<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=308252&amp;fmt=gif">

{% set baseFontFamily = "Open Sans" %} /* Add the font family you wish to use. You may need to import it above. */

{% set headerFontFamily = "Open Sans" %} /* This affects only headers on the site. Add the font family you wish to use. You may need to import it above. */

{% set textColor = "#565656" %} /* This sets the universal color of dark text on the site */

{% set pageCenter = "1100px" %} /* This sets the width of the website */

{% set headerType = "fixed" %} /* To make this a fixed header, change the value to "fixed" - otherwise, set it to "static" */

{% set lightGreyColor = "#f7f7f7" %} /* This affects all grey background sections */

{% set baseFontWeight = "normal" %} /* More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set headerFontWeight = "normal" %} /* For Headers; More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set buttonRadius = '40px' %} /* "0" for square edges, "10px" for rounded edges, "40px" for pill shape; This will change all buttons */

After you have updated your stylesheet, make sure you turn this module off

BYOD Implementation Lesson 5: Reviewing And Fixing Network Issues

by Picture of John Ciarlone John Ciarlone on July 2, 2014

byod implementation Our series on BYOD implementation rolls on! Here's Part One, if you're just joining us.

Today, we're going to focus on what comes after implementation. While B.Y.O.D. rollouts usually bring minimal disruption, even if there's a network upgrade involved, there are virtually always hiccups following implementation.

We've got a few common scenarios we see, as well as ideas on solving them.

Short on time? Download our Free guide to successful BYOD deployment 

Meraki Switch BYOD Implementation Lesson #5: Four Focus Areas When Minimizing Rollout Issues

1 – Network Slowdown / Congestion

The most common network problem stemming from implementing BYOD is simple overuse. You may be surprised at just how quickly network usage goes up in the days and weeks following a personal device upgrade.

Aside from large scale deployments, the virtualized networks that are best for B.Y.O.D. are already self-optimizing. While moving access points around (such as away from sources of interference) or adjusting/replacing antennas may help a bit, there's a good chance that a Bring Your Own Device rollout will simply necessitate a bandwidth upgrade to support it.

Restricting usage is another option here, especially in the short term. If you block access to non-work related, bandwidth-heavy sites like YouTube or SoundCloud, that'll alleviate the burden.

However, it is a stopgap measure. As your business comes to use more virtualized services, you'll need more bandwidth sooner or later.

2 – Too Much Non-Work Usage

The success of a Bring Your Own Device rollout in part depends on the temperament of your workforce. It's sometimes hard to predict which workers will react well to the relative freedom of BYOD, and which groups will end up abusing it.

However, the network OS provides address management lists for the purpose of managing these issues. For example, the ADTRAN AOS system creates three default lists: A Priority queue for mission-critical resources, an “Everybody” list of globally-allowed websites, and a “Blacklist” of sites which are globally banned.

Since the network OS is universal, this makes it simple to manage which websites are allowed, and changes are implemented across the entire system within moments.

3 – Increased Suspicious Software Activity

BYOD ready networks include “smart” scanning software that automatically oversees the network traffic and watches for suspicious activities. They can be further customized by sysadmins to look for virtually any activities you might find worrisome.

If you see an uptick in virus threats or other malware following a new implementation, the problem is likely to be on your user's devices.

There are several possible solutions that you can mix-and-match, depending on your situation:byod security

  • Ban all jailbroken devices with crippled security until they're restored to factory settings. This is a good idea in any case.

  • Require users maintain the latest device OS updates, especially on Android, which is more prone to malware.

  • In some cases, Mobile Device Management software can remotely upgrade a connected mobile device to ensure security clearance. eg, Google's Business Chromebooks work in this fashion.

  • Require passwords of a certain complexity, and ban devices with insufficient security.

  • Implement exclusionary lists that block everything except sites you specify.

  • Device-specific bans are probably a last resort due to undercutting the purpose, but some businesses have ended up with “It's OK to use your personal device, except...” policies.

4 – High Costs Of Custom App Development 

Many businesses that are enthusiastic about allowing personal devices and its possibilities for expanding their workforce's potential will run off to talk about custom app development... only to get sticker shock when they discover most custom apps start in the five-figure range.

However, there has been an explosion of cloud-based Software-as-a-Service offerings that, in many cases, will already provide the functionality you need for a fraction of the price. A telecommunications or networking vendor can usually put you in touch with top SaaS providers, if they don't provide the services themselves.

Make Your BYOD Deployment A Smooth One

Do you have more questions? The experts at Hummingbird Networks have been installing and servicing wireless networks since the technology's inception. We are here to help you make it happen!

 

Topics: BYOD

Explore Our Full Cisco Line Up
VIEW MORE ABOUT CISCO
cisco devices-2