2. Omni Antennas Are Not Smart
RF energy has similar characteristics to light energy
If you take an unfocused light bulb of a given power, it
spreads it energy in all directions and the energy quickly
diminishes over distance
Traditional omni-directional AP antenna work like an
unfocused light bulb and radiate RF wastefully in
unwanted areas causing interference
2
Ruckus Wireless Confidential
3. Issues with current Omni Antennas
Broadcast 360 degrees
Create interference to neighbors
Can not detect where interference in coming
from
Must slow down and retransmit when
interference occurs
Not pleasant looking
3
Ruckus Wireless Confidential
4. BeamFlex RF Beam Steering
Radio Frequency energy has similar characteristics to light energy
If you take an unfocused light bulb of a given power, it spreads it energy in
all directions and the energy quickly diminishes over distance
If you focus the same light bulbs energy in a particular direction, the light
will be brighter travel further in the direction of focus
Traditional omni-directional AP antenna work like an unfocused light bulb
The Beamflex antenna focuses the RF energy as a beam towards the receiver
How it works
Unfocused energy
doesn’t travel far…
Focused energy is
more direct, dense
and travels further
4
Ruckus Wireless Confidential
6. Network BeamFlex Advantage
Typical APs with Omni Antennas BeamFlex-equipped APs
Energy wasted radiating everywhere Energy focused toward each destination –
Reduces coverage radius farther coverage, fewer APs
Causes neighbor AP interference Built-in interference avoidance between
neighbor APs
Need constant AP power adjustments
Overhead on WLAN controller AP power adjustment by ZoneDirector only
a last resort
Never perfect in dynamic environments
6
Ruckus Wireless Confidential
7. How BeamFlex Works
BeamFlex antenna
directs Wi-Fi signals
Metal Wall
to clients
Automatically
adapts to moves, ZoneFlex
adds and changes AP
Automatically rejects
Interference Fewer APs reach farther, faster,
Steers signals around for more users
impenetrable obstacles AUTOMATICALLY!
BeamFlex antennas
make “good
neighbors”
Director automatically
controls AP transmit
power and channel
assignment
7
Ruckus Wireless Confidential
8. Performance Under Interference…
Ruckus AP and Ruckus Client
RF Interference Tolerance Test
Microwave on
20
Client Mbps
19
Mbps
Microwave
30 ft
AP
Ruckus AP and Off-the-shelf.11g Client
Off-the-shelf 802.11 AP and Client Microwave on
13 17
Mbps Microwave on Mbps
14
Mbps
6 Mbps
8
Ruckus Wireless Confidential
9. Performance and Coverage Advantage
Ruckus AP Omni antenna AP
200 ft (61m) 200 ft (61m)
125 ft
Upper 125 ft
(38m)
Floor (38m)
AP AP
25000 sq ft
(2322 sq m)
200 ft 200 ft
Lower
125 125
Floor ft ft
AP AP
upstairs upstairs
20-22 Mbps 15-20 Mbps 10-15 Mbps 5-10 Mbps
9
Source: North-American Carrier Test Location: Commercial high rise building in Canada
Ruckus Wireless Confidential
12. How SmartCast Works
SmartCast BeamFlex
Classification Queuing /Scheduling 802.11 Adaptation
• By station Per-station, Master • Antenna config
• By port per-class Qs Scheduler • Data rate
• By heuristics • Retransmission
Voice Per-packet • Channel
• By layers 4-7 Video dispatch
Best Effort
to hardware • Power
Background
Set-Top Box 1
802.11
Video HW Qs
802.11 Chip
Set-Top Box 2
Voice
Wi-Fi Handset
Flow
Classifier
Notebook PC Data
12
Ruckus Wireless Confidential
14. Introducing SmartMesh™
First Intelligent, Centralized WLAN Mesh Solution for 802.11n and 802.11g
Eliminates Ethernet cable to every AP
Uses RF signal routing to determine best
paths to client and between mesh nodes
Only mesh system that avoids interference
Uses high-gain, long-range smart antennas
to minimize hops, improve performance
Deploys in half the time, half the cost
of conventional WLANs
Simple, simple, simple to configure/manage
Half the Cost
Half the Time
3X the Performance
14
Ruckus Wireless Confidential
15. Simple to Use, Simple to Manage
2
At-a-glance view SmartMesh easily
of entire SmartMesh 1 enabled with a
click of a mouse
1
15
Ruckus Wireless Confidential
16. How SmartMesh Works
Mesh 150 Mbps 100 Mbps 80 Mbps
AP
ZoneDirector Root
controller AP
300 Mbps 802.11n 802.11g 802.11g
Mesh APs constantly advertise potential throughput
Each AP picks the best (fastest) path to the root AP and clients
BeamFlex manages best signal path to client and inside mesh
If mesh node fails, SmartMesh self-heals
16
Ruckus Wireless Confidential
17. SmartMesh vs. Dumb Bridged Mesh
Wi-Fi service
Extended range means higher Poor range means degrades/fails
performance, fewer hops more hops, lower performance with interference
Smart
802.11n
Dumb
802.11g
Automatic Additional mesh
interference nodes needed for
avoidance complete coverage
ROOT AP ROOT AP
17
Ruckus Wireless Confidential
19. Powerful and
Simple
Wireless Security
19
Ruckus Wireless Confidential
20. What’s SmartSec?
A collection of robust
wireless security capabilities
made easier to implement
Authentication and authorization
Dynamic PSK™
Role-based user access
Wireless LAN client isolation
Wireless intrusion detection
Link layer encryption
20
Ruckus Wireless Confidential
21. How Do I?
SME Wireless Security Concerns
How do I
protect the
data? How do I
control
who’s on the
network?
How do I
manage all
this?
How do I
control who
can access
How do I and to what
detect resources?
potential
intruders?
21
Ruckus Wireless Confidential
23. Authentication and Authorization
Discrete policies configurable per WLAN
Captive portal with backend authentication via:
Local database – including role-based authorization
ActiveDirectory - including group-based authorization
RADIUS SSID=1
SSID=Guest VLAN=1
Wireless authentication VLAN=3 OPEN
Dynamic PSK
Open
Shared (pre-shared key)
802.1X
Dynamic PSK
SSID=2
VLAN=2
802.1x
Active 802.1X/
Directory RADIUS
23
Ruckus Wireless Confidential
24. A First: Dynamic PSK™
The Problem: Provisioning secure wireless access
Single pre-shared key is not secure
(e.g. employee leaving requires changing key for all employees)
802.1x is complex and not affordable for SMBs
No IT resource to administer unique key per employee
The Solution: Auto administered Dynamic PSK™
Automatic provisioning of unique encryption key to each user/device
No manual client configuration
Highly secure: unique 63-byte pass-phrase per user
Easily deactivated when employee leaves
New key can be generated periodically
Configurable per WLAN
24
Ruckus Wireless Confidential
25. How Dynamic PSK™ Works
1. First time user connects
to Ethernet port ZoneFlex 2942
2. User specifies URL to
be automatically
configured for WLAN
access
3. Once authenticated,
ZoneDirector auto-
provisions the requisite
WLAN settings and a RADIUS/AD
unique, dynamic PSK in
user’s wireless settings ZoneDirector
4. Key is bound to both
user and device until Router
invalidated
5. User can now connect IDS
securely to the WLAN
Internet
25
Ruckus Wireless Confidential
26. Strong Access Controls
CFO
Sales guy
Role-based user access
allows only authorized users
Guest
to access authorized
resources
MAC (L2) and IP (L3)-
based filters
Users can be rate limited Active
Directory
per WLAN preventing
against distributed denial
of service attacks
Hackers trying to
masquerade as a
Finance Sales Marketing
authorized users can be
easily blacklisted
26
Ruckus Wireless Confidential
27. Controlled User Access
AAA group
attributes can be
linked to user roles
Users granted or
denied access to
specific WLAN(s)
based on role
WLAN can be tied
to pre-specified
VLANs and/or user
groups
Guest pass creation
privileges definable
27
Ruckus Wireless Confidential
28. Wireless LAN Client Isolation
L3 filters prevent L2 client isolation
two clients from prevents two clients
directly connecting using the same AP
across different APs from communicating
directly
...but users can still
Internet access the Internet
28
Ruckus Wireless Confidential
29. Wireless Intrusion Detection (WIDS)
Automatic
detection and
classification
Rogue AP
Evil twin/AP spoofing
Ad hoc networks
Neighbor networks
Email automatically
sent to IT
administrator
alerting them to
the breach
29
Ruckus Wireless Confidential
30. Preventing Denial of Service Attacks
Automatic Zone Defense
Clients automatically
blacklisted after
failed authentication
attempts (eg. dictionary
attacks, excessive management
frames, etc.)
Auto blacklist interval
is customizable
30
Ruckus Wireless Confidential
31. Link Layer Encryption
CFO
Sales guy
State of the art
encryption that can be
applied on a per WLAN WPA2 Employee
(SSID) WPA TKIP
WPA2
LWAPP-based tunnels AES
with (AES) encrypted
messaging between APs
and controller Active
Directory
Dynamic PSK™
(patent pending)
Finance Sales Marketing
31
Ruckus Wireless Confidential