Management Update: Wireless LAN Predictions for 2004

Size: px
Start display at page:

Download "Management Update: Wireless LAN Predictions for 2004"

Transcription

1 IGG K. Dulaney, R. Ahlawat Article 19 November 2003 Management Update: Wireless LAN Predictions for 2004 Wireless LAN (WLAN) technology and use continue to evolve at a rapid pace. WLANs will achieve greater integration with the wired infrastructure in 2004, leading to greater VoIP (voice over Internet Protocol) integration in Wireless LAN (WLAN) technology and use continue to evolve at a rapid pace. WLANs will achieve greater integration with the wired infrastructure in 2004, leading to greater VoIP (voice over Internet Protocol) integration in Strong Growth for WLANs WLANs will continue on an unabated growth path in The rapid adoption is fueled by the following: Declining WLAN equipment prices Intel s strong marketing of its Centrino platform Burgeoning WLAN use in homes Improvements in WLAN security Further integration with wired LAN networking platforms As Gartner discusses in other Predicts 2004 research, most notebooks will come with bundled WLAN capability, enabling most notebook users to participate in WLAN networks with little effort. Almost every major enterprise is aware of the technology and has at least some limited deployments. Enterprises should recognize that wireless has become a core part of every enterprise network and can no longer be regarded as an elective technology. Consequently, enterprises must own their airspace because it becomes a resource to deliver computing capabilities. Reasons to Deploy WLANs Gartner Entire contents 2003 Gartner, Inc. All rights reserved. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice.

2 During 2004, additional applications such as voice will begin to emerge as primary reasons to deploy WLANs, although progress in this area will be plagued by a lack of standards and a shortage of handset choices. However, most use will consist of light-duty access to networks often pegged at 15-Mbps peak requirements or less. Switches will be enhanced to include WLANs, finally integrating WLANs into the core fabric of enterprise networks. Security deficiencies will cease to become a serious inhibitor to deployment. Prediction: The Institute of Electrical and Electronics Engineers (IEEE) i security standard will be approved in i, the long-awaited security standards enhancement to the WLAN specification, should be ratified in i consists of one authentication component, 802.1x the same standard used in the wired world and two encryption technologies, Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard. Early in 2003, the Wireless Fidelity (Wi-Fi) Alliance began certification for Wi-Fi Protected Access, a subset of some of the early revisions of i TKIP combined with 802.1x. Strategic Planning Assumption: The IEEE i WLAN security standard will be approved by 2H04 (0.7 probability). A robust encryption standard that has been thoroughly thought through by a strong industry consortium Continued support for previous standards including Wi-Fi Protected Access, a preliminary standard recommended by Gartner Pre-standard deployments, which are claimed as standard and should be regarded as such Enterprises should no longer view WLAN security shortcomings as a barrier to deployment of WLANs. One of two approaches can be taken: Adoption of Wi-Fi Protected Access or one of the capabilities of I A virtual private network (VPN) approach that consists of open access points with an overlay security system connecting devices to the backbone wired network (standard and nonstandard approaches are available and acceptable) The question of whether to wait for full i support depends on the security policies of the enterprises.

3 Although Wi-Fi Protected Access is secure and recommended, some enterprises may want higher levels of encryption to meet special threats, or to simply be on the formal standard. For enterprises seeking the latter, all purchases should be capable of upgrade, which is most easily done by employing a switch architecture where the implementation of i is in firmware or software. Prediction Enterprises will begin to adopt a/g as a de facto standard. Most WLAN deployments today use b technology. For most uses during the next several years, b, acting as a complement or a wired replacement for generic application use, is more than sufficient. It is also less expensive and more stable than emerging alternatives. In 2004, however, continued progress in silicon improvements will deliver a/g capability at a relatively little cost delta from b (note that g provides backward compatibility to b). As surrounding standards mature and are combined with a/g, this technology will become more acceptable. Also, given the need to detect rogue access points, enterprises must purchase technology that can monitor frequencies and technical standards, even when they are not in use. Gartner cautions buyers to carefully examine the specifications of any purchased technology to ensure that all required and future frequencies are covered, and that the included standards match the governmental requirements of their respective countries. That said, a/g will become the mainstream choice for enterprises over b, g or a/b offerings by year-end Strategic Planning Assumption: By year-end 2004, 80 percent of new enterprise WLAN installations will include a/g technology (0.7 probability). A significant increase in WLAN performance A broader range of notebook a/g offerings, with adapter prices no more than $20 greater than b offerings A strong marketing push to select a/g technology over b in business applications a technology represents the future of WLANs.

4 802.11a operates at a faster data rate and at 5 GHz frequencies, where less interference exists from widely available consumer items that can degrade network performance (for example, cordless phones). Significantly more channels are offering more flexibility in deployment, especially in future VoIP applications. Enterprises should not remove b installations, but rather complement them with a/g b installations will continue to fulfill many users needs. As a enters the networking fabric, it is important for management to consider policies that reserve some, if not all channels for specific enterprise use. That is particularly important for operations in which the central IS organization cannot control all deployments. For example, a university might want to reserve eight of a possible 24 channels (the number available in Europe and eventually in North America) for specific enterprise applications, while permitting more-open use of the other channels. Note that the 5.7 GHz to 5.8 GHz band, called UNI-III, is an industrial, scientific and medical band that permits consumers to operate, and thus is a likely candidate for this latter purpose. Enterprises must also allocate slightly larger funding for WLAN deployment in the face of a/g. That additional spending will still adhere to the rationale that it is far less expensive to deploy WLAN technologies at the outset of a purchase rather than retrofit at a later date. Prediction Third-generation WLAN architectures will become mainstream. As 2004 progresses, a movement will occur from second-generation, stand-alone access point deployments to third-generation switched architectures, in which WLAN functionality is moved back from the access point to the edge or core network components to improve manageability and reduce costs over a given coverage area. Several choices are available in a switched environment that will require close scrutiny of application needs. Alternatives will range from: Integrated, advanced edge switches that include WLAN WLAN complementary boxes to edge switches Core switches that tunnel to the application provider to provide central management and control functions

5 Overlay systems based on server architectures that operate a higher-level management, functionality and security framework on top of an existing networking landscape Aside from the more-popular network enhancements, VPN boxes are also being upgraded to provide roaming capability, targeting the most security-conscious buyers. In the long term, WLAN capability will appear in many network components as it becomes as mainstream as wired Ethernet. Strategic Planning Assumption: By year-end 2004, the WLAN access point market will crystallize into two segments (0.7 probability): Traditional switches enhanced to include WLAN support New VPN products that overlay security and features on top of mixed LAN/WLAN infrastructure Full integration of LAN and WLAN offerings from incumbent networking vendors A serious dropout of WLAN startup switch vendors, with at least 60 percent not expected to survive more than a few years IT network management to gain solid control over WLAN deployments, an effort that was formerly fragmented, with departments such as warehousing and distribution able to set their own direction A battle between thin and thick access point architectures WLAN deployments are now part of any LAN offering. Enterprises must consult with established LAN vendors to understand their approaches to WLAN deployment in the coming years. That will put more pressure on startup vendors that have not wired their installed base. Many startup vendors believed they could establish themselves in a relatively short time, and that technology development would be sufficiently difficult for the incumbent wired vendors to position the startups as acquisition targets. However, Gartner has been surprised at how quickly the incumbents have added WLAN capability, making the likelihood of the startups acquisition scenario appear remote. Although some startups merit consideration, you should properly evaluate each vendor s financials.

6 Prediction Applications such as voice will begin to emerge as a primary reason to deploy WLANs. Although VoIP adoption over WLAN will be hindered by a lack of standardization and high prices for handsets, Gartner expects certain verticals to begin considering voice over wireless infrastructure as they discover the cost benefits of voice applications in the wireless medium for new installations. The workplace has become increasingly mobile with the introduction of wireless connectivity to laptops. Now, end users can be truly mobile with features such as software IP phones on their laptops, which will enable them to carry their desk phone with them. Strategic Planning Assumption: By year-end 2005, 20 percent of new wireless installations will be driven by VoIP adoption (0.7 probability). Vendors to integrate features needed to support voice traffic without letting the performance of data network suffer Handset costs to come down More wireless vendors to partner with voice handset vendors to offer handsets as part of or integrated in WLAN devices As data and voice start to merge in a wired networking infrastructure, vendors will look at integrating voice and data traffic on WLANs as well. Enterprises must carefully look at the return on investment of running voice applications over a wireless network and take wired infrastructure upgrades into consideration before making a decision. It will be important for enterprises to understand vendors technology implementations of features such as quality of service for handling latency issues and call-drop, because they can significantly affect a user s experience in voice communication but may not be as noticeable in data communication. Performance issues regarding data communications, along with VoIP sessions, will be resolved as a (with an average 33-Mbps link rate) starts being deployed. Vendors will work toward prioritizing VoIP over data traffic, ensuring roaming between subnets and the resolution of latency issues. The IEEE standards body is working on a specification dubbed e that would add the needed voice and quality-of-service protocols. However, e is in early draft stages and may be too late to avoid fragmentation into proprietary implementations.

7 voice products tying cordless phones to WLAN networks are now available, but they use proprietary voice schemes. Marketing spin will be heavy as vendors try to sell varied architectural approaches. Enterprise must assess their future WLAN application environments. Enterprises unable to do this should expect that usage will not be extreme. Thus, they should move more capability back to the core, gaining the economies of scale on the management front and reducing cost over a given area. As requirements increase, hardware capabilities and wired network speeds will improve to provide sufficient support at the edge. Enterprises must also consider the degree of roaming required. Most products have been designed to serve notebook computers rather than handhelds. Notebooks move, but discretely rather than continuously. Technology that is not built for roaming will cause problems such as VPN failures. Bottom Line WLANs must be considered a mainstream part of any networking infrastructure. Prices have declined and standards have improved, making WLANs extremely viable. In many instances, WLANs can reduce costs and increase organizational flexibility. WLAN implementation at remote offices is the easiest case to justify; WLAN installation at headquarters is the most difficult due to the greater prevalence of wired connections. However, during the next five years, user demands will drive most enterprises to establish WLAN capability nearly everywhere in the enterprise. Written by Edward Younker, Research Products Analytical sources: Ken Dulaney and Rachna Ahlawat, Gartner Research For related Inside Gartner articles, see: Management Update: Client Issues for Mobile Applications, (IGG ) Management Update: How to Understand the Benefits of Mobility, (IGG )

IT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary

IT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary IT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary Publication Date: 15 December 2003 Author Eric Goodness This document has been published to the

More information

NGN: The Evolution of Wireless Networks

NGN: The Evolution of Wireless Networks NGN: The Evolution of Wireless Networks Research Brief Abstract: Operators of mobile phone networks are already working through the financial and technical challenges of their own next generation of networks.

More information

Predicts 2004: The Future of Windows Server

Predicts 2004: The Future of Windows Server Strategic Planning, T. Bittman Research Note 19 November 2003 Predicts 2004: The Future of Windows Server In 2004, distributed manageability will emerge as the key to the future of Windows Server, especially

More information

Hype Cycle for Mobile and Wireless Networking, 2003

Hype Cycle for Mobile and Wireless Networking, 2003 P. Redman, K. Dulaney, W. Clark Strategic Analysis Report 30 May 2003 Hype Cycle for Mobile and Wireless Networking, 2003 A wireless networking technology assessment for personal-, local- and wide-area

More information

These patterns include: The use of proprietary software

These patterns include: The use of proprietary software Strategic Planning, F. Kenney, J. Thompson Research Note 7 August 2003 B2B Security Patterns: Finding the Perfect Combination Achieving business-to-business security is a combination of examining internal

More information

Mesh Networking Principles

Mesh Networking Principles Technology, N. Jones Research Note 8 July 2003 Mesh Topologies Promise Resilient Wireless Networks Mesh architecture will become an essential element of wireless networking because it is easy to install,

More information

CIO Update: Security Platforms Will Transform the Network Security Arena

CIO Update: Security Platforms Will Transform the Network Security Arena IGG-11202002-02 J. Pescatore, M. Easley, R. Stiennon Article 20 November 2002 CIO Update: Security Platforms Will Transform the Network Security Arena An integrated network security platform approach will

More information

2018 Trends in Hosting & Cloud Managed Services

2018 Trends in Hosting & Cloud Managed Services PREVIEW 2018 Trends in Hosting & Cloud Managed Services DEC 2017 Rory Duncan, Research Director, Managed Services & Hosting Penny Jones, Principal Analyst - MTDC & Managed Services Aaron Sherrill, Senior

More information

Firewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary

Firewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary Firewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary Publication Date: 20 August 2003 Authors Caroline Jones Andy Rolfe This document has been published

More information

COM F. Troni, L. Fiering

COM F. Troni, L. Fiering F. Troni, L. Fiering Research Note 8 September 2003 Commentary Notebook TCO Comparison: Day Extenders vs. Traveling s Notebooks used by traveling workers, who are out of the office more often and work

More information

Action Recommendation for 2004

Action Recommendation for 2004 Strategic Planning, P. Redman, T. Hart, W. Clark, J. Chapman, P. Dittner, R. Simpson, K. Foong, N. Ingelbrecht Research Note 20 November 2003 Changes in Store for Wireless WAN During 2004 The hottest growth

More information

Management Update: Storage Management TCO Considerations

Management Update: Storage Management TCO Considerations IGG-09172003-01 C. Stanley Article 17 September 2003 Management Update: Storage Management TCO Considerations CIOs, asset managers, data center managers and business managers should be aware of the total

More information

COM I. Keene, B. Hafner

COM I. Keene, B. Hafner I. Keene, B. Hafner Research Note 23 December 2002 Commentary The Telecommunications and Networking Hype Cycle New networking technologies and services continue to stream into the telecommunications marketplace.

More information

Wireless Local Loop: Cellular in Waiting? (Executive Summary) Executive Summary

Wireless Local Loop: Cellular in Waiting? (Executive Summary) Executive Summary Wireless Local Loop: Cellular in Waiting? (Executive Summary) Executive Summary Publication Date: October 14, 2002 Authors To Chee Eng Evelyn Goh Kobita Desai This document has been published to the following

More information

4Q03 Update: Wireless Communications Semiconductor Forecast,

4Q03 Update: Wireless Communications Semiconductor Forecast, Forecast Analysis 4Q03 Update: Wireless Communications Semiconductor Forecast, 2003-2005 Abstract: Mobile communications semiconductor revenue was strong in the third quarter. 2003 is on a path for 16

More information

Market Scope. Magic Quadrant Methodology

Market Scope. Magic Quadrant Methodology Markets, J. Enck, A. Powell Research Note 12 May 2003 Global IA High-Volume Server Magic Quadrant, 1H03 Gartner's Magic Quadrant for Intel Architecture in 1H03 indicates that Dell Computer, Hewlett-Packard

More information

Finding Pure-Play Midtier ESPs: A Two-Step Process

Finding Pure-Play Midtier ESPs: A Two-Step Process Research Brief Finding Pure-Play Midtier ESPs: A Two-Step Process Abstract: The pure-play midtier consulting and integration sector can be a competitive option to global integrators. Tier 2 and 3 vendors

More information

SOHO and Residential Routers: Worldwide Market Share and Forecast, (Executive Summary) Executive Summary

SOHO and Residential Routers: Worldwide Market Share and Forecast, (Executive Summary) Executive Summary SOHO and Residential Routers: Worldwide Market Share and Forecast, 2002-2007 (Executive Summary) Executive Summary Publication Date: 23 May 2003 Authors Rachna Ahlawat Gauri Pavate This document has been

More information

Worldwide Workstation Shipments Rebound in Third Quarter

Worldwide Workstation Shipments Rebound in Third Quarter Market Analysis Worldwide Workstation Shipments Rebound in Third Quarter Abstract: Preliminary worldwide workstation shipments totaled 384,756 units in the third quarter of 2003, for a year-over-year increase

More information

DBMS Software Market Forecast, (Executive Summary) Executive Summary

DBMS Software Market Forecast, (Executive Summary) Executive Summary DBMS Software Market Forecast, 2003-2007 (Executive Summary) Executive Summary Publication Date: 4 September 2003 Author Colleen Graham This document has been published to the following Marketplace codes:

More information

Worldwide 2002 Security Software Market and Vendor Shares (Executive Summary) Executive Summary

Worldwide 2002 Security Software Market and Vendor Shares (Executive Summary) Executive Summary Worldwide Security Software Market and Vendor Shares (Executive Summary) Executive Summary Publication Date: 21 July 2003 Author Norma Schroder This document has been published to the following Marketplace

More information

4Q02 Update: Disk Storage Forecast Scenarios,

4Q02 Update: Disk Storage Forecast Scenarios, Forecast Analysis 4Q02 Update: Disk Storage Forecast Scenarios, 2002-2003 Abstract: Clearly, the near-term fate of the disk storage system market is more tightly coupled with micro IT spending trends than

More information

Can you wait until 2010?

Can you wait until 2010? Decision Framework, M.Silver,A.Park Research Note 5 December 2003 Who Should Deploy Office 2003, and When Enterprises that intend to skip Office 2003 should ensure that they are comfortable with their

More information

Semiconductor Market for Data Processing: Asia/Pacific, 3Q03

Semiconductor Market for Data Processing: Asia/Pacific, 3Q03 Research Brief Semiconductor Market for Data Processing: Asia/Pacific, 3Q03 Abstract: Semiconductor market conditions have improved since the second quarter of 2003, and the industry's recovery is continuing.

More information

Integration With the Business Modeler

Integration With the Business Modeler Decision Framework, J. Duggan Research Note 11 September 2003 Evaluating OOA&D Functionality Criteria Looking at nine criteria will help you evaluate the functionality of object-oriented analysis and design

More information

IP Backbone Opportunities in Asia/Pacific (Executive Summary) Executive Summary

IP Backbone Opportunities in Asia/Pacific (Executive Summary) Executive Summary IP Backbone Opportunities in Asia/Pacific (Executive Summary) Executive Summary Publication Date: September 9, 2002 Author Chee Eng To This document has been published to the following Cluster codes: TELC-WW-EX-0423

More information

Gartner Client Operating Systems Surveys and Polls: Enterprises Plan Early, but Slow, Move to Windows 7

Gartner Client Operating Systems Surveys and Polls: Enterprises Plan Early, but Slow, Move to Windows 7 Page 1 of 8 Gartner Client Operating Systems Surveys and Polls: Enterprises Plan Early, but Slow, Move to Windows 7 7 June 2010 Michael A. Silver Gartner RAS Core Research Note G00200542 Respondents to

More information

NGN: Enterprise IP Telephony

NGN: Enterprise IP Telephony NGN: Enterprise IP Telephony Research Brief Abstract: Enterprises have been slow to adopt Internet Protocol-based telephony. Vendors should educate them as to its benefits, using realistic calculations

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g

More information

Enterprise Data Architecture: Why, What and How

Enterprise Data Architecture: Why, What and How Tutorials, G. James, T. Friedman Research Note 3 February 2003 Enterprise Data Architecture: Why, What and How The goal of data architecture is to introduce structure, control and consistency to the fragmented

More information

Hype Cycle for Mobile and Wireless Applications and Services, 2003

Hype Cycle for Mobile and Wireless Applications and Services, 2003 P. Redman, W. Clark, K. Dulaney Strategic Analysis Report 30 May 2003 Hype Cycle for Mobile and Wireless Applications and Services, 2003 Some wireless applications and services, like Short Message Service

More information

Web Services Take Root in Banks and With Asset Managers

Web Services Take Root in Banks and With Asset Managers Strategic Planning, M. Knox, W. Andrews, C. Abrams Research Note 18 December 2003 Web Services Take Root in Banks and With Asset Managers Financial-services providers' early Web services implementations

More information

NGN: Carriers and Vendors Must Take Security Seriously

NGN: Carriers and Vendors Must Take Security Seriously Research Brief NGN: Carriers and Vendors Must Take Security Seriously Abstract: The next-generation network will need to provide security on many levels. A comprehensive set of standards should be in place

More information

Vendor Ratings, VDR Kevin Strange, Andrew Butler, Gareth Herschel

Vendor Ratings, VDR Kevin Strange, Andrew Butler, Gareth Herschel Vendor Ratings, Kevin Strange, Andrew Butler, Gareth Herschel Research Note 27 January 2003 Vendor Rating: Focus on NCR s Teradata Division NCR s Teradata division is performing well, despite the tough

More information

Nortel Networks Optivity Policy Services

Nortel Networks Optivity Policy Services Sharon Fisher Product Report 7 January 2004 Nortel Networks Optivity Policy Services Summary Optivity Policy Services is system-level software for managing the traffic prioritization and network access

More information

Leased-Line Market Thrives in Asia/ Pacific Despite Bandwidth Glut (Executive Summary) Executive Summary

Leased-Line Market Thrives in Asia/ Pacific Despite Bandwidth Glut (Executive Summary) Executive Summary Leased-Line Market Thrives in Asia/ Pacific Despite Bandwidth Glut (Executive Summary) Executive Summary Publication Date: December 4, 2002 Authors Alayne Wong To Chee Eng Evelyn Goh Kenshi Tazaki Andrew

More information

China: User Perceptions and Plans for PCs and PDAs in 2003

China: User Perceptions and Plans for PCs and PDAs in 2003 End-User Analysis China: User Perceptions and Plans for PCs and PDAs in 2003 Abstract: The majority of the Chinese organizations' IT strategies and budget planning issues remain immature. It would not

More information

CIO Update: Gartner s Storage Services Magic Quadrant

CIO Update: Gartner s Storage Services Magic Quadrant IGG-04302003-04 A. Couture, R. Passmore Article 30 April 2003 CIO Update: Gartner s Storage Services Magic Quadrant Gartner has developed its first North American Storage Services Magic Quadrant. Storage

More information

IT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary

IT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary IT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary Publication Date: 31 March 2003 Author Kobita Desai This document has been published to the

More information

Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary

Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary Publication Date: 21 March 2003 Authors Cathy Tornbohm Peter Redshaw This document has been published to the following Marketplace

More information

Fixed Public Services Trends in CEE and MEA, (Executive Summary) Executive Summary

Fixed Public Services Trends in CEE and MEA, (Executive Summary) Executive Summary Fixed Public Trends in CEE and MEA, 2001-2007 (Executive Summary) Executive Summary Publication Date: 4 August 2003 Author William L. Hahn This document has been published to the following Marketplace

More information

Should You Use Liberty or Passport for Digital Identities?

Should You Use Liberty or Passport for Digital Identities? Select Q&A, J. Pescatore, A. Litan Research Note 12 August 2003 Should You Use Liberty or Passport for Digital Identities? Federated digital identities, such as from the Liberty Alliance and Microsoft

More information

AIOs Displace Single-Function Printers in Latin America

AIOs Displace Single-Function Printers in Latin America ` Market Analysis AIOs Displace Single-Function Printers in Latin America Abstract: Stand-alone printer shipments have dropped sharply, while inkjet all-in-one printers continue to gain market share in

More information

Software-Defined WAN Does Not Grow on WAN Alone

Software-Defined WAN Does Not Grow on WAN Alone MARKET FORECAST Software-Defined WAN Does Not Grow on WAN Alone OCT 2017 Jim Duffy, Senior Analyst, Networking Software-defined WAN is expected to undergo robust growth over the next few years, fueled

More information

Four Partial Solutions for Remote Network Access

Four Partial Solutions for Remote Network Access Decision Framework, E. Paulak Research Note 29 August 2003 Four Partial Solutions for Remote Network Access Four different solutions can help to meet your remoteaccess needs. Managed-service providers

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

VIEW Certified Configuration Guide. Colubris Networks Series MultiService Controllers with MAP-320/330 MultiService Access Points

VIEW Certified Configuration Guide. Colubris Networks Series MultiService Controllers with MAP-320/330 MultiService Access Points VIEW Certified Configuration Guide Colubris Networks 5000 Series MultiService Controllers with MAP-320/330 MultiService Access Points January 2008 Edition 1725-36068 Version E Configuration Guide Trademark

More information

Wireless Networking WiFi Standards 802.11a 5GHz 54MB 802.11b 2.4 GHz 11MB 802.11g 2.4GHz 52MB 802.11n 2.4/5GHz 108MB 802.11b The 802.11b standard has a maximum raw data rate of 11 Mbit/s, and uses

More information

Current and Next-Generation Switching in Asia/Pacific and Japan, 2003 (Executive Summary) Executive Summary

Current and Next-Generation Switching in Asia/Pacific and Japan, 2003 (Executive Summary) Executive Summary Current and Next-Generation Switching in Asia/Pacific and Japan, 2003 (Executive Summary) Executive Summary Publication Date: 25 August 2003 Authors Hyun-Sook Lee Sumit Malik John Calvert This document

More information

Samsung Security AP WHITE PAPER

Samsung Security AP WHITE PAPER WHITE PAPER Introduction Due to their high speed and standardized features such as enhanced authentication and encryption, enterprise WLAN network systems are currently growing in their use as infrastructure

More information

User Survey Analysis: Next Steps for Server Virtualization in the Midmarket

User Survey Analysis: Next Steps for Server Virtualization in the Midmarket User Survey Analysis: Next Steps for Server Virtualization in the Midmarket Gartner RAS Core Research Note G00207375, James A. Browning, Alan Dayley, 21 October 2010, RV2A411012011 Approximately 30% of

More information

Central and Eastern Europe: Premises Switching Equipment Market Share, 2002 (Executive Summary) Executive Summary

Central and Eastern Europe: Premises Switching Equipment Market Share, 2002 (Executive Summary) Executive Summary Central and Eastern Europe: Premises Switching Equipment Market Share, (Executive Summary) Executive Summary Publication Date: 15 July 2003 Author Megan Fernandez This document has been published to the

More information

Assignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson

Assignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson Project Whitepaper ITEC495-V1WW Instructor: Wayne Smith Jim Patterson Table of Contents 1. Abstract Page 3 2. Introduction Page 3 3. Analysis Page 4 4. Solution Discussion Page 7 5. Evaluation Criteria

More information

Everybody s connecting.

Everybody s connecting. Everybody s connecting. The ABGs of Wireless LAN Technology Overview February 2003 Introduction Wireless LANs (WLANs) using the 802.11 standard offer compelling value in office, public, and home LAN environments.

More information

Mobile Phones, Poor Economy to Dampen PDA Market to 2007

Mobile Phones, Poor Economy to Dampen PDA Market to 2007 Forecast Analysis Mobile Phones, Poor Economy to Dampen PDA Market to 2007 Abstract: A stagnant economy and growing competition from mobile phones have reduced our expectations for PDA market growth. Worldwide

More information

Asia/Pacific Enterprise Networking Trends in 2003

Asia/Pacific Enterprise Networking Trends in 2003 Strategic Planning, G. Johnson Research Note 22 November 2002 Asia/Pacific Enterprise Networking Trends in 2003 The Asia/Pacific region faces challenges because of the global telecom turmoil, but there

More information

2017 Trends in Datacenter and Critical Infrastructure

2017 Trends in Datacenter and Critical Infrastructure PREVIEW 2017 Trends in Datacenter and Critical Infrastructure DEC 2016 Rhonda Ascierto, Research Director, Datacenter Technologies & Eco-Efficient IT Andy Lawrence, Research Vice President - Datacenter

More information

FICON Drives Fibre Channel Security

FICON Drives Fibre Channel Security FICON Drives Fibre Channel Security Research Brief Abstract: FICON products for mainframes impact the Fibre Channel switch market as FICON requirements drive improvements in security, benefiting all Fibre

More information

NetIQ's VoIP Management Products

NetIQ's VoIP Management Products Products, D. Neil Research Note 10 September 2002 NetIQ's VoIP Management Products NetIQ has announced its Voice over IP management strategy and has a number of pre- and post-implementation products available.

More information

ISV Support Is Key When Choosing a Server Operating System

ISV Support Is Key When Choosing a Server Operating System Markets, A. Butler Research Note 17 September 2003 ISV Support Is Key When Choosing a Server Operating System It's the support independent software vendors offer that determines the life span of a server

More information

Midsize Businesses Slowly Warm Up to Storage Services

Midsize Businesses Slowly Warm Up to Storage Services Research Brief Midsize Businesses Slowly Warm Up to Storage Services Abstract: A recent study reveals only lukewarm demand for new storage services among midsize businesses. Assessment tools and peer references

More information

Huawei: China's Leading Equipment Vendor Returns to Growth

Huawei: China's Leading Equipment Vendor Returns to Growth Research Brief Huawei: China's Leading Equipment Vendor Returns to Growth Abstract: Huawei has turned in a strong performance during the first half of 2003. The second half of the year could be even better.

More information

Getting Off Windows XP Is More Important Than Windows Vista vs. Windows 7

Getting Off Windows XP Is More Important Than Windows Vista vs. Windows 7 Research Publication Date: 12 March 2009 ID Number: G00165756 Getting Off Windows XP Is More Important Than Windows Vista vs. Windows 7 Michael A. Silver, Stephen Kleynhans For most organizations, skipping

More information

Management Update: Information Security Risk Best Practices

Management Update: Information Security Risk Best Practices IGG-07022003-01 R. Witty Article 2 July 2003 Management Update: Information Security Risk Best Practices The growing focus on managing information security risk is challenging most enterprises to determine

More information

Europe Wants Security Software, Despite Tight Budgets (Executive Summary) Executive Summary

Europe Wants Security Software, Despite Tight Budgets (Executive Summary) Executive Summary Europe Wants Security Software, Despite Tight Budgets (Executive Summary) Executive Summary Publication Date: 1 July 2003 Authors Fabrizio Biscotti Alain Dang Van Mien Norma Schroder Chris Pang This document

More information

Database Design Tool Magic Quadrant 2H02

Database Design Tool Magic Quadrant 2H02 Markets, J. Duggan Research Note 27 August 2002 Database Design Tool Magic Quadrant 2H02 Despite rapid growth in Unified Modeling Language, objectoriented and business process modeling tools, database

More information

I D C T E C H N O L O G Y S P O T L I G H T

I D C T E C H N O L O G Y S P O T L I G H T I D C T E C H N O L O G Y S P O T L I G H T P ow e ring Digital Transfor m a t i o n T h r ough the C l o u d - R e a d y E n t e r p rise September 2016 Adapted from Developing a Cloud Strategy for Digital

More information

Wireless Networks

Wireless Networks 802.11 Wireless Networks Presentation for North Central Regional Meeting October 19, 2010 Tom Jones, PE, RCDD / NTS Field Sales Engineer, D-Link Agenda Brief History of Wireless Networks 802.11b, 802.11g

More information

Spending on Service Provider Routers Begins to Grow in EMEA

Spending on Service Provider Routers Begins to Grow in EMEA Research Brief Spending on Service Provider Routers Begins to Grow in EMEA Abstract: 2Q03 brought the first rise in end-user spending on service provider routers in Europe, Middle East and Africa for a

More information

Asia/Pacific: Systems Consolidation, Hype or Reality?

Asia/Pacific: Systems Consolidation, Hype or Reality? Research Brief Asia/Pacific: Systems Consolidation, Hype or Reality? Abstract: Through 2005, consolidation will be of major concern to IT management in Asia/Pacific as organizations struggle to control

More information

KW Predicts: Who Will Own the Web-Conferencing Market?

KW Predicts: Who Will Own the Web-Conferencing Market? Strategic Planning, J. Lundy, L. Latham, R. Knox Research Note 21 November 2003 KW Predicts: Who Will Own the Web-Conferencing Market? In the knowledge workplace, voice over IP will revolutionize Web conferencing

More information

Controlled Medical Vocabulary in the CPR Generations

Controlled Medical Vocabulary in the CPR Generations Tutorials, B. Hieb, M.D. Research Note 5 November 2003 Controlled Medical Vocabulary in the CPR Generations A CMV capability becomes progressively more important as computer-based patient record systems

More information

Securing BYOD With Network Access Control, a Case Study

Securing BYOD With Network Access Control, a Case Study Research G00226207 29 August 2012 Securing BYOD With Network Access Control, a Case Study Lawrence Orans This Case Study highlights how an organization utilized NAC and mobile device management solutions

More information

Midsize Business Voice Service Spending Steady for 2003

Midsize Business Voice Service Spending Steady for 2003 End-User Analysis Midsize Business Voice Service Spending Steady for 23 Abstract: Telecom service providers need to know the voice telecom spending plans of the margin-rich midsize business segment in

More information

Deploying Mobility using Wireless VoIP

Deploying Mobility using Wireless VoIP APPLICATION N0TE ST-0119 August 29, 2005 Product: ShoreTel system System version: ShoreTel 6 Deploying Mobility using Wireless VoIP Mobility brings organizations considerable improvements in employee productivity,

More information

2016 Summary Annual Report and Annual Meeting Documents

2016 Summary Annual Report and Annual Meeting Documents 2016 Summary Annual Report and 2017 Annual Meeting Documents To Our Shareholders We enter 2017 with confidence in a bright future ahead for CenturyLink. We are clear in our approach to the market: we

More information

HDD Head and Media Markets Show Variable Growth and Decline, (Executive Summary) Executive Summary

HDD Head and Media Markets Show Variable Growth and Decline, (Executive Summary) Executive Summary HDD Head and Media Markets Show Variable Growth and Decline, 1998-2002 (Executive Summary) Executive Summary Publication Date: 12 March 2003 Author John Monroe This document has been published to the following

More information

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and

More information

External RAID-Based Storage System Analysis by Form Factor

External RAID-Based Storage System Analysis by Form Factor Research Brief External RAID-Based Storage System Analysis by Form Factor Abstract: Gartner Dataquest forecasts factory revenue for modular external RAID controllerbased storage systems will grow at a

More information

CIO Update: Gartner's Predictions for Storage Hardware

CIO Update: Gartner's Predictions for Storage Hardware IGG-11262003-03 J. Monroe, F. Yale, R. Passmore, N. Allen, S. Zaffos Article 26 November 2003 CIO Update: Gartner's Predictions for Storage Hardware The need for instant data access and increasingly cost-effective

More information

Wireless Network Standard

Wireless Network Standard Last Modified: 10/20/15 Wireless Network Standard Purpose The standard and guidelines described in this document will ensure the uniformity of wireless network access points at the University of Georgia.

More information

The Value of Cisco Compatible Extensions (CCX) for Mobile Computers

The Value of Cisco Compatible Extensions (CCX) for Mobile Computers The Value of Cisco Compatible Extensions (CCX) for Mobile Computers Originally Published: October 2007 Updated: April 2010, October 2012 A White Paper from Laird Technologies IEEE and industry standards

More information

Best Practices for Deploying Web Services via Integration

Best Practices for Deploying Web Services via Integration Tactical Guidelines, M. Pezzini Research Note 23 September 2002 Best Practices for Deploying Web Services via Integration Web services can assemble application logic into coarsegrained business services.

More information

Survey/Overview: Australian IT Service Provider Market

Survey/Overview: Australian IT Service Provider Market Markets, J. Longwood, M. Chon, R. Jester Research Note 15 April 2003 Survey/Overview: Australian IT Service Provider Market Market scans are used in sourcing strategy development and fast-track processes

More information

DISRUPTIVE TECHNOLOGIES IN THE DATACENTER

DISRUPTIVE TECHNOLOGIES IN THE DATACENTER DISRUPTIVE TECHNOLOGIES IN THE DATACENTER Ten Technologies Driving a Wave of Change Are there new technologies out there that could disrupt the economics and infrastructure of the modern datacenter and

More information

Optimize Your Broadband WAN

Optimize Your Broadband WAN Technology, G. Johnson Research Note 15 September 2003 Optimize Your Broadband WAN When migrating from narrowband to broadband WANs, be aware that TCP's limitations can severely affect network performance,

More information

The Growing Impact of Mobile Messaging

The Growing Impact of Mobile Messaging The Growing Impact of Mobile Messaging An Osterman Research White Paper Published November 2007 Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 Phone: +1 253 630 5839 Fax: +1

More information

Mobile Terminals: Western Europe, (Executive Summary) Executive Summary

Mobile Terminals: Western Europe, (Executive Summary) Executive Summary Mobile Terminals: Western Europe, 1998-2007 (Executive Summary) Executive Summary Publication Date: 6 June 2003 Authors Carolina Milanesi Ben Wood This document has been published to the following Marketplace

More information

A POLYCOM WHITEPAPER Deploying Enterprise-Grade Wi-Fi Telephony : Coverage, Capacity, Quality of Service, and Security Considerations for Delivering

A POLYCOM WHITEPAPER Deploying Enterprise-Grade Wi-Fi Telephony : Coverage, Capacity, Quality of Service, and Security Considerations for Delivering Deploying Enterprise-Grade Wi-Fi Telephony : Coverage, Capacity, Quality of Service, and Security Considerations for Delivering Excellent Voice Quality on Enterprise Wi-Fi Networks November 2010 Coverage,

More information

Cisco Meraki. Spectralink VIEW Certified Configuration Guide

Cisco Meraki. Spectralink VIEW Certified Configuration Guide Spectralink VIEW Certified Configuration Guide Cisco Meraki Meraki Cloud-Controlled APs MR26, MR30H, MR32, MR33, MR34, MR42, MR52, MR53, MR72, MR74, MR84 721-1013-000 Rev: A August 2017 Copyright Notice

More information

Feature. What exactly is WLAN? More reading:

Feature. What exactly is WLAN? More reading: The WLAN Roadmap Wireless Local Area Networking (WLAN) is a simple concept, but one that entails a wide, sometimes confusing, variety of standards, implementations, and future plans for development. This

More information

Achieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients

Achieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients Achieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients This document is provided as is with no warranties whatsoever, including any warranty of merchantability,

More information

The Business Communications Landscape Is Ripe for Massive Disruption

The Business Communications Landscape Is Ripe for Massive Disruption THOUGHT LEADERSHIP The Business Communications Landscape Is Ripe for Massive Disruption MAY 2017 Raul Castanon-Martinez, Senior Analyst, Workforce Collaboration and Communications Business communications

More information

Overcoming Concerns about Wireless PACs and I/O in Industrial Automation

Overcoming Concerns about Wireless PACs and I/O in Industrial Automation Overcoming Concerns about Wireless PACs and I/O in Industrial Automation Industrial Automation Flirts with Wireless The automation industry increasingly finds wireless attractive, and for several reasons.

More information

Push-to-Talk Brings Voice-Based Instant Messaging to Europe

Push-to-Talk Brings Voice-Based Instant Messaging to Europe Research Brief Push-to-Talk Brings Voice-Based Instant Messaging to Europe Abstract: Push-to-talk services will soon let Europe s mobile phone users send voice messages via IP, boosting data revenue. Young

More information

Dallas EXECUTIVE OVERVIEW. Multi-Tenant Datacenter Market MARKET FORECAST JUL Stefanie Williams, Associate Analyst, Multi-Tenant Datacenters

Dallas EXECUTIVE OVERVIEW. Multi-Tenant Datacenter Market MARKET FORECAST JUL Stefanie Williams, Associate Analyst, Multi-Tenant Datacenters MARKET FORECAST JUL 2016 Dallas Multi-Tenant Datacenter Market Stefanie Williams, Associate Analyst, Multi-Tenant Datacenters This report provides an overview of the competitive dynamics in the Dallas

More information

Lessons Learned from SD-WAN Deployments on Six Continents. 21 September 2016 Tim Sullivan Co-founder & CEO

Lessons Learned from SD-WAN Deployments on Six Continents. 21 September 2016 Tim Sullivan Co-founder & CEO Lessons Learned from SD-WAN Deployments on Six Continents 21 September 2016 Tim Sullivan Co-founder & CEO Coevolve s perspective on SD-WAN Coevolve was established in 2014 to drive enterprise adoption

More information

Cisco WAP121 Wireless-N Access Point with Single Point Setup

Cisco WAP121 Wireless-N Access Point with Single Point Setup Data Sheet Cisco WAP121 Wireless-N Access Point with Single Point Setup Secure, Easy-to-Deploy, Affordable Wireless-N Connectivity Highlights Provides affordable high-bandwidth 802.11n wireless connectivity

More information

802.11ac FREQUENTLY ASKED QUESTIONS. May 2012

802.11ac FREQUENTLY ASKED QUESTIONS. May 2012 802.11ac FREQUENTLY ASKED QUESTIONS May 2012 Table of Contents General Questions:... 3 1. What is 802.11ac?... 3 2. When will 802.11ac be ratified into a standard?... 3 5. Will 802.11ac come out before

More information

Get Ready for the Revival of Large Data Centers

Get Ready for the Revival of Large Data Centers Research Publication Date: 4 August 2006 ID Number: G00142079 Get Ready for the Revival of Large Centers Rakesh Kumar Although large data centers declined in importance in recent years, they will return

More information