ng networks itsf 2015
 
Narrow band internet of things
Narrow band internet of thingsNarrow band internet of things
Narrow band internet of things
 
ADVA, Acacia and Inphi demo best-in-breed 400ZR DCI solution
ADVA, Acacia and Inphi demo best-in-breed 400ZR DCI solutionADVA, Acacia and Inphi demo best-in-breed 400ZR DCI solution
ADVA, Acacia and Inphi demo best-in-breed 400ZR DCI solution
 
The Poacher and the Gamekeeper: Synchronization Delivery and Assurance
The Poacher and the Gamekeeper: Synchronization Delivery and AssuranceThe Poacher and the Gamekeeper: Synchronization Delivery and Assurance
The Poacher and the Gamekeeper: Synchronization Delivery and Assurance
 
4 healthcare forum deploying vocera on aruba wlan_kevin huey
4 healthcare forum deploying vocera on aruba wlan_kevin huey4 healthcare forum deploying vocera on aruba wlan_kevin huey
4 healthcare forum deploying vocera on aruba wlan_kevin huey
 
Small Cell Backhaul Technology
Small Cell Backhaul TechnologySmall Cell Backhaul Technology
Small Cell Backhaul Technology
 
AnyCell Connectivity Supporting Any Mobile Radio Technology
AnyCell Connectivity   Supporting Any Mobile Radio TechnologyAnyCell Connectivity   Supporting Any Mobile Radio Technology
AnyCell Connectivity Supporting Any Mobile Radio Technology
 
Introducing One Network Edge
Introducing One Network EdgeIntroducing One Network Edge
Introducing One Network Edge
 
Introducing the Future of Data Center Interconnect Networks
Introducing the Future of Data Center Interconnect NetworksIntroducing the Future of Data Center Interconnect Networks
Introducing the Future of Data Center Interconnect Networks
 
Ruckus Corporate Overview
Ruckus Corporate OverviewRuckus Corporate Overview
Ruckus Corporate Overview
 
Ceragon Networks: Enabling Mobile Broadband in Asia - Creative Approaches
Ceragon Networks: Enabling Mobile Broadband in Asia - Creative ApproachesCeragon Networks: Enabling Mobile Broadband in Asia - Creative Approaches
Ceragon Networks: Enabling Mobile Broadband in Asia - Creative Approaches
 
LPWAN for IoT
LPWAN for IoTLPWAN for IoT
LPWAN for IoT
 
Get started on SIGFOX
Get started on SIGFOXGet started on SIGFOX
Get started on SIGFOX
 
Conquering the 802.11ac Shift
Conquering the 802.11ac ShiftConquering the 802.11ac Shift
Conquering the 802.11ac Shift
 
Lora vs Zigbee
Lora vs ZigbeeLora vs Zigbee
Lora vs Zigbee
 
PLNOG14 - Wireless Cloud, a new business for operators - Jochen Müdsam
PLNOG14 - Wireless Cloud, a new business for operators - Jochen MüdsamPLNOG14 - Wireless Cloud, a new business for operators - Jochen Müdsam
PLNOG14 - Wireless Cloud, a new business for operators - Jochen Müdsam
 
Outdoor network engineering jeffrey weaver
Outdoor network engineering jeffrey weaverOutdoor network engineering jeffrey weaver
Outdoor network engineering jeffrey weaver
 
NETCONF Call Home
NETCONF Call Home NETCONF Call Home
NETCONF Call Home
 
Cisco Unified Wireless Network and Converged access – Design session
Cisco Unified Wireless Network and Converged access – Design sessionCisco Unified Wireless Network and Converged access – Design session
Cisco Unified Wireless Network and Converged access – Design session
 
LoRaWAN for IoT
LoRaWAN for IoTLoRaWAN for IoT
LoRaWAN for IoT
 

Similaire à Is 11ac Right for Your Network?

Hospitality’s Wi-Fi Roadmap
Hospitality’s Wi-Fi RoadmapHospitality’s Wi-Fi Roadmap
Hospitality’s Wi-Fi RoadmapXirrus
 
Designing For Voice - #WLPC 10 talk
Designing For Voice - #WLPC 10 talkDesigning For Voice - #WLPC 10 talk
Designing For Voice - #WLPC 10 talkMike Leibovitz
 
Webinar NETGEAR - Linee guida per il disegno di una rete wireless a elevate p...
Webinar NETGEAR - Linee guida per il disegno di una rete wireless a elevate p...Webinar NETGEAR - Linee guida per il disegno di una rete wireless a elevate p...
Webinar NETGEAR - Linee guida per il disegno di una rete wireless a elevate p...Netgear Italia
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld
 
Aruba Rightsizing Your Network
Aruba Rightsizing Your NetworkAruba Rightsizing Your Network
Aruba Rightsizing Your Networkhypknight
 
Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerADVA
 
Juniper wlan highdensity_webinar
Juniper wlan highdensity_webinarJuniper wlan highdensity_webinar
Juniper wlan highdensity_webinarHaluk Ulubay
 
Scalable and Secure Connectivity for Seamless Cloud Evolution
Scalable and Secure Connectivity for Seamless Cloud EvolutionScalable and Secure Connectivity for Seamless Cloud Evolution
Scalable and Secure Connectivity for Seamless Cloud EvolutionADVA
 
Tw Telecom Corporate Overview 0708
Tw Telecom Corporate Overview 0708Tw Telecom Corporate Overview 0708
Tw Telecom Corporate Overview 0708ceverson
 
Secure WDM Connectivity for High-Bandwidth Applications
Secure WDM Connectivity for High-Bandwidth ApplicationsSecure WDM Connectivity for High-Bandwidth Applications
Secure WDM Connectivity for High-Bandwidth ApplicationsADVA
 
Broadband Access Over Satellite: For Consumer, SOHO and SME
Broadband Access Over Satellite: For Consumer, SOHO and SMEBroadband Access Over Satellite: For Consumer, SOHO and SME
Broadband Access Over Satellite: For Consumer, SOHO and SMEST Engineering iDirect
 
Carrier grade wi fi integration architecture
Carrier grade wi fi integration architectureCarrier grade wi fi integration architecture
Carrier grade wi fi integration architectureSatish Chavan
 

Similaire à Is 11ac Right for Your Network? (20)

Designing for the all wireless office ash chowdappa-kelly griffin
Designing for the all wireless office ash chowdappa-kelly griffinDesigning for the all wireless office ash chowdappa-kelly griffin
Designing for the all wireless office ash chowdappa-kelly griffin
 
Hospitality’s Wi-Fi Roadmap
Hospitality’s Wi-Fi RoadmapHospitality’s Wi-Fi Roadmap
Hospitality’s Wi-Fi Roadmap
 
Designing For Voice - #WLPC 10 talk
Designing For Voice - #WLPC 10 talkDesigning For Voice - #WLPC 10 talk
Designing For Voice - #WLPC 10 talk
 
Webinar NETGEAR - Linee guida per il disegno di una rete wireless a elevate p...
Webinar NETGEAR - Linee guida per il disegno di una rete wireless a elevate p...Webinar NETGEAR - Linee guida per il disegno di una rete wireless a elevate p...
Webinar NETGEAR - Linee guida per il disegno di una rete wireless a elevate p...
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
 
Aruba Rightsizing Your Network
Aruba Rightsizing Your NetworkAruba Rightsizing Your Network
Aruba Rightsizing Your Network
 
Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network Layer
 
11ac and client match for the awo ash chowdappa
11ac and client match for the awo ash chowdappa11ac and client match for the awo ash chowdappa
11ac and client match for the awo ash chowdappa
 
Juniper wlan highdensity_webinar
Juniper wlan highdensity_webinarJuniper wlan highdensity_webinar
Juniper wlan highdensity_webinar
 
2012 ah apj wi fi design for voice & video
2012 ah apj   wi fi design for voice & video2012 ah apj   wi fi design for voice & video
2012 ah apj wi fi design for voice & video
 
Scalable and Secure Connectivity for Seamless Cloud Evolution
Scalable and Secure Connectivity for Seamless Cloud EvolutionScalable and Secure Connectivity for Seamless Cloud Evolution
Scalable and Secure Connectivity for Seamless Cloud Evolution
 
Tw Telecom Corporate Overview 0708
Tw Telecom Corporate Overview 0708Tw Telecom Corporate Overview 0708
Tw Telecom Corporate Overview 0708
 
Secure WDM Connectivity for High-Bandwidth Applications
Secure WDM Connectivity for High-Bandwidth ApplicationsSecure WDM Connectivity for High-Bandwidth Applications
Secure WDM Connectivity for High-Bandwidth Applications
 
Experience the Windstream Advantage
Experience the Windstream AdvantageExperience the Windstream Advantage
Experience the Windstream Advantage
 
Broadband Access Over Satellite: For Consumer, SOHO and SME
Broadband Access Over Satellite: For Consumer, SOHO and SMEBroadband Access Over Satellite: For Consumer, SOHO and SME
Broadband Access Over Satellite: For Consumer, SOHO and SME
 
Breakout - Airheads Macau 2013 - 11ac Migration (7200)
Breakout - Airheads Macau 2013 - 11ac Migration (7200)Breakout - Airheads Macau 2013 - 11ac Migration (7200)
Breakout - Airheads Macau 2013 - 11ac Migration (7200)
 
CTIA 2010 Corporate Overview
CTIA 2010 Corporate OverviewCTIA 2010 Corporate Overview
CTIA 2010 Corporate Overview
 
Carrier grade wi fi integration architecture
Carrier grade wi fi integration architectureCarrier grade wi fi integration architecture
Carrier grade wi fi integration architecture
 
Best Practices on Migrating to 802.11ac Wi-Fi
Best Practices on Migrating to 802.11ac Wi-FiBest Practices on Migrating to 802.11ac Wi-Fi
Best Practices on Migrating to 802.11ac Wi-Fi
 
EMEA Airheads – Aruba controller features used to optimize performance
EMEA Airheads – Aruba controller features used to optimize performanceEMEA Airheads – Aruba controller features used to optimize performance
EMEA Airheads – Aruba controller features used to optimize performance
 

Plus de AirTight Networks

Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014AirTight Networks
 
Wi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise ThyselfWi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise ThyselfAirTight Networks
 
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014AirTight Networks
 
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration AirTight Networks
 
AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6AirTight Networks
 
AirTight social wifi solution brief
AirTight social wifi solution briefAirTight social wifi solution brief
AirTight social wifi solution briefAirTight Networks
 
Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013AirTight Networks
 
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...AirTight Networks
 
Survey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise SecuritySurvey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise SecurityAirTight Networks
 
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...AirTight Networks
 
Non WiFi interference combat guide 1
Non WiFi interference combat guide 1Non WiFi interference combat guide 1
Non WiFi interference combat guide 1AirTight Networks
 
WPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQsWPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQsAirTight Networks
 
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation StrategiesWPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation StrategiesAirTight Networks
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseAirTight Networks
 
Windows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseWindows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseAirTight Networks
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsAirTight Networks
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresAirTight Networks
 
Retail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsRetail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsAirTight Networks
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseAirTight Networks
 

Plus de AirTight Networks (20)

Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
 
Wi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise ThyselfWi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise Thyself
 
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
 
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
 
AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6
 
AirTight social wifi solution brief
AirTight social wifi solution briefAirTight social wifi solution brief
AirTight social wifi solution brief
 
Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013
 
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
 
Survey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise SecuritySurvey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise Security
 
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
 
Non WiFi interference combat guide 1
Non WiFi interference combat guide 1Non WiFi interference combat guide 1
Non WiFi interference combat guide 1
 
WPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQsWPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQs
 
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation StrategiesWPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the Enterprise
 
Windows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseWindows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the Enterprise
 
802.11w Tutorial
802.11w Tutorial802.11w Tutorial
802.11w Tutorial
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
 
Retail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsRetail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—Recommendations
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your Enterprise
 

Dernier

Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 

Dernier (20)

Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 

Is 11ac Right for Your Network?

  • 1. © 2014 AirTight Networks, Inc. All rights reserved. Is 802.11ac Right For Your Network? MatthewSMullin RAFerruolo Blog.airtightnetworks.com@MatthewSMullin @RAFerruolo
  • 2. © 2014 AirTight Networks, Inc. All rights reserved. Agenda • Throughput and Client Density: 11n vs. 11ac • Use Case #1: Retail – Big Box Electronics • Use Case #2: Hospitality – Conference Room • Use Case #3: Education – Classroom • 11ac Performance ROI • The Giveaway 2
  • 3. © 2014 AirTight Networks, Inc. All rights reserved. 3 Use Case (5 GHz) 11n (40 MHz) 11ac Wave 1 (40 MHz) 11ac Wave 1 (80 MHz) Single Radio Throughput (5 GHz only) 96 Mbps* (11n 2x2 clients) 128 Mbps* (11ac 2x2 clients) 277 Mbps* (11ac 2x2 clients) Multi AP Throughput w/o DFS (Single interference zone, US) 384 Gbps* (11n 2x2 clients, 4 APs/channels) 512 Gbps* (11ac 2x2 clients, 4 APs/channels) 555 Gbps* (11ac 2x2 clients, 2 APs/channels) Multi AP Throughput w/ DFS (Single interference zone, US) 1.2 Gbps* (11n 2x2 clients, 12 APs/channels) 1.5 Gbps* (11ac 2x2 clients, 12 APs/channels) 1.7 Gbps* (11ac 2x2 clients, 6 APs/channels) Max Client Density (4 APs, 3 Mbps SLA) 128 Clients* (11n 2x2 clients) 144 Clients** (11ac 2x2 clients) 232 Clients*** (11ac 2x2 clients) Video Streaming (1 AP, 3 Mbps video) 16 Tablets* (11n 1x1 tablets) 36 Tablets** (11ac 2x2 tablets) 58 Tablets*** (11ac 2x2 tablets) Throughput and Client Density: 11n vs. 11ac *Estimated moderate density (16 - 30 clients active simultaneously) aggregate throughput capacity = 32 % max data rate **Estimated high density (31 - 45 clients active simultaneously) aggregate throughput capacity = 27 % max data rate ***Estimated very high density (46 - 60 clients active simultaneously) aggregate throughput capacity = 20 % max data rate
  • 4. © 2014 AirTight Networks, Inc. All rights reserved. Use Case #1: Retail – Environment Large Electronics Retailer • Approximately 20,000 square feet / 1,858 square meters • 1 single interference zone • DFS channels are available 4
  • 5. © 2014 AirTight Networks, Inc. All rights reserved. Use Case #1: Retail – Requirements Large Electronics Retailer • WLAN services for customers, staff, HD security cameras and showroom floor demo devices (e.g. tablets, smart phones, smart projectors, smart televisions, smart appliances etc.) • 10 Mbps SLA for guests, staff, demo devices and HD security cameras • HD video content locally hosted (for demo purposes) 5
  • 6. © 2014 AirTight Networks, Inc. All rights reserved. Use Case #1: Retail - Clients 6 Customers Staff Demo Devices HD Security Cameras
  • 7. © 2014 AirTight Networks, Inc. All rights reserved. Use Case #1: Retail - Applications 7 Customers Staff Demo Devices HD Security Cameras
  • 8. © 2014 AirTight Networks, Inc. All rights reserved. Use Case #1: Retail – AP Estimator 8 AP Estimator *For estimation purposes only. Does not factor in client performance issues, ambient interference (WiFi and/or Non-WiFi), per application throughput and latency requirements, etc. WLAN 11n/1ss 40MHz 11n/2ss 40MHz 11n/3ss 40MHz 11ac/1ss 80MHz 11ac/2ss 80MHz 11ac/3ss 80MHz Total/Avg Radio % Required APs* Required Max Clients Customer Clients 10 10 20 Staff Clients 10 10 Demo Clients 10 5 5 10 5 5 40 Security Clients 5 5 Total Clients 25 5 5 20 15 5 75 MDR (Max Data Rate) - Mbps 150 300 450 433 867 1300 583 Aggregate MDR - Gbps 3750 1500 2250 8660 13005 6500 35665 Average MDR - Mbps 476 Estimated single client throughput = 60 % of MDR 285 Estimated low density (2 - 15 clients) aggregate throughput = 35 % of MDR 166 4.5 5 75 Estimated moderate density (16 - 30 clients) aggregate throughput = 32 % of MDR 152 4.9 5 150 Estimated high density (31 - 45 clients) aggregate throughput = 27 % of MDR 128 5.8 6 270 Estimated very high density (46 - 60 clients) aggregate throughput = 20 % of MDR 95 7.9 8 480 SLA - Mbps 10 Aggregate Throughput Required - Mbps 750
  • 9. © 2014 AirTight Networks, Inc. All rights reserved. Use Case #1: Retail – Solution 9 AirTight Management Console in the Cloud 5 Units 11ac AP
  • 10. © 2014 AirTight Networks, Inc. All rights reserved. Use Case #2: Hospitality – Environment Hotel Conference Room • Conference room approximately 10,000 square feet / 929 square meters • 1 single interference zone • DFS channels are available 10
  • 11. © 2014 AirTight Networks, Inc. All rights reserved. Use Case #2: Hospitality – Requirements Hotel Conference Room • WLAN services for guests, staff, HD security cameras and A/V devices (e.g. projectors, digital signs, etc.) • 3 Mbps SLA for guests, staff, A/V devices and HD security cameras 11
  • 12. © 2014 AirTight Networks, Inc. All rights reserved. Use Case #2: Hospitality - Clients 12 Guests Staff A/V DevicesHD Security Cameras
  • 13. © 2014 AirTight Networks, Inc. All rights reserved. Use Case #2: Hospitality - Applications 13 Guests Staff Hotel A/V HD Security Cameras
  • 14. © 2014 AirTight Networks, Inc. All rights reserved. Use Case #2: Hospitality – AP Estimator 14 AP Estimator WLAN 11n/1ss 40MHz 11n/2ss 40MHz 11n/3ss 40MHz 11ac/1ss 80MHz 11ac/2ss 80MHz 11ac/3ss 80MHz Total/Avg Radio % Required APs* Required Max Clients Guest Clients 30 20 10 20 15 5 100 Staff Clients 3 3 A/V Clients 4 4 Security Clients 3 3 Total Clients 37 20 10 20 18 5 110 MDR (Max Data Rate) - Mbps 150 300 450 433 867 1300 583 Aggregate MDR - Gbps 5550 6000 4500 8660 15606 6500 46816 Average MDR - Mbps 426 Estimated single client throughput = 60 % of MDR 255 Estimated low density (2 - 15 clients) aggregate throughput = 35 % of MDR 149 2.2 3 45 Estimated moderate density (16 - 30 clients) aggregate throughput = 32 % of MDR 136 2.4 3 90 Estimated high density (31 - 45 clients) aggregate throughput = 27 % of MDR 115 2.9 3 135 Estimated very high density (46 - 60 clients) aggregate throughput = 20 % of MDR 85 3.9 4 240 SLA - Mbps 3 Aggregate Throughput Required - Mbps 330 *For estimation purposes only. Does not factor in client performance issues, ambient interference (WiFi and/or Non-WiFi), per application throughput and latency requirements, etc.
  • 15. © 2014 AirTight Networks, Inc. All rights reserved. Use Case #2: Hospitality – Solution 15 AirTight Management Console in the Cloud 3 Units 11ac AP
  • 16. © 2014 AirTight Networks, Inc. All rights reserved. Use Case #3: Education – Environment Elementary School Classroom • Approximately 1,000 square feet / 92 square meters • 1 single interference zone • DFS channels are available 16
  • 17. © 2014 AirTight Networks, Inc. All rights reserved. Use Case #3: Education – Requirements High School Classroom • WLAN services for students, staff, HD security cameras and A/V devices (e.g. projectors, Apple TVs, printers, etc.) • 5 Mbps SLA for guests, staff, A/V devices and HD security cameras • Some HD video content locally hosted for instruction purposes 17
  • 18. © 2014 AirTight Networks, Inc. All rights reserved. Use Case #3: Education - Clients 18 Students A/V Devices HD Security Cameras Faculty
  • 19. © 2014 AirTight Networks, Inc. All rights reserved. Use Case #3: Education - Applications 19 Students A/V Devices HD Security CamerasFaculty
  • 20. © 2014 AirTight Networks, Inc. All rights reserved. Use Case #3: Education – AP Estimator 20 AP Estimator WLAN 11n/1ss 40MHz 11n/2ss 40MHz 11n/3ss 40MHz 11ac/1ss 80MHz 11ac/2ss 80MHz 11ac/3ss 80MHz Total/Avg Radio % Required APs* Required Max Clients Student Clients 30 30 Faculty Clients 1 1 2 A/V Clients 2 2 Security Clients 1 1 Total Clients 4 1 0 0 30 0 35 MDR (Max Data Rate) - Mbps 150 300 450 433 867 1300 583 Aggregate MDR - Gbps 600 300 0 0 26010 0 26910 Average MDR - Mbps 769 Estimated single client throughput = 60 % of MDR 461 Estimated low density (2 - 15 clients) aggregate throughput = 35 % of MDR 269 0.7 1 15 Estimated moderate density (16 - 30 clients) aggregate throughput = 32 % of MDR 246 0.7 1 30 Estimated high density (31 - 45 clients) aggregate throughput = 27 % of MDR 208 0.8 1 45 Estimated very high density (46 - 60 clients) aggregate throughput = 20 % of MDR 154 1.1 2 120 SLA - Mbps 5 Aggregate Throughput Required - Mbps 175 *For estimation purposes only. Does not factor in client performance issues, ambient interference (WiFi and/or Non-WiFi), per application throughput and latency requirements, etc.
  • 21. © 2014 AirTight Networks, Inc. All rights reserved. Use Case #3: Classroom – Solution 21 AirTight Management Console in the Cloud 1 Unit 11ac AP
  • 22. © 2014 AirTight Networks, Inc. All rights reserved. 22 Use Case Considerations 11ac Gains K-12/1-for-1 environment Just refreshed client base to 11n clients Low (near term) K-12/1-for-1 environment Just refreshed client base to 11ac clients High Quick Service Restaurant 10 Mbps internet link Low Box/Electronic Store Fair number of 11ac demo devices High Hotel Conference Room Higher ratio of 11n to 11ac clients Medium University Lecture Hall High percentage of 11ac Macbooks High Carpeted Enterprise Office Need to support Microsoft Lync High Hospital Need to support Vo-Fi handsets High 11ac Performance ROI
  • 23. © 2014 AirTight Networks, Inc. All rights reserved. C-75 Trade-Up Program 23 Upgrade Your Wireless Network to 11ac Today! Reduce the cost of your wireless network upgrade to 802.11ac with our competitive trade-up promotion. • Up to 50% off our industry leading 3x3x3 11ac products • Up to 50% compared to AirTight 11n product • Limited time only promotion that ends Oct 31st, 2014... For more info email ask@airtightnetworks.com #11acTradeUp
  • 24. © 2014 AirTight Networks, Inc. All rights reserved. Additional Resources www.airtightnetworks.com/11ac 802.11ac Data Sheets For C-75 and C-75-E Access Points 802.11ac White Paper Essential Considerations 802.11ac Migration Qualifying and Planning Questions 24
  • 25. © 2014 AirTight Networks, Inc. All rights reserved. Session 1: Intro to 11ac Session 2: 11ac Feature Deep Dive Session 3: Is 11ac Right for Your Network? Session 4: 11ac Deployment Best Practices Session 5: 11ac Channel Capacity Planning Session 6: 11ac Network Optimization 11ac Webinar Series 25
  • 26. © 2014 AirTight Networks, Inc. All rights reserved. Thank You! Send inquiries to Ask@airtightnetworks.com Next webinar: Tuesday, Aug 19th, 8am & 6pm Pacific. “802.11ac Deployment Best Practices.” @RAFerruolo & @MatthewSMullin 26 @AirTight AirTight NetworksBlog.airtightnetworks.com