market opportunity analysis of wireless lan-syed yacoob-0411

Upload: nagu-yk

Post on 06-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    1/64

    MARKET OPPORTUNITY ANALYSIS OF

    WIRELESS LAN

    A DISSERTATON SUBMITTED IN PARTICAL FULFILMENT OFTHE REQUIREMENTS FOR THE AWARD OF MBA DEGREE OFBANGALORE UNIVERSITY

    BY

    Mr. Syed Yacoob

    Under the guidance and supervision

    Of

    Mrs. NANDINI VAIDYANATHANM P Birla Institute of Management

    Bangalore

    M P BIRLA INSTITUTE OF MANAGEMENT(Associate Bharatiya Vidya Bhavan)

    BANGALORE

    2006

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    2/64

    DECLARATION

    I hereby declare that this dissertation entitled "Market Opportunity

    Analysis of Wireless LAN, is the result of my own research work

    carried out under the guidance and supervision of Mrs. Nandini

    Vaidhyanathan, MPBIM Bangalore .

    I also declare that this dissertation has not been submitted earlier to

    any Institute/Organization for the award of any degree or diploma

    Place: Bangalore

    Date: (Mr. Syed Yacoob)

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    3/64

    CERTIFICATE

    I hereby certify that this dissertation entitled "Market

    Opportunity Analysis of Wireless LAN, is the result of research

    work carried out by Mr. Syed Yacoob under the guidance of

    Prof. Nandini Vaidyanathan, M P Birla Institute of Management,

    Bangalore.

    Place: Bangalore

    Date: (Dr N S Malavalli)

    Principal

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    4/64

    CERTIFICATE

    I hereby certify that this dissertation entitled Market

    Opportunity Analysis of Wireless LAN, is an offshoot of the

    research work carried out by Mr. Syed Yacoob under my

    guidance and supervision.

    Place: Bangalore

    Date: (Prof. Nandini Vaidyanathan)

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    5/64

    ACKNOWLEDGMENT

    I would like to express my sincere gratitude to my research guide

    Prof. Nandini Vaidyanathan, M. P. Birla Institute of Management,

    Bangalore for her constant encouragement and guidance in the course of the

    research investigation.

    Further, I would also like to Dr N S Malavalli for providing all the

    necessary assistance in carrying out the project. I have gained a lot of

    knowledge throughout the course of carrying out this project.

    I would also like to thank Mr. Shiv Kumar, Transition System for their

    cooperation and help they have provided for completion of the.

    I would also like to sincerely thank the promoters of Vi TeleTechZone for

    giving me an excellent opportunity to work for a new venture and who have

    valued my findings and suggestions.

    Syed Yacoob

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    6/64

    CONTENTS

    CHAPTER TITLE

    CHAPTER 1 EXECUTIVE SUMMARY

    CHAPTER 2 INTRODUCTION

    BACKGROUND OF THE STUDY

    About ViTeleTechZone

    WLAN Overview, Standards and Organizations

    Wireless Security (Overview)

    MARKET RESEARCH: AN ESSENTIAL BUSINESSTOOL

    PROBLEM STATEMENT

    OBJECTIVES OF THE RESEARCH

    NEED AND IMPORTANCE OF THE STUDY

    CHAPTER 3 RESEARCH METHODOLOGY

    RESEARCH DESIGN

    SAMPLING TECHNIQUE

    SAMPLING PROCEDURE

    SAMPLE SIZE

    SDAMPLE DISCRIPTION

    RESEARCH INSTRUMENTS

    ACTUAL COLLECTION OF DATA

    CHAPTER 4 PRODUCT PROFILE

    CHAPTER 5 DATA ANALYSIS AND INTERPRETATION

    CHAPTER 6 FINDINGS AND RECOMMENDATIONS

    CHAPTER 7 CONCLUSION

    CHAPTER 8 ANNEXURE

    BIBLIOGRAPHY

    QUESTIONNAIRE

    DIRESTIONS FOR FURTHER RESEARCH

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    7/64

    Executive Summary

    The Wireless LAN (WLAN) industry is the fastest growing networking market,

    only overcome by limitations to secure it. There has been a widespread adoption of

    wireless networks in the SOHO user market. Wireless LAN technology is recognized,

    accepted and adopted by many organizations worldwide. Many companies and

    government entities are realizing the competitive advantage of deploying wireless

    technology in the workplace. Wireless technologies are continually evolving and

    providing advancements in speed, bandwidth, and security. However, large enterprises

    have been reluctant to deploy wireless networks due to perceived limitations in wireless

    security and the risks it poses to the organization.

    Simply, WLANs are a disruptive technology that has many challenges with

    securing its networks. Today, the WLAN industry can be categorized as overheated,

    where technology adoption is being driven by an impatient user base demanding more

    features, and an all out effort by vendors to address known wireless security

    vulnerabilities. There is a high priority in the industry, especially with the federal

    government, to push the technology to a point where the risk of compromise is

    minimized.

    The intent of this project is to address the security issues surrounding wirelessnetworks in an enterprise environment and analyse the market opportunities. The

    fundamental question plaguing the industry today is if wireless networks can be deployed

    securely. There is a mindset prevailing that wireless networks are inherently insecure.

    Can this be actually true, a fact or fabrication? What known security holes limit

    enterprise deployments of a WLAN and can they be fixed? This project will shed light

    on these questions and detail how wireless networks are secured and point out their

    limitations. Additionally, this paper will explore current and future initiatives to secure

    wireless networks in a large enterprise environment, and provide a roadmap where

    wireless security is headed in the future.

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    8/64

    Background of the Study

    About ViTeleTechZone

    ViTeleTechZone is a leading provider of VoIP solutions bringing in a sea-change in the

    way customers-providers define the Next Generation Telecom Technology Deployment.

    We provide VoIP Products, Services, Support, Software, Testing, Training and

    Knowledge Engineering.

    The main side of this ambitious venture will be sourcing and selling of Telecom

    Products At Low-cost (PAL) to Low-price Affording Prospects (LAP) and provide

    implementation / post implementation support. The Idea is to set up "ZONES" at all

    locations where the need for these services arises and to use the same for dual advantage.

    On the other side, the model is to create a "ZONE" where Small and Medium Business

    Units can come in to hire the expertise for outsourcing and get their jobs in distant

    "wonder lands" like India, China(Dalian) or any other cost-advantageous destination. It

    is a shared resource deployment formula

    Services

    To emerge as one-stop zone for virtual convergence using VoIP Solutions, we bring in a

    wide variety of customer-centric products and services like

    IP PBX and its accessories like IP phones, WiFi phones, headsets, call-centre workflow

    solutions, Software Voice Loggers.

    WLAN Switch, Access Points, WiFi and WiMax equipment to enable the foray into

    wireless security inclusive of roaming and high QoS.

    Gateways to handle the movement of traffic from Analog to Digital and vice-versa across

    simple and complex requirements.

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    9/64

    Switches to enable large scale migration of TDM to IP in developing environments.

    Low cost, small, more efficient BTS (Base Terminal Stations) to proliferate the use in

    places far and away.

    Advance Technology products in telecom and technology domain to increase the end-

    user experience.

    Customers

    We are committed to meeting and exceeding the expectations of our esteemed customers

    through our unremitting dedication to every aspect of service thru our range of Products

    and Services in the VoIP Space.

    Employees

    We are committed to the growth, development and welfare of our employees upon whom

    we rely to make this happen as we firmly believe in Employees are the main asset of our

    organization.

    Value for money

    Together, we shall build Vi TeleTechZone as a Global VoIP Zone Telecom

    Technologies Deployment organization, a one-stop virtual convergence company,

    striving for unsurpassed excellence in high-potential locations across the globe

    Shareholders

    As a result, we will create extraordinary value for our stakeholders ensuring that as we

    grow they grow to reach the highest heights to and help us in globalization of Vi

    TeleTechZone as a great Virtual Convergence company.

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    10/64

    Vision

    We see an organization which aims at leadership in the Telecom Technologies

    Deployment by understanding its customers and designing and delivering products and

    services which enable it to exceed their expectations. We will always demonstrate care

    for our customers through anticipation of their needs, attention to detail, distinctive

    excellence, warmth and concern.

    We see a lean, responsive organization where decision making is encouraged at each

    level and which accepts change. It is committed and responsive to its guests and other

    stakeholders.

    We see a multi-skilled workforce, which consists of team players who have pride of

    ownership, translating organizational vision into reality.

    We see an organization where people are nurtured through permanent learning and skill

    improvement, and are respected, heard and encouraged to do their best.

    We see a more multinational workforce which has been exposed to different cultures,

    problems and situations and can use its experiences to enrich the local employees across

    the globe.

    We see the world dotted with hotels of The Oberoi Group, in strategic commercial and

    resort locations.

    We see user-friendly technology enhancing value for our customers and helping our

    personnel by making information more accessible.

    We see an organization which is conscious of its role in the community, supporting socialneeds and ensuring employment from within the local community.

    We see an organization which is committed to the environment, using natural products

    and recycling items, thus ensuring proper use of diminishing natural resources.

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    11/64

    Interoperability - Technology leadership - Reasonable solutions

    Snom Technology AG was founded in 1996 and provides products in the area of Voice-

    over-IP, primarily on the basis of the open standards SIP. They stand out due to their high

    security standards and a multitude of functions that make everyday communication in the

    business area considerably easier.

    BroVis Wireless Networks was founded in 2003 with the vision of providing Broadband

    Services for the masses globally using cost-effective, standards based wireless

    technology. To fulfill its mission, BroVis Wireless Networks has developed technology

    that substantially enhances the capabilities of current 802.11 standards based wireless

    technology to enable mass adoption of complete wireless solutions for outdoor last mileaccess, MAN deployments, campus wireless distribution, specialized indoor wireless

    networks and indoor-outdoor integration in challenging and rough terrains where Line of

    Sight is not available. BroVis Wireless Networks has already started development efforts

    on the 802.16 standard platform to address co-existence and convergence of 802.11 and

    802.16 networks.

    BroVis' breakthrough TrueEXOR (True Extended Outdoor Range) technology greatly

    increases the range, speed, link reliability, security and ease-of-use. Using TrueEXOR

    technology and a comprehensive infrastructure management platform- WIOS (Wireless

    Infrastructure Operating System), BroVis has developed BroadCell and Radio-Zone

    solutions to address the various market segments and application needs.

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    12/64

    BroVis Wireless Networks provides:

    P-MP and P-P Multi-sector Base-station Concentrators with integrated network

    functionality

    Multi-User and Single-User Subscriber Units (CPEs)

    Extended Range Indoor Access products

    Various Antenna Options

    Infrastructure Management Software

    BroVis' engineering and management team includes Broadband industry's successful and

    pioneering technology entrepreneurs from Lucent, Ascend Communications, Qualcomm,

    Cisco Systems, Corona Networks, HP, Sun Micro Systems, Intel and Centillium

    Communications. The company's corporate offices are located in Cupertino, California,

    USA, with its development headquarters in Chennai, India and regional offices in

    Bangalore and Mumbai, India.

    A fast growing enterprise wireless and security company

    At the intersection of two of the hottest technology markets on the planet - wireless and

    security - Aruba is a fast-growing, privately-held network infrastructure company

    founded in February 2002. We pioneered the concept of centralized wireless LANs and

    are credited with introducing the first modular WLAN switching system . We build high-

    performance mobility and security systems for enterprises that allow them to seamlessly

    introduce wireless, security and mobility services over their existing wired networks and

    manage those services from a single point.

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    13/64

    Build high performance wireless LAN and wired/wireless grid controller systems

    Aruba is the only company that provides complete centralized security and policy

    management for both wired and wireless users. We do this through a unique combination

    of hardware and software. Aruba's systems integrate high performance processing

    engines and couple this with state-of-the-art RF management and security software.

    Combined, Aruba's WLAN switches and grid controllers provide corporations with the

    ability to build scalable grids that deliver on-demand wireless, security and mobility

    services.

    Aruba markets and manufactures next generation enterprise-class systems that let

    corporations deal effectively with new network management and security issues caused

    by wireless technology and user mobility. Considered the highest performance and

    feature-rich enterprise systems on the market, Aruba's WLAN switches and grid

    controllers integrate a variety of functions, such as VPN termination, user-aware

    firewalling, RF management, and intrusion prevention within a centralized system. This

    system allows enterprises to define and enforce network policy for both wired and

    wireless users from a single point. Aruba's products include modular and stackable

    wireless LAN switching systems , 802.11a/b/g access points , grid controllers and

    wired/wireless grid points .

    AudioCodes Ltd. enables the new voice infrastructure by providing innovative, reliable

    and cost-effective Voice over Packet technology and Voice Network products to OEMs,

    network equipment providers and system integrators. AudioCodes provides its customersand partners with a diverse range of flexible, comprehensive media gateway, server and

    processing technologies, based on VoIPerfect - AudioCodes' underlying, best-of-

    breed, core media gateway architecture. The company is a market leader in voice

    compression technology and is a key originator of the ITU G.723.1 standard for the

    emerging Voice over IP market. AudioCodes voice network products feature media

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    14/64

    gateway and media server platforms, which function as core gateways or CPE voice

    gateways for packet-based applications in the wireline, wireless, broadband access, and

    enhanced voice services markets. AudioCodes enabling technology products include

    VoIP, CTI and call logging communication boards, VoIP media gateway processors and

    modules.

    Partnering with AudioCodes enables OEMs, Network Equipment Providers, Systems

    Integrators and Enterprises to build cutting-edge solutions based on AudioCodes' reliable,

    flexible, and comprehensive technology offerings - all under one roof.

    The company's shares are traded on NASDAQ (symbol: AUDC ) and the Tel Aviv Stock

    Exchange. AudioCodes' headquarters and R&D facilities are located in Lod, Israel, with

    U.S. headquarters in San Jose, California. Additional offices are in Boston (MA),

    Chicago (IL), Research Triangle Park (NC), Somerset (NJ) Beijing, Tokyo, Paris and

    London.

    Sloka makes broadband wireless networks simple- it combines both Wimax and 3G

    UMTS FDD into the same network elements, thus enabling carriers and operators to rollout networks for both technologies at the same time, thus saving CapEx. Sloka manages

    both the networks using the same network management systems thus saving OpEx.

    These solutions allows a 3G operator to leverage existing infrastructure network

    interfaces, towers, real estate, billing software, management software, databases,

    subscriber information, etc, to roll out Wimax faster, cheaper and better!

    Sloka Telecom Inc was formed in late 2004 as a provider of broadband wireless solutionsto address the new needs and requirements of 3G operators and network equipment

    vendors. Migrating from older 2G/2.5G networks to newer 3G networks, coupled with

    competition from Wimax poses new challenged and offers new opportunities.

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    15/64

    Formed by experienced technocrats, it staffs engineers coming from GSM, TDMA,

    WCDMA technologies of telecommunication industry.

    Sloka is engaged in design, development, testing and sales (direct and in-direct) of its

    products. Sloka also supports support and maintenance activities for all its products.

    Sloka partners with reputed OEMs for its manufacturing.

    Founded in 2002, ZyFLEX is a leading network company focusing on the last mile

    access solutions and technologies. Our major products are multi-services broadbandaccess equipments that integrate the latest fiber optical broadband access technologies.

    Market demands for broadband services have been rapidly increased with soaring

    bandwidth demands for backbone networks, especially with the mass applications of

    TCP/IP networks in enterprise intranet or business internet. Responding to such trends,

    ZyFLEX has been devoting our continuous efforts in research and development to

    integrate the state-of-the-art optical access technologies on our products. Furthermore, we

    integrate our products with patented and most cost-effective solutions that help Telecom

    service providers enable voice, data, video triple play services onto any optical access

    technologies. Thus, this will drop service providers' significant costs for deployment and

    equipments upgrade. It will also provide them with a smooth and seamless path to

    provide new services in the future or migrate their services onto the new access

    technology.

    Our vision is to continue our achievements in optical broadband access industry and

    become a leading company in the Global market. All our R&D members bring with them

    most outstanding academic backgrounds and excellent field experiences. With the

    capability to foresee the market needs and provide solutions in a timely manner, they are

    our biggest assets to achieve our vision.

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    16/64

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    17/64

    various fields including banking/finance, insurance, tele-marketing, telecommunications,

    helpdesks, outsource call centers etc.

    Everyone wants one vendor who is customer centric, can provide latest technology, offer

    superior service, and all at a competitive price. If you are looking for a vendor who can

    offer that kind of solution, you are at the right place. We are proud to say that it is our

    business!

    WLAN Overview, Standards and Organizations

    WLAN technology first dates back to the mid-1980s when the Federal

    Communications Commission (FCC) made the RF spectrum available to the industry. In

    1990, the Institute of Electrical and Electronics Engineers (IEEE) formed a working

    group (WG) to develop a wireless standard to provide wireless networking technology to

    be similar to the wired Ethernet (802.3). This group focused on developing a general

    standard for radio equipment and networks working at 2.4 GHz, with access time of 1

    and 2 Mbps. In June 1997, the IEEE released the wireless standard describing the

    operations for WLAN, known as 802.11. The 802.11 specifications is the fundamental

    standard for WLAN. The new standard defined the following functions and technologies:WLAN architecture, MAC layer services such as association, re-association,

    authentication and privacy, frame formats, signaling functions, and WEP algorithm.

    In September 1999, the IEEE ratified 802.11b that provided the same basic

    architecture, features and service as 802.11, but improved upon the standard by adding

    higher data rates (5.5 and 11 Mbps) and more robust connectivity. The 802.11b standard

    established operations in the unlicensed 2.4 2.5GHz frequency range using direct

    sequence spread-spectrum (DSSS) technology.

    In late 2001, 802.11a was ratified that improved the data rate to 54 Mbps,

    operating at a licensed frequency range of 5 GHz, and using orthogonal frequency

    division multiplexing (OFDM) technology to reduce interference. This was a dramatic

    technology shift from 802.11b providing fast data transfers at a higher frequency range

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    18/64

    that was not susceptible to interference from other devices. However, the 802.11a

    standard sacrificed decreases in range comparable to 802.11b.

    In 2003, the IEEE published 802.11g Amendment 4 that provided a higher data

    rate extension in the 2.4 GHz unlicensed frequency band up to 54 Mbps (similar to

    802.11a). It provided backward compatibility to 802.11b, a major advantage, by still

    supporting the complimentary code key (CCK) modulation. The 802.11g provided the

    best of both worlds (802.11a and 802.11b) with higher speeds, and employing OFDM

    technologies (like 802.11a), but in the 2.4 GHz frequency bands where range was not

    compromised (like 802.11b).

    The above IEEE standards (802.11a, 802.11b, and 802.11g) serve as the major

    players in the world of wireless networking. However, there are various other standard

    tasks and WGs involved with promoting the overall functionality of the 802.11 protocol.

    Two important standards that directly addressed security limitations in the 802.11

    protocols were the IEEE 802.11i and 802.1x standards.

    The IEEE 802.11i and 802.1x specifications addressed several separate initiatives

    for improving WLAN security. The IEEE Task Group i (TGi) developed the 802.11i

    standard, published in 2004, to provide short-term and long-term solutions for wireless

    security to ensure message confidentiality and integrity. The TGi developed the Temporal

    Key Integrity Protocol (TKIP) as a short-term solution, known as WiFi Protected Access

    (WPA), to address problems with WEP and to support legacy systems. It is a cipher suite

    that consists of three protocols: a cryptographic message integrity algorithm, a key

    mixing algorithm, and an enhancement to the initialization vector (more on this later).

    The long-term solution defined in 802.11i is the Counter Mode/CBC-MAC Protocol

    (CCMP) based on the newly released Advanced Encryption Standard (AES). CCMP is a

    highly robust algorithm solution that is not compatible with older WEP-oriented

    hardware, as thus will require new hardware and protocol changes. The AES (CCMP)

    protocol provides WLANs with a stronger encryption (confidentiality) capability, and

    message integrity than TKIP. Also, it incorporates replay protection. The future of

    WLAN deployments is moving towards CCMP as the accepted compliance standard.

    The 802.1x technology was primary developed to support 802 LANs, and is

    included in the 802.11i standard to provide MAC layer security enhancements. The

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    19/64

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    20/64

    4. The AP passes request to the RADIUS server.

    5. The AS and client exchange authentication messages for server to verify clients

    identity (password). Mutual authentication also possible where client is verifying

    the AS identity.

    6. The AS instructs the AP via a RADIUS-ACCEPT message to let the client onto

    the network if the client has satisfied the authentication criteria. If not, an

    RADIUS-REJECT message is sent to the AP.

    7. Upon receipt of the RADIUS-ACCEPT message, the AP transitions the client port

    to an authorized state allowing the client onto the network.

    Since the ratification of the initial 802.11 standard, the IEEE 802.11 WG has

    made numerous revisions through various task groups to improve wireless

    technologies and security.

    Wireless Security (Overview)

    Wireless communications offers many benefits to an organization including

    portability, flexibility, increased productivity, and lower installation costs. However,

    there is the security challenge with WLAN. Enterprise organizations must have the

    assurance that a WLAN deployment offers minimum risk before the benefits can be fully

    realized. In additional to the risks associated in wired networks, there are additional risks

    inherent in wireless technology exacerbated by wireless connectivity, and some new risks

    not associated with wired networks. Simply, security is the weak link to the wireless

    revolution.

    In the wired world, protection is provided to some extent by wires, and access is

    available through a physical jack to communicate. In the wireless world, the airwaves are

    open for all to listen, similar to an Ethernet port in the parking lot, creating more

    challenges.

    Security breaches can be very costly to an organization putting at risk their most

    valuable assets, including intellectual property, proprietary business processes, customer

    data, not to mention the dollar costs due to lost business and recovering from the event.

    The security challenge is to incorporate basic security mechanics and mechanisms for

    organizations deploying wireless networks.The goal to successfully implementing a

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    21/64

    WLAN is to ensure all tools and techniques are used to minimize any security risks

    associated from a passive or active attach.

    The first step to address the complexity of securing wireless networks is by

    discussing the basic security mechanics, and mechanisms available for wireless

    deployments. Basic security mechanics, in the wireless world, entails the general

    capabilities of confidentiality, integrity, availability, authentication, authorization, and

    access control. Mechanisms provide the means through technologies, protocols, and

    implementations to achieve the basic security mechanics. Some important key

    mechanisms to deploy in a wireless network include encryption protocols, digital

    signatures, and key management. Security, for all practical purposes, is the combination

    of processes, procedures, and systems used to achieve the basic security mechanics.

    Table IV describes the basic security mechanics and mechanisms for wireless

    deployments.

    Confidentiality

    The goal of confidentiality is to protect information during its transmission from

    unauthorized entities. Encryption is the key mechanism to achieve confidentiality.

    Simply, encryption is the means to encode data using cryptography to achieve privacy of

    in-transit data, and meaningless to unauthorized recipients. By converting data into a

    form that cannot be easily understood, encryption attempts to prevent eavesdropping

    from anyone who is not authorized to read it. In the wireless world, the goal is to prevent

    eavesdroppers from capturing packets and analyzing them later. Therefore, the algorithm

    must be able to achieve confidentiality for a certain length of time.

    The process to encrypt data is through use of an algorithm, or key. There are two

    key paradigms used to encrypt data: symmetric key and asymmetric key algorithms. In

    the wireless world, the preferred method for data confidentiality is symmetric key

    algorithms. It uses a common key and the same cryptographic algorithm to both encrypt

    and decrypt data. Symmetric key algorithm uses one of two different methods to encrypt

    and decrypt data: block ciphers and stream ciphers. Early WLAN deployments used the

    block cipher method. Generally, block cipher methods are more suitable for software-

    based encryption. The newer symmetric key algorithms employ a stream cipher method.

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    22/64

    Stream ciphers are more efficient for hardware-based encryption. In addition, stream

    ciphers are considered more inherently secure than block ciphers. Whereas, block ciphers

    transform identical message blocks into identical cipher-text blocks when using a fixed

    key, allowing for an unauthorized entities to delete, insert or replay of cipher-text, and

    conduct cipher-text searching for matches. Stream ciphers employ a memory function

    that encrypts a stream of data (usually a character or byte of data) under a time varying

    function of the key that prevents deletion, insertion or replay of cipher-text, and cipher-

    text searching.

    Asymmetric encryption uses a pair of keys to encrypt and decrypt data: a public

    key and a private key. It can use the same algorithm or a different but complimentary

    algorithm to scramble or unscramble data. What one key encrypts, only the other key can

    decrypt. Thus, if plain text is encrypted using the public key, than the private key must be

    used to decrypt the cipher-text (and vice versa). Asymmetric encryption is rarely used

    for data confidentiality. The algorithm is typically used in applications involving sender

    authentication using digital signatures and key management, and the exchange of session

    symmetric keys.

    Integrity

    Integrity provides the means to detect if data has been tampered with in any way.

    Deploying strong integrity mechanisms are aimed at providing confidence that the data

    coming into or exiting the network is trustworthy. A digital signature is the preferred

    mechanism to achieve integrity. Simply, a digital signature is an encrypted message

    digest or hash that is appended to a document. A digital signature uses a public key

    encryption algorithm to confirm the identity of the sender and encrypt the hash of a

    message, and a one-way secure hash function algorithm to ensure the integrity of the

    document.

    Authentication

    Authentication is the capability to validate the identities of a user, service or

    device based on predefined criteria. Due to the broadcast nature of WLANs, much

    attention and focus has been given to authentication to prevent unauthorized access to

    network resources by a user or device. Authentication is the process of determining

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    23/64

    whether the authorized user, service or device that has tried to gain access to the network

    is in fact the authorized entity. In the wireless world, the 802.11 specifications do not

    consider the user, but only authenticates a wireless station or device. Authentication

    systems can range from simple name-password matches to challenge-response protocols.

    The 802.11 specifications define two basic authentication services: open authentication

    and shared-key authentication methods. There are two other mechanisms that are

    commonly used for authentication: the Service Set Identifier (SSID), and the Media

    Access Control (MAC) address.

    Open Authentication and Vulnerabilities

    Open authentication method does not employ cryptographic validation. It is a nullauthentication algorithm, meaning the AP will grant any request for authentication by a

    device. A wireless station can access the wireless network without any identity

    verification. If a wireless client (station) can find and communicate with an Access Point

    (AP), it will be allowed to join the wireless network. The only security mechanism

    employed for open authentication is the SSID of the AP. If WEP encryption is not

    employed, a device only needs to know the SSID of the AP to gain access to the network.

    If WEP encryption is enabled on the AP, the device will not be able to transmit or receive

    data from the AP without a correct WEP key. In 1997, 802.11 specified authentication to

    be connectivity-oriented, and allow devices quick access to wireless networks. Open

    authentication provides simplicity and ease with connecting to a wireless network, and is

    recommended for a public WLAN.

    There is no way an AP can determine whether a wireless client is valid or not by

    employing open authentication. This can provide considerable security risk if open

    authentication is deployed without WEP encryption implemented. However, WEP has

    been compromised and is no longer a viable WLAN security solution. WEP

    vulnerabilities will be discussed in more detail later.

    Shared Key Authentication and Vulnerabilities

    Shared key authentication use to be considered one of the more secure methods of

    authentication in a WLAN environment. It uses a cryptographic technique for

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    24/64

    authentication, and is based on a challenge-response protocol. The shared key

    authentication requires a static WEP key to be configured by a wireless client. The AP

    sends a random challenge in plaintext to a wireless client. If the wireless client has

    knowledge of the shared key, it will encrypt the challenge and sent the result back to the

    AP. The AP will allow access only if the decrypted value (the result computed by the

    wireless client) is the same as the random challenge transmitted by the AP.

    There are several fundamental problems with shared-key authentication. First, it

    does not provide for mutual authentication, but merely establishes proof that both parties

    (AP and wireless client) share the same secret. Secondly, the shared-key authentication

    method depends on the WEP infrastructure that has been deemed insecure for a variety of

    reasons. Third, the challenge-response process explained above is vulnerable to a man-

    in-the-middle attack. An eavesdropper can capture both the plain-text challenge text and

    the cipher-text response by just sniffing with a protocol analyzer, and determine the key

    stream (Figure 2).

    Figure 2Known Plaintext Attack

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    25/64

    MAC Address Authentication and Vulnerabilities

    The APs policy can also base its access on the clients MAC address, where the

    authenticating MAC address is matched to the APs table of valid MAC addresses. MAC

    address filtering is not specified in the 802.11 specifications. However, many vendors

    support this method of authentication. MAC address filtering provide another layer of

    security to limit unauthorized devices from accessing an network, and augments the open

    and shared key authentications provided by 802.11 specifications.

    Availability

    It requires that a WLAN be available to authorized users when needed. It is the

    capability to receive and send data without disruption of services. DoS attacks are a threat

    to network availability. Organizations must deploy defense mechanisms to detect and

    guard against various forms of DoS attacks to ensure availability is achieved.

    Access Control

    Access control is the capability to ensure users see only the information for which

    they are authorized. Entities (usernames, MAC/IP addresses, etc.) use credentials such as

    passwords, and shared keys to establish the identity, that is authenticated by AAA

    systems (RADIUS, LDAP, etc). It uses 802.1x authentication protocols or similar (EAP,LEAP, PEAP, etc.) to exchange credentials and establish challenge/response handshakes.

    Once authenticated, an AAA system provides the authorization and controls the

    access to what network resources are allowed by a user. Access control security

    mechanisms are based on authentication, and having knowledge of WEP keys before

    access and privileges are granted.

    Encryption/Decryption

    Encryption is the mechanism to achieve confidentiality. It is the capability to transform

    plaintext into meaningless bytes, known as Cipher text, based on three primary 802.11

    algorithms: WEP, TKIP and AES (CCMP). Decryption is the reverse process. It is the capability

    to transform meaningless bytes (Cipher text) back to meaningful data (or plain text). Simply,

    encryption techniques provide three main goals in a WLAN: confidentiality, message integrity,

    and supports authentication, authorization and access control process. See discussions

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    26/64

    above for confidentiality, message integrity and access control. A detailed discussion of

    WEP, TKIP, and AES (CCMP) encryption algorithm are found later in this paper.

    Key Management

    Key management is the process of distributing keys to support encryption,

    decryption, and mutual authentication. It is the process of generating, storing,

    distributing, and providing the overall protection of keys. A key is digital code. Primarily

    used to encrypt, decrypt and sign information. Keys length and the strength of a key are

    two important topics related to key management. Key strength is the capability to

    withstand the digital code from being deciphered, and is usually measured by the time,

    effort and resources required to break the key. Key length is the number of bits in the

    key. The longer the key length, the more difficult it becomes to break a key with brute-force. However, there must be a balance between key cost and the worth of the

    information that the key is protecting. Longer key lengths require more overhead and

    bandwidth, and are more computationally expensive to encrypt and decrypt. There are

    two types of keys: public keys, and shared or secret keys. With public keys, there known

    by everyone. With shared (or secret keys), it is known only by the recipient of the

    message. (See symmetric and asymmetric key operations above for a discussion on

    keys). With WEP, keys were distributed manually, and unique only to the network. A

    WEP key was vulnerable to unauthorized access. A compromised key provides the most

    direct means of unauthorized access. With the IEEE 802.11i standard (WPA/WPA2

    protocols), keys are distributed dynamically (automated), and are unique to a packet,

    session and user.

    Advantages WLAN

    A wireless LAN has some specific advantages over wired LAN

    Access to the network can be from anywhere within range of an access point,

    giving users the freedom to use ICT where and when it is needed.

    It is typically easier and quicker to add or move devices on the network (once in

    place, a wired LAN can be difficult to move and expensive to change.) Increasing

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    27/64

    the overall network coverage of the wireless LAN can often be achieved by

    adding further access points.

    Small dynamic ad hoc networks can be created very quickly and relatively

    easily.

    It is typically easier and quicker to provide connectivity to the network in areas

    where it is difficult or undesirable to lay cable or drill through walls. Instances

    might be:-

    where a school is located on more than one site or is made up of

    several buildings.

    when implementation is anticipated to be temporary or semi-

    permanent

    when only one device is required at a remote part of a building or

    site

    in historic buildings where traditional cabling would be difficult

    to install or inappropriate

    Where wireless enabled laptop computers are used, any classroom in range of an

    access point can become a computer suite, potentially increasing the use of ICT

    across the curriculum.

    While the initial investment required for wireless LAN hardware can be similar

    to the cost of wired LAN hardware, installation expenses can be significantly

    lower

    Wireless provides increased flexibility. A user with a wireless enabled laptop

    can access the wireless network and carryout his work, share resources, obtain

    information from the internet from anywhere within range of an AP, without

    being tied to a wired PC. This flexibility is further enhanced when combined with

    a wireless projector.

    Portability. They allow computer devices to move around the premise of the

    facility.

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    28/64

    Disadvantages of Wireless LAN

    As the number of devices using the network increases, the data transfer rate to

    each device will decrease accordingly.

    The current data rates of wireless networks means that high bandwidth activities

    are better done on wired networks

    As wireless standards change, it may be necessary, or at least desirable, to

    upgrade to higher specifications of wireless which could mean replacing wireless

    equipment (wireless NICs, access points etc). Currently, wireless standards are

    changing more quickly than wired standards.

    Security is more difficult to guarantee.

    Devices will only operate at a limited distance from an access point, with the

    distance largely determined by the standard used. Obstacles between the access

    point and the user, like walls, glass, water, trees and leaves can also determine the

    distance of operation. Poor signal reception has been experienced around

    reinforced concrete school buildings; these may require higher numbers of access

    points which in turn increases overall cost.

    In practice, a wireless LAN on its own is not a complete solution and wi ll still

    require a wired LAN to be in place to provide a network backbone.

    Data speeds drop as the user moves further away from the access point

    It is easier to make a wired networkfuture proof for future requirements

    As the number of people using wireless devices increases, there is the risk that

    certain radio frequencies used for wireless will become congested and prone to

    interference; particularly the 2.4GHz.frequency.

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    29/64

    MARKET RESEARCH: AN ESSENTIAL BUSINESS TOOL

    Market research is vital for businesses, whether they are looking to exploit a new

    commercial opportunity or grow their existing customer base. From discovering a gap in

    the market to ensuring customer satisfaction and planning effective marketing campaigns,research can provide the market intelligence needed to encourage success, enhance

    competitiveness and maximize profits.

    What is market research? Put simply, market research is the collection and analysis of

    information about markets, organizations and people to support better business decisions.

    In todays competitive business environment, the more knowledge a business has about

    its customers, the more likely it is to succeed.

    Market research works because, by talking to a relatively small number of people, it is

    possible to find out about a far larger number. However, it only works if the people who

    are interviewed (the sample) are a representative subgroup of the total group of interest

    (the universe). The universe

    might be, for example, the population as a whole, parents, car drivers, finance directors,

    IT managers or supermarket buyers.

    Provided a representative sample is identified and, critically, the right questions are

    asked, market research can deliver significant profit from knowledge. When planning a

    sales initiative or

    programme, it can provide vital intelligence on specific targets, their attitudes and buying

    patterns.

    In addition, it can minimize potential risk and avoid wasting both time and money.

    More specifically, businesses can use market research in the following ways:

    A key benefit of market research is to help businesses better understand their

    customers. Through usage and attitude studies, organizations are able to assess

    a range of intangibles

    Such as the level of contentment among customers or individual preferences

    thereby helping to secure customer loyalty. As a result, businesses can more

    effectively target resources at particular groups or better understand their

    purchasing patterns.

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    30/64

    In addition, market research can help in the development of new products and

    services. Product development research is widespread and enables businesses to

    identify the most lucrative areas for a new product or service. It can also help to

    determine the most appropriate and profitable launch programme, as well as

    ongoing activity to support the sales effort such as advertising, marketing,

    promotions and PR.

    Internally, market research can be used to learn about and monitor satisfaction

    and morale amongst the team. It can help to improve internal communications,

    identify areas of dissatisfaction and highlight internal activities and initiatives

    which could help to boost individual and team performance.

    Effective market research can also help businesses to gain an understanding of the

    competition. By embarking on competitor analysis, usually based on desk

    research, organizations are able to examine the strengths and weaknesses of their

    main rivals and emerging, smaller competitors. As a result they can learn from

    other mistakes - or successes- and target new markets or business opportunities.

    As in most areas of business, the agencies which undertake market research vary in terms

    of size, area of specialization and location

    STATEMENT OF PROBLEM

    Problem statement

    Development of an effective business strategy demands information regarding customers,

    their behavior, the dynamics of their purchase attitude towards the product etc. Therefore,

    the area of study includes,

    Understanding the product /technology,

    Identifying and studying the domain of the product

    Identifying the prospects

    Analyzing their need for the product

    Identifying key purchase drivers

    Identifying the various target segments and opportunities

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    31/64

    Research Objectives

    1) To track customer dynamics at micro level.

    2) To identify key purchase drivers.

    3) To uncover target segments and opportunities

    RESEARCH DESIGN:

    Research design is partly explorative and descriptive. The data was collected from a

    stratified sample of customers through structured questionnaire, which will be analyzed

    with the appropriate tools and inferences, will be drawn accordingly.

    Need and Importance of the Study

    The company we are working for is a new venture and is promoted by three

    colleagues who after working in various industries for more than two decades have come

    together to fulfill their wish of becoming an Entrepreneur. This study will help them to

    access the demand for the product called Aruba in the market so that they can frame

    appropriate strategies to increase the sale and compete with the various products already

    existing in the market.

    This study has given us an opportunity to get in touch with the corporate world

    and improve the soft skills and interact effectively.

    Approach and Methodology

    In order to achieve the goals of the project, my approach was to use several

    methods and several sources of information and opinions. My research methodology has

    been to first take a snap shot of the current market to see what companies are working on

    practical applications of wireless technologies. After identifying these companies, I set up

    interviews with representatives from mostly marketing, but sometimes the engineering

    departments. I have also researched most written material in this field as well as attended

    several trade shows and seminars.

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    32/64

    In this section, we shall describe our secondary and primary research

    methodology. In the end, we discuss the limitations of this study.

    Sampling technique

    Simple Random Sampling technique is used. This type of sampling avoids any

    bias in choosing the sample.

    Sample Size

    The chosen sample size for research is 50. The sample is derived from

    respondents within Bangalore city.

    Sample Description

    The sample is chosen at random from among a number of respondents.

    Instrumentation Techniques

    The questionnaire technique is used for the survey and the reasons for using this

    approach are

    It covers wide area (number of organizations)

    It is not an expensive affair

    Original data could be obtained

    It is free from all bias

    Easy to tabulate and understand

    Primary research

    In addition to relying on the already existing research, I also conducted our own

    research at the grass-roots level:

    Interviews

    An interview can be quantitative, qualitative or a combination of them both. In a

    quantitative interview are the questions predetermined and presented together with

    multiple choice answers. Quantitative means that there must be measurable results, which

    is why the approach and guiding of the interview must be the same for all interviews. A

    qualitative interview is conducted in an investigating situation, which resembles an every

    day situation and an ordinary conversation. The answers to the questions shall be

    spontaneous and be a result of the interviewees own opinions.

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    33/64

    Quantitative and qualitative are each other opposites. In a quantitative interview

    the biggest work effort is put into the preparations, as opposed to the qualitative

    interviews where the biggest effort is needed for the following analysis.

    I have used qualitative interview methodology, where my main interview support

    has been a few notes with the questions that I wanted the interview to revolve around. I

    choose this approach in order to create a discussion around our topics and to get both the

    opinions of the interviewee as well as the opinions of the company. I also wanted to be

    able to elaborate around the topics and not just get standard answers. Since I had

    questions about future scenarios its difficult to have predetermined answers.

    I conducted 50 interviews with representatives from various companies, and

    technology experts at universities. Most of the companies I talked to were most

    forthcoming and helpful.

    Secondary research

    In the early phase of this project my work was focused on gathering secondary

    research material in order to avoid re-inventing the wheel. Ive gathered this information

    from literature, articles, industry reports and written material from the Internet. Theres a

    limited amount of WLAN literature available. Therefore, the books Ive read have been

    more focused on how to market and sell high-tech products in order to make them

    adopted by the mass market and thus achieving a possibility to make a large profit.

    Web Research

    I used the World Wide Web extensively to find information about various fields

    of interest.

    I have continuously monitored the WebPages of IEEE and ETSI in order to stay

    on top of the latest development. The Web helped us get up to speed with the differences

    between various existing technologies such as IEEE 802.11b and 802.11a, Bluetooth,

    HiperLAN/2 and others. I also researched the different players in the market to study

    their business models.

    I have gathered market research that has already been done in this field to avoid

    re-writing work that has already been done.

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    34/64

    Conclusion

    After the secondary and primary research, we gathered sufficient background

    knowledge and understanding of the WLAN market today to help us come up with my

    own conclusions as to how the market will develop.

    Limitations to this study

    Since secondary research is a compilation of someone elses information there is

    always a risk that the information contains insufficient knowledge or errors. This has led

    us to always try to conduct a critical discussion regarding the information we have

    gathered in this way. This critical outlook has also evolved along the course of the

    project, as we have become more competent in this field.

    Primary research can also include propaganda or actual errors. There can be

    several reasons for this, e.g. the interviewee might not want to answer the question

    correct for business reasons.

    In order not undermine the credibility of this project it was crucial that I

    interviewed the right persons. This is especially true when more than one company within

    the same line of business are represented. Thats why Ive been careful to choose people

    with equivalent positions at the different companies. It has not always been possible to

    interview the equivalent position in every company, but Ive tried to interview the system

    administrators or someone in a management position in business development. This

    selection was done not only because people in these positions have extensive knowledge

    about corporate strategies, but also because they have a technical knowledge of the

    enabling technologies.

    With this in mind, there are however a few other limitations to this study:

    Narrow geographical focus (Bangalore). This is due to the fact that I had limited

    time and resources.

    Not highly focused on security. Security of WLANs remains a big issue that

    needs to be solved. Though I have identified the problem, and suggested a few

    possible solutions, I have not attempted to solve the practical security issues.

    I have focused on viable and currently existing technologies for our research.

    Replacing technologies such as IEEE 802.11a and HiperLAN/2 are not available

    for mass deployment yet.

    Since my main objective with this report is to investigate the market opportunities for

    WLAN, these limitations do not a major affect my conclusions on how the market should

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    35/64

    be segmented or which player is more suitable to seize the WLAN opportunity.

    Nonetheless, the issues addressed above are still most important and I recommend them

    to be further investigated in future research.

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    36/64

    Product Overview

    Network managers today are faced with three major IT trends that they must

    address: mobility, security, and convergence. All three trends intersect at the edge of the

    network the point where users connect to enterprise services. The edge of the

    enterprise network today, built on the past decade of networking technology, is a fixed

    edge. It was designed for a time when users and devices were not mobile.

    Arubas Mobile Edge System enables a new type of edge for the enterprise

    network the mobile edge. The mobile edge allows users and devices to connect over

    the air and across any network, to securely gain access to enterprise resources.

    The mobile edge is an evolutionary new architecture that delivers mobility, security

    and convergence for todays networks and builds on a vision where the enterprise

    network will ultimately have far fewer ports than today.

    Arubas Mobile Edge System consists of three components:

    1. Mobility controllers which are centralized service delivery platforms for the

    Mobile Edge

    2. Controlled access points (APs) which tunnel wired & wireless user traffic tomobility controllers over the LAN, WAN and the Internet

    3. Aruba software provides all the intelligence for the Mobile Edge

    The Challenge

    The Challenge Network managers today are faced with three major IT trends that

    they must address: mobility, security, and convergence.

    Mobility is heavily driven by users through technologies such as Wireless LANs,

    cellular phones and VPNs to conduct business in the office, on the road and at home.

    Network security, protecting information assets against unauthorized disclosure,

    alternation, or destruction, has become increasingly important in the age of Internet

    worms, viruses, and spyware. Security has taken on increased importance in the United

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    37/64

    States, the European Union, Asia Pacific, and other locations with the introduction of

    new government regulations related to privacy, confidentiality, and integrity of financial

    results.

    Finally, converged networks that support both data and voice offer significant

    financial benefits and support richer enterprise communications with multimedia

    integration.

    All three trends intersect at the edge of the network - the point where users

    connect to enterprise services. The edge of the enterprise network today, built on the past

    decade of networking technology, is a fixed edge. It was designed for a time when users

    and devices were not mobile, and for a time when wireless was a point product used only

    in the warehouse and factory. The edge of today's network is highly reliable and

    extremely simple. When users connect to a port, the network is there to provide them

    with instant high-speed access. But this simplicity does not lend itself to security - the

    network does not differentiate between authorized and unauthorized users, and it cannot

    make decisions about which people get which type of access. Today's network was built

    for best-effort data delivery. It was built before Power over Ethernet existed to supply

    power to desktop phones, and before application aware quality of service policies were

    needed to ensure high voice quality. Today's network can be upgraded to address

    mobility, security, and convergence. The upgrade is a massive one, involving every closet

    switch, branch office router, core router, and even the physical cable plant. The challenge

    for the network manager is to support all three trends in a manageable, reliable way -

    without the disruption and expense that a massive network-wide upgrade would entail.

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    38/64

    The Solution

    The Solution Aruba's Mobile Edge System enables a new type of edge for the

    enterprise network - the mobile edge. The mobile edge allows users and devices to

    connect over the air and across any network, to securely gain access to enterprise

    resources. It is a new layer in the network that logically sits on top of existing fixed

    networks and fulfills the requirements of security, mobility and convergence without

    requiring major upgrades to the existing network. The mobile edge is architected to

    securely work over existing IP network facilities, and extends across both private

    enterprise networks as well as the public Internet. The mobile edge by definition supports

    true mobility where users can seamlessly and securely roam across multiple locations. In

    addition, it delivers voice convergence through multimedia mobile devices and Voice

    over Wireless LAN (VoWLAN) handsets with high quality and reliability. This

    eliminates the significant expense of adding powered VoIP ports to the fixed edge.

    Further, the mobile edge is built on the notion of identity-based security. Mobile users

    and devices, by definition, do not connect to the network through a fixed port. For this

    reason, the network must identify every user and device that joins the network. Once this

    identity is known, custom security policies may be applied to the network so that only

    access appropriate to the business needs of the user or device is provided. This drastically

    improves network security by eliminating excess privilege on the network while

    providing identity-based auditing. The mobile edge not only solves today's challenges

    around mobility, security and convergence but provides a roadmap to reduce overall costs

    of the network infrastructure. The natural long-term evolution of the enterprise network

    edge is to become predominately mobile. When this happens, a radical transformation of

    enterprise network economics will be realized when the costs of cabling infrastructure

    and the operational expense of moves, adds and changes are eliminated. This introduces a

    dilemma for incumbent networking vendors. The incumbent vendors, in order to continue

    their growth, must entice customers to spend more on their networks. The mobile edge,

    by drastically reducing networking costs, runs directly counter to the needs of the

    incumbent vendors. The 'incumbent's dilemma' develops whenever major turning points

    in technology develop - the incumbent cannot grow business by offering a solution that

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    39/64

    allows customer to spend less. The mobile edge is not based on this incumbent's

    dilemma. It is an evolutionary new architecture that delivers mobility, security and

    convergence for today's networks and builds on a vision where the enterprise network

    will ultimately have far fewer ports than today.

    The Products Aruba's Mobile Edge System consists of three components:

    1. ArubaOS system software which provides all the intelligence for the Mobile Edge

    2. Mobility controllers which are centralized service delivery platforms for the Mobile

    Edge

    3. Controlled access points (APs) which tunnel wired & wireless user traffic to mobilitycontrollers over the LAN, WAN and the Internet ArubaOS System Software A robust and

    sophisticated suite of system software that powers the mobile edge, ArubaOS coordinates

    all mobile edge operations with advanced capabilities that include seamless mobility,

    identity-based security, non-disruptive integration into existing networks, mobile VoIP

    capabilities, adaptive radio management, enterprise-class resiliency, open APIs, end-to-

    end QoS and centralized management.

    The Products

    Aruba OS is fully modular software that runs on all Aruba

    mobility controllers and controlled access points, allowing them to work

    seamlessly in delivering services to users on the mobile edge. The base

    feature set of Aruba OS comes standard with every mobility controller and

    includes sophisticated authentication and encryption, seamless mobility

    with fast roaming, RF management and analysis tools, centralized

    configuration, location tracking and more. Aruba OS gives administrators a single point

    of control from which to locate and shut down rogue APs, identify and thwart malicious

    attacks and impersonations, load-balance traffic, detect coverage holes and interference

    and create stateful role-based security policies that follow individuals as they move

    across the mobile edge. Since all Aruba mobility controllers utilize the same hardware

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    40/64

    architecture, Aruba OS is fully portable across the entire range, offering identical features

    but with differing price and performance points, depending on the underlying mobility

    controller. Aruba OS is entirely modular, with particular emphasis on reliability features

    such as automatic process restarts to minimize the impact of software failures and full

    VRRP redundancy across processors and chassis to minimize the impact of hardware

    failures.

    Aruba OS includes the following optional software modules:

    Wireless Intrusion Protection module provides patented

    classification technology that identifies and protects against

    malicious attacks such as denial of service, vulnerabilities such as

    rogue APs and ad-hoc networks, client and AP impersonation, and

    man-in-the-middle attacks.

    Policy Enforcement Firewall module delivers user and group policy

    enforcement through an integrated ICSA-certified stateful firewall. Security policies can

    be centrally defined and enforced on a per-user or per-group basis, following users as

    they move. Policies are enforced dynamically, taking into account a variety of metrics

    such as user location, time-of-day, device type, authentication method and others.

    VPN Server module provides integration support for a variety of virtual private

    network implementations, eliminating the need for discrete, external VPN concentrators.

    Hardware acceleration provides LAN-speed VPN connectivity. Supported VPN protocols

    include L2TP/IPsec, IPsec/XAUTH and PPTP. Both client termination as well as site-to-

    site VPNs are supported.

    Client Integrity module provides wired and wireless network integration for

    client integrity enforcement, protecting the network against infection from malware such

    as viruses and worms that take advantage of mobile devices. The Client Integrity Module

    integrates software from Sygate Technologies for host integrity, virtual desktop with

    file and cache cleaner and safe guest access with protection against 'zero-day' threats.

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    41/64

    Remote AP module lets network managers securely extend corporate wireless

    functionality to any location with an Internet connection. Remote APs allow seamless

    corporate-like WLAN connectivity at home, a remote office, or anywhere a mobile

    worker chooses to work.

    External Services Interface module enables any Aruba mobility controller to

    communicate with external service devices. The ESI module selectively redirects

    network traffic, based on policy, to devices providing inline network services such as

    anti-virus, network intrusion detection, content filtering, content transformation and

    usage auditing. Full load balancing and health checking are supported.

    Advanced AAA module extends authentication and authorization features of

    standard ArubaOS, including domain- and realm-based selection of authentication server,

    dynamic authentication and authorization using RFC 3576 and an XML API for building

    external portal and authentication systems.

    xSec module provides termination of highly secure xSec client sessions, offering

    link-layer 256-bit AES-CBC encryption with complete header obscuration for highly

    sensitive environments. The xSec module also enables the encryption of trunk ports

    between Aruba mobility controllers based on the same strong encryption standard.

    Mobility Controllers

    Mobility controllers are high-performance networking platforms built specifically

    to run centralized ArubaOS functions such as controlled access point management,

    802.11 station management, 802.11x authentication and encryption, site-to-site and client

    VPNs using IPsec/3DES encryption, stateful policy enforcement firewalls, L1-L7

    intrusion protection, endpoint integrity checking, and seamless user roaming between

    access points and across mobility controllers. All mobility controllers share a common

    hardware architecture which includes a dedicated control plane CPU, a high-performance

    programmable data plane network processor unit, and a unique programmable encryption

    engine for centralized L2 and L3 encryption. They aggregate traffic from the mobile

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    42/64

    edge, inspect and police it and deliver it to the core enterprise network. Mobility

    controllers are typically positioned in data centers, for a controlled environment and

    access to the high-speed core network, since they handle traffic from hundreds of APs

    and thousands of users. Aruba's line of mobility controllers includes multiple models,

    sized and priced to support the varying requirements of different sized mobile networks.

    The Aruba 6000 is the only modular mobility controller on the market. The four-

    slot modular chassis supports up to 8 Gbps of cleartext (7.2 Gbps of encrypted)

    throughput, up to 72 10/100 Mbps ports, 8000 simultaneous users and from 4 to 512

    controlled APs. Hot-swappable line card slots support multiple connectivity options

    including a 24 port Fast Ethernet + 2 port Gigabit

    Ethernet line card as well as a 2 port Gigabit Ethernet

    line card.

    The Aruba 2400 is a stackable, 24-port mobility controller that supports 48 APs.

    Designed for regional headquarters or dense building deployments, the Aruba 2400

    supports up to 512 simultaneous users and delivers up to 400 Mbps of encrypted

    throughput.

    The Aruba 800 is a fixed configuration mobility controller designed for small

    and branch office applications. The Aruba 800 provides eight 10/100 Mbps user ports and

    one copper or fiber gigabit uplink. Programmable hardware-based encryption supports

    200 Mbps of full-duplex encrypted traffic.

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    43/64

    Controlled Access Points

    Centrally controlled by ArubaOS software, Aruba's line of wired and wireless

    APs serve as distributed traffic collectors tunneling wired and wireless traffic to mobility

    controllers over IP networks. Wireless APs provide radio coverage and user connectivity

    services while simultaneously serving as surveillance devices that constantly monitor the

    air for radio-based security threats. They also perform intrusion protection functions

    when wireless threats are detected. Wireless APs also run distributed ArubaOS functions

    such as adaptive radio management, distributed encryption for local forwarding of

    Wireless LAN traffic, wireless intrusion detection and protection, rogue AP detection and

    containment among others. Wired APs simply serve as traffic collectors and tunnel wired

    user traffic across a LAN or a WAN to an Aruba mobility controller. Aruba offers a wide

    range of controlled APs including indoor and outdoor 802.11a/b/g single-radio access

    points, 802.11a/b/g dual-radio access points, 802.3 wired access points and hybrid

    wired/wireless access points. WLAN APs come equipped with integral antennas or

    options for a wide variety of external antennas. All controlled APs work with all Aruba

    mobility controllers to provide a high-performance, secure mobile edge. Controlled APs

    can be connected to an existing IP network and will automatically discover an Aruba

    mobility controller, configure themselves, and begin operation. The mobility controller is

    responsible for downloading software images, configuring, and coordinating all

    controlled APs. APs are powered through 802.3af Power over Ethernet (PoE),

    eliminating extra wiring requirements. They also come equipped with DC power jacks

    that work with AC power adapters if PoE is not available. All APs can simultaneously

    provide wireless service as well as monitor the air. They continuously scan the RF

    environment, locating and tracking all wireless clients to provide warning of intrusion or

    interference. This dual functionality eliminates the need for a separate

    overlay of RF sensors to troubleshoot and optimize the wireless

    environment. Aruba's controlled APs are available in a wide variety of

    form factors and capabilities.

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    44/64

    The Aruba 41 is a low-cost single-radio AP designed for the

    telecommuter or home office. With a single integral antenna and

    802.3af Power over Ethernet, the Aruba 41 is an ideal AP for

    deployment where antenna diversity and plenum installation are not

    factors.

    The Aruba 60 and 61 are single radio, 802.11a or b/g APs designed for dense

    wireless deployments in the corporate office. Plenum rated and powered by 802.3af

    Power over Ethernet or through an external AC adapter, the Aruba 60 and 61 deliver

    superior capacity, performance, and coverage. The Aruba 61 features an integrated

    802.11a/b/g omni directional antenna while the Aruba 60 features dual external antenna

    connectors. The Aruba 60 and 61 are the perfect APs for highly dense "Wireless Grid"

    deployments.

    The Aruba 65 is a dual-radio 802.11a/b/g AP designed

    for the mobile enterprise worker or road warrior. With integral

    diversity antennas, 802.3af Power over Ethernet, an external

    power adapter, and a compact design, the Aruba 65 fits easilyin a briefcase and connects wherever a mobile user travels.

    The Aruba 70 is the industry's first dual-radio 'hybrid'

    access point that provides concurrent operation of 802.11a and

    802.11b/g services, as well as secure wired access through an additional Ethernet port.

    The Aruba 70 is a multi-purpose device that can function both as an access point and as

    an RF monitor - either independently or concurrently - across

    the 2.4 GHz and 5 GHz bands. Ideally suited for plenum or

    workspace deployment, the Aruba 70 can be securely wall-

    mounted, ceiling-mounted, or desk-mounted.

    The Aruba 80 is the industry's first controlled

    outdoor access point. With support for 802.11a, 802.11b/g, and wireless bridging, the

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    45/64

    Aruba 80 handles all outdoor wireless applications. The Aruba 80 is rated for extreme

    outdoor environments, with an operating temperature range of -30 to 55 degrees Celsius

    and an integral lightning arrestor and ground point.

    The Applications

    The mobile edge is an enabling technology for newapplications that can deliver increased productivity, costsavings, security improvements, and faster access toinformation that ultimately leads to better decision making. The mobile edge enablesseveral major applications in the areas of mobility, security, and convergence.

    Mobility

    Guest Access Provides controlled Internet access, both wired and wireless, toauthorized visitors while keeping the internal network secure.

    Internal WLAN Hotspots Wireless LAN access for employee and visitorconvenience in strategic locations such as conference rooms, lobbies, cafeterias, andauditoriums.

    Enterprise-wide WLAN Pervasive, highly-available, high-performance wireless

    LAN access throughout an entire enterprise building, campus, or extended enterprise.

    Remote/Branch Office Access Secure extensions of the mobile edge to remoteand branch offices using the Internet or enterprise WAN as transport.

    Small Office, Home Office, and Road Warrior Access Extends the mobile edgeanywhere a user travels through portable, personal remote access points.

    Secure Mobility for Legacy WLANs Extends the life of existing wireless LANdeployments through enhanced security, roaming, and management.

    Location Tracking Uses an enterprise-wide WLAN deployment to provideprecise location tracking of any Wi-Fi device in the facility.

    Security

    Identity-based Security Enhances security by identifying the business role of theuser and then allowing only network access appropriate to that role.

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    46/64

    WLAN Intrusion Prevention Prevents radio-based security breaches byidentifying threats to the network from attackers and uncontrolled wireless devices.

    Endpoint Integrity Ensures a defined level of client security, such as anti-virus,anti-spyware, or personal firewall software is present before network access is granted.

    External Security Services Integrates best-of-breed security appliances, such asanti-virus, content filtering, and IDS as interior network services that are client-independent.

    L2 Security for Wired LANs Delivers mobile edge solutions such as encryption,mobility, and identity-based security to legacy wired LANs.

    Convergence

    Telephony Solutions Provides the cost advantages of Voice over IP with the

    mobility benefits of cellular voice.

    Voice Instant Messaging Enables hands-free voice communication through aninnovative new class of voice instant messaging devices, enhanced with proximitysensing.

    Converged Mobile Devices Delivers quality of service and access control tounified communications messaging devices integrating multi-media services such asvoice, data, email, and fax.

    Fixed-Mobile Convergence Unifies public and private voice networks by

    providing seamless handoffs between networks for dual-mode cellular/Wi-Fi voicedevices.

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    47/64

    CISCO

    Keep Users Connected with Wireless LANs

    Organizations worldwide are deploying wireless networks to increase

    productivity, enhance collaboration, and improve processes. Instant interaction, text

    paging, voice services, and network access while traveling are transforming the business

    environment.

    The following components work together to create a unified wireless network:

    Client Devices: These connect desktop and mobile devices to the wireless LAN

    in 802.11a-, 802.11b-, or 802.11g-compliant networks. Most of todays laptops

    are wireless-enabled, and many specialized wireless client devices are now

    available.

    Access Points: These help connect wireless devices to networks, providing

    ubiquitous network access for many wireless environments.

    Network Unification: This is critical for network control, scalability, security,

    and reliability. Integration into existing networks enables systemwide functions

    including security policies, intrusion prevention, and RF management. Network Management: As wireless networks grow in scale and complexity,

    management becomes more critical, requiring central design, control, and

    monitoring.

    Mobility Services: A comprehensive wireless network provides built-in support

    for leading-edge applications such as wireless voice over IP, location services,

    advanced security, and other emerging technologies.

    Advanced Features with High Investment Return

    As workers become more mobile and business applications become more

    interactive, innovative services and applications are critical in helping companies

    maintain agility and differentiation. Cisco wireless solutions allow organizations to

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    48/64

    extend their networks where employees need them most, helping to improve productivity,

    better respond to customers, and grow the business.

    The Cisco Unified Wireless Network cost-effectively addresses the growing need

    for wireless connectivity. The industrys most comprehensive wireless network portfolio,

    this cost-effective platform allows organizations to meet their current needs, while

    creating a smooth migration path for future enhancements and ensuring that their

    equipment investments are protected.

    The flexible design allows network managers to design infrastructures that meet

    their specific needs, whether deploying a simple or highly integrated network.

    Cisco extends sophisticated intelligent networking features to the wireless LAN,

    including support for Wi-Fi Multimedia (WMM), QoS, virtual LANs, and fast, secure

    layer 2 and layer 3 roaming for seamless mobility. Advanced features allow organizations

    to:

    Prioritize wireless traffic to help ensure information is safely delivered to the right

    users

    Segment wireless networks to accommodate different users and applications

    Provide seamless connectivity across subnets (network segments) to allow

    seamless roaming

    The Cisco Unified Wireless Network includes the following:

    Advanced Security: Network managers must provide connectivity and mobility

    without allowing unwanted access to the wireless network or the information traveling

    over it. Cisco provides advanced standards-based WLAN security and network protection

    that gives network managers confidence that data will remain private and secure. Cisco

    wireless security solutions are integrated with the Cisco Self-Defending Network, the

    Cisco strategy to enable networks to self-protect against threats.

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    49/64

    Multivendor Support: Cisco wireless solutions support established and

    emerging Wi-Fi standards, simplifying integration with wired networks and third-party

    client devices to provide reliable, secure wireless connectivity in standards-based

    environments. Manufacturers in the Cisco Compatible Extensions Program provide

    wireless devices with licensed Cisco infrastructure innovations; devices displaying the

    Cisco Compatible logo have undergone extensive, independent compatibility testing.

    Investment Protection: Cisco provides solid investment protection through an

    extensive wireless product portfolio that simplifies migration to future enhancements,

    including software and technology upgrades, scalability for growing networks, and

    advanced security.

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    50/64

    EXISTENCE OF WIRELESS LAN IN ORGANISATIONS

    WIRELESS LAN IN ORGANISATIONS

    020

    406080

    ORGANISATIONS THAT

    HAVE WLAN

    ORGANISATIONS THAT

    DO NOT HAVE WLAN

    WLAN

    %

    O

    F

    OR

    G

    ANISATIO

    N

    S

    THAT

    HAVE

    W

    LAN

    Series1

    ORGANISATIONS THAT HAVE WLAN 30 15

    ORGANISATIONS THAT DO NOT HAVE WLAN 70 35

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    51/64

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    52/64

    PROBLEMS FACE BY WIRELESS LAN AT ORGANISATIONS

    Low Performance 25 20 50

    Not Scalable 30 25

    Security 45 55 45

    Wireless Intrusion 55 60 35

    Rouge AP detection, Classification and control 40 30 20Other 20 25 0

    01020304050

    6070

    L

    o

    w

    P

    e

    rfo

    rm

    a

    n

    c

    e

    S

    e

    c

    u

    rity

    Ro

    u

    g

    e

    A

    P

    de

    te

    c

    tio

    n

    ,

    ORGANISATION1

    ORGANISATION2

    ORGANISATION3

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    53/64

    DIFFERENT PRODUCTS USED (DIFFERENT VENDORS)

    USAGE OF DIFFERENT PRODUCTS

    0

    20

    40

    60

    CISCO D-LINK MRO TEK HP

    BRAND

    M

    ARKET

    SHAR

    E

    Series1

    Series2

    CISCO 45

    D-LINK 25

    MRO TEK 15

    HP 20

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    54/64

    Guest 20 15

    Partners 42 25

    Contractor 17 10

    Others 17 10

    ACCESS PROVIDED TO OUTSIDERS

    WITHIN THE PREMISES

    0

    204060

    G

    u

    e

    s

    t

    P

    a

    rtn

    e

    rs

    C

    o

    n

    tra

    c

    to

    r

    O

    th

    e

    r

    s

    TYPE OF BUSINESS RELATION

    P

    E

    R

    S

    E

    N

    T

    A

    G

    E

    O

    F

    A

    C

    C

    E

    S

    S

    G

    IV

    E

    N

    IN

    Series1

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    55/64

    TOOLS USED FOR CONTROL

    TYPE OF TOOLS AVAILABLE

    0

    20406080

    User

    Authenti

    Rogue

    Access

    TYPE OF CONTROLS

    %

    AVA

    ILABILITY

    OF

    TO

    O

    LS

    ORGANISATION1

    ORGANISATION2

    ORGANISATION3

    User Authentication 65 55 50

    Active Wireless intrusion Attack 25 40 30Rogue Access point being connected to your Network 35 25 35

    Passive Wireless intrusion Attack 5 10 5

  • 8/3/2019 Market Opportunity Analysis of Wireless LAN-Syed Yacoob-0411

    56/64

    SEAMLESS ROAMING

    SEAMLESS ROAMING FACILITY

    020406080

    HAVE

    SEAMLESS

    ROAMING

    DO NOT

    HAVE

    SEAMLESS

    ORGANISATIONS

    %

    O

    F

    O

    R

    G

    A

    N