Hear, hear!  I can see the handwriting on the wall from Cisco along with 
everyone else, but we've got over 700 APs, mostly based on IOS (there's still 
some VxWorks out there) and our stuff works pretty well.  We use small cells 
fixed at the highest data rate so "self-healing" isn't really much use to us 
and honestly, the MTBF on AP hardware is so much lower than outages due to 
power it doesn't matter much anyway.

I was gonna buy a WLSE to help with rogue detection but came to realize I don't 
care that much about RF rogue detection anyway - we don't have the staff to run 
around with "geiger counter" apps to track them down, so I can't find their LAN 
MAC to shut down the port the information is not too useful.

I guess at the end of the day I still trust hands on real world observations 
and measurements by experienced engineers more than I do software guesses about 
what's right. That having been said, if someone can demonstrate more 
consistently reliable service via a dynamic RF environment orchestrated by 
controllers than a well-designed static one I'm all for it.  Lord knows survey 
data is stale by the time you get back to your office with it.

Happy holidays all,

John

John J. Brassil | Network Engineer, Vanderbilt Data/Video Engineering
voice 615.322.2496  



> -----Original Message-----
> From: Dale W. Carder [mailto:[EMAIL PROTECTED] 
> Sent: Tuesday, December 06, 2005 3:23 PM
> To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
> Subject: Re: [WIRELESS-LAN] Cisco Self-Healing- does it work?
> 
> 
> Maybe I just wasn't clear enough not to start a debate!
> 
> I guess I'm just coming from the crusty old engineer approach of:
> 1) Identify problem
> 2) Identify solution
> 
> What problem are looking to solve with "Self-healing"?  Is it 
> worth it?
> 
> I would be very interested in what you find about how it 
> reports what it detects plus what it's doing about it so that 
> the operational staff knows exactly what is going on.  Does 
> it push information via syslog, snmp trap, etc, or do you 
> have to query it?  Is it actually doing the right thing?  How 
> do you manage and maintain it? How can it be integrated with 
> your other systems?
> 
> I also hope to steer away any .edu from WLSE/WLSM who hasn't 
> already deployed it.  As others have noted, it is doomed.
> 
> When Rusty, myself, and others from our group went about our 
> wireless redesign, we really did take a pessimistic approach. 
>  We are holding off to a large extent on wireless 
> infrastructure features until the market shakes out a bit more.
> 
> This is also why we chose the heavyweight IOS AP's.  We 
> already have tools to manage a few thousand IOS devices.  
> Throw in a thousand+ IOS AP's into that system and we can 
> utilize the same backend tools we already have developed for 
> configuration management, code upgrades, monitoring, etc.  We 
> did get Airwave for better user reporting.  Then after the 
> depreciation cycle in two years or so from now, begin to take 
> a look at what the various thin AP controllers can do at that time.
> 
> Effectively dealing with voice, qos, crypto, fast roaming, 
> client side supplicants, scalability and resiliency of 
> controllers, integration with cell phones, etc., all needs to 
> come a long way.
> 
> Dale
> 
> ----------------------------------
> Dale W. Carder - Network Engineer
> University of Wisconsin at Madison http://net.doit.wisc.edu/~dwcarder
> 
> **********
> Participation and subscription information for this EDUCAUSE 
> Constituent Group discussion list can be found at 
> http://www.educause.edu/groups/.
> 

**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.

Reply via email to