Table of Contents
Device Classification Guide
Introduction
Designing networks for BYODs implies offering RF conditions that will allow these devices to properly connect, maintain their connection while in the cell, and roam seamlessly when needed. All BYODs offer the same functions such as Wi-Fi connection management, support for real time applications over Wi-Fi, roaming, and so on. However, the chipset and the underlying operating system both dictate variations in the behavior that might affect your design. For example, some devices are dual band, and some are not. Some devices probe often, making them easy to locate even in the sleep mode. Some devices stop probing when the screen is turned off, conserving battery but making the location of the devices challenging.
Some operating systems partially implement roaming optimization protocols, such as 802.11r (Fast Transition—to expedite secure roaming), 802.11k (Radio Resource Measurements—to discover neighboring APs faster), 802.11v (Wireless Network Management—to increase the lifetime of the battery by reducing unnecessary exchanges with the AP while the BYOD is in the sleep mode), or 802.11u (Internetworking with External Networks—to automatically associate with Wi-Fi networks connecting to your phone service provider network in a secure manner).
Some devices also offer enhanced security with 802.11w (Protection of Management Frames—to protect from spoofing attacks). To help you design your wireless network, and decide what options to configure on your controller, see the following table that lists the main BYOD models in the market, their probing and roaming behavior, and their support for roaming or security optimization protocols.