loader image

Ruckus: Why Enterprise ICT Deployments Need A Bottoms Up Approach

Bottoms Up Approach On Network Deployment

Enterprise IT and OT managers ought to think about the network first. It’ll serve you well and supply important advantages.

First, some definitions:

  • Bottoms up = build wireless network (Wi-Fi + IoT). Stable, scalable, secure – then build solutions around it.
  • Top down = find a solution to the focused problem. Produce an overlay network to connect the app to a “thing”.

Every house wants a solid foundation. You’d not need your linesman gushing concrete, nor would you wish your bricklayer to figure on your plumbing. Thus why can we feel comfy with sensor, device or manufacturers of “things” providing the parts for an enterprise network? We shouldn’t. Thing vendors build things, and network vendors build networks. Additionally, every device vendor solely cares regarding their own device, which implies their own network. Deploying a network for one device sort adds complexity, adds cost, is very redundant and has the potential to make security holes.

Benefits of a Bottoms Up Network

Enterprise IT and OT managers ought to think about the network first. It’ll serve you well and supply important advantages. And here are things to think about in creating a stable, scalable, secure, cost-efficient IoT access network that will meet the requirements an enterprise IoT ecosystem:

  1. World-class backbone – enterprise-grade wired and wireless infrastructure.
  2. Integrated front end – AP supporting best of Wi-Fi and IoT technologies (BLE, Zigbee, more…) with integrated coexistence technology to manage interference.
  3. Converged back end – unified control and services management, permitting all IoT devices, from totally different vendors to be managed, designed and people that require, connected to relevant local or cloud services. An integrated rules engine which will use data from some “things” as triggers for actions in alternative “things” is additionally a large plus – but saved for an additional blog.
  4. Enterprise-grade security – hardened devices, admin on-boarding, Over the Air security, IoT/Wi-Fi Network isolation and more.
  5. Extensibility – the system are often used for a bunch of applications, from BLE real-time location services to Zigbee connected entry, smart building sensors, security, etc… across applications and manufacturers.
  6. Open – Open System, Open APIs, SDKs to enable the IoT community to collaborate and leverage the network.

While it’ll perpetually be tempting to make your IoT network tops down – see a need, fill a need – within the long run it’ll perpetually pay off to build it bottoms up. whereas you’ll suppose, “I am only solving this particular problem”, there’ll be more things to connect. Thus, you would like a foundation that supports your wants, and an open system that may grow along with your business.

Download Free Ruckus Resource

Get access to authentic content from one of the leading wired and wireless solutions experts in the world from the Philippines’ premiere technology provider.

Articles you might like

Aruba Contact Tracing

Aruba Contact Tracing

Reassure staff, students, and visitors as they return to the workplace.What makes Aruba's contact tracing solution different from all the rest? Aruba's network-based approach uses both proximity and location telemetry to perform contact and location tracing, and the...

read more
Critical Wi-Fi Design Aspects

Critical Wi-Fi Design Aspects

Wi-Fi DesignCRITICAL DESIGN ASPECTS1. Primary Coverage GoalOBJECTIVES ▶ Provide Wi-Fi service in all required location ▶ High-quality signal strength ▶ Maintain high data rates RESULTS ▶ Improve airtime efficiency ▶ Improve density handling 2. Secondary Coverage...

read more
Fortinet FortiGuard Web Filtering Service

Fortinet FortiGuard Web Filtering Service

Stop users from traveling to malicious URLsStop Web-based Threats  Protect your organization by blocking access to malicious, hacked, or inappropriate websites with FortiGuard Web Filtering. Web filtering is the first line of defense against web-based attacks....

read more
Share This