Warehouse Wi-Fi FAQ: What are the Most Common ‘Pain Points’ with Warehouse Networks?

Warehouses are fast-paced environments where many pressure points in supply chains converge. When these pressure points are factored into space design and management, the capacity to gain and retain a competitive edge is there for the taking. This special management increasingly involves high-performance networking to underpin an increasingly automated warehouse with Wi-Fi-first devices – from sensors to driverless tech.

So what are the most common ‘pain points’ we see when it comes to warehouse Wi-Fi? There’s a long list, including slow picking and inaccurate data, but one thing they all have in common is their net result: an inefficient warehouse.

Warehouses are difficult environments for high-performance networking, and the odds are stacked (or racked!) against you. But so many of these pain points are caused by avoidable mistakes.
Below we delve into the problems warehouse managers and their IT teams report the most often, exposing their knock-on effect as well as the causes.

1. Inefficient picking

2. Inaccurate inventory tracking due to packet loss

3. No real-time communications between staff on order updates, schedules, safety alerts, etc.

4. Equipment downtime, especially Wi-Fi-first devices (which are increasing)

5. Errors in quality control

6. Risk of data breaches through unauthorised access, malware attacks, and more during downtime or at weak points in the network architecture

These issues all ultimately converge to cause delayed dispatching, revenue loss through data inaccuracies, higher shrinkage rates, and customer dissatisfaction.

Longer-term, slow, unscalable or patchy networks cause adopted technologies reliant on high-performance connectivity to ‘fail’. This has a huge knock-on effect on the ROI of investments like sensors, driverless tech, and expensive warehouse management systems.

So what causes these issues?

1. Lack of scalable bandwidth

As warehouse technology rises, bandwidth is a huge factor that businesses must consider – it underpins productivity in a digital age, and waiting until problems arise means you’re already feeling the financial impact

2. Channel congestion

This is largely a removed issue for warehouses who have shifted to Wi-Fi 6, but for many this is becoming a challenge for IT functions, reducing speed and capacity, as well as causing bottlenecks – hardly ideal for WMS

3. APs not designed for challenging environments

Warehouses are tough environments where your tech needs to be even tougher. Outdoor connectivity for loading bays, dust, cold, heat… all these factors should inform choices during network design

4. APs with limited throughput capacity

Again, individually small components of your network can determine overall network performance, and older access points are often unable to deliver the throughput needed for today’s warehouses and their connected devices – edge to core

5. Black spots in coverage

Poor network design resulting in gaps in coverage that wreak havoc on picking. We’ve seen cases where racking areas can’t be used due to the inability to pick stock in those zones

6. Interference from electronics, metals, racking, building structures

This is a huge issue in warehousing, with so many objects and materials – static and moving – that can interrupt a consistent signal. This is especially common where networks were planned during construction, or off-plan.

7. Wrong AP antennae

Warehouses are unique environments and the traditional ‘donut’ signal won’t provide the coverage you need. Specialist access points are required with these spaces in mind

8. Wrong AP placement

Poorly placed APs can lead so many warehouses to do entirely the wrong thing – add more! Just take a look at our article on ‘quick warehouse Wi-Fi fixes that don’t work’!

7. Poor configuration

Managing wireless networks throughout supply chains requires a seamless configuration, since supply chains are themselves aiming on seamlessness. Poorly matched security protocols, channel settings, mismatched power levels, and many other mistakes are easy ways to ensure your supply chain has too many sticky patches to be efficient.

It’s no secret – warehouses are more challenging than other environments when it comes to designing, installing and maintaining high performance connectivity, but we see a wealth of industry experience around us that is helping transform these spaces just by gaining a stronger understanding of how they flow.

What are your pain points when it comes to connectivity in your warehouse?

With cyber attacks on a continued increase, every industry should be looking long and hard at how it is safeguarding itself – and with good reason. According to 2022 Keeper Security research:

It goes without saying that those handling more sensitive information need to be at the forefront of this security restructuring, and professional services are no exception, and here are the reasons why.

Client Confidentiality:

Professional services – particularly law firms and accountancy firms – deal with highly confidential information, including client data, legal strategies, financial data, and case details. A security breach could compromise this sensitive information, leading to severe consequences such as legal action, reputational damage, huge shifts in company value/share price, and loss of client trust. Strict legal and ethical obligations are often in place to protect this client confidentiality. Breaches of client data can result in legal penalties, fines, and professional misconduct charges. Implementing robust network security measures is essential for compliance with these obligations.

Client Trust and Reputation:

Clients trust law firms to handle their cases with the utmost discretion and professionalism – including protecting their information with appropriate levels of security. A security breach can erode this trust, leading to reputational damage and potential loss of clients, as aforementioned in the Keeper research. Protecting the firm’s reputation is essential for long-term success, and in an age where professional services are delivered through digital means, clients expect the highest levels of data security.

Intellectual Property Protection:

Law firms in particular may handle intellectual property cases, dealing with patents, trademarks, and trade secrets. Unauthorised access to such information could have significant financial implications for both the firm and its clients in the case of intellectual property theft and unauthorised disclosures.

Regulatory Compliance:

Like all European and UK businesses, professional services are subject to various data protection regulations, such as the General Data Protection Regulation (GDPR). Compliance with these regulations is crucial, and robust network security is a key component of meeting these compliance requirements. The amount of fines being issued increased sevenfold in 2022 compared to 2021, and GDPR breaches have seen professional services firms – such as Tuckers Solicitors LLP in 2022 – receive hefty fines, the upper limit being 20 million euros or 4% of turnover – whichever is greater. Network security is a vital part of ensuring data is kept secure, avoiding the financial implications of a slip-up.

Financial Impact:

As proven by the Keeper Security research, network breaches can have severe financial consequences for a law firm. Costs may include legal fees for handling the aftermath of a breach, potential fines for non-compliance, costs associated with reputational damage, and expenses related to restoring compromised systems.

Changing Cyber Threat Landscape:

The evolving nature of cyber threats poses a constant challenge for organisations, including law firms. In particular, the rise of cloud networking is adding an element of vulnerability that needs to be taken into account when planning network security infrastructure, in addition to the rise of AI-driven attacks. These potential vulnerabilities include:

The good news is that as network security becomes more and more holistic, agile and automated, professional services can avoid many of the risks though security solutions designed to future-proof business. Although the risks of digital business are greater, the solutions are simpler – if you know how to find the right fit for you!

Interested to know more? Read our article on “why SMBs need advanced security solutions”.

Software-Defined Wide Area Networking (SD-WAN) and Secure Access Service Edge (SASE) are two prominent technologies that have emerged to address the evolving needs of modern networking. While both aim to enhance network performance and security, they have distinct characteristics that set them apart – something we’re often asked to define! Let’s delve right into it.

What is SD-WAN?

SD-WAN, in essence, is a technology that optimises the management and operation of a WAN by leveraging software-defined networking principles. Traditional WANs relied heavily on expensive, hardware-centric infrastructure, often leading to inefficiencies in terms of both cost and performance. SD-WAN replaces this with a more agile and flexible approach, allowing organisations to use a combination of private and public networks, such as MPLS, broadband, and LTE, to meet their specific requirements. This is often a more cost-effective method.

One of the primary objectives of SD-WAN is to improve connectivity, application performance, and overall user experience. It achieves this by dynamically selecting the most efficient and cost-effective path for data traffic based on real-time network conditions (dynamic path selection). SD-WAN solutions also provide centralised management, making it easier to configure, monitor, and troubleshoot network configurations.

So what about SASE?

SASE represents a paradigm shift in network security by converging networking and security services into a single cloud-native platform. The architecture of SASE integrates SD-WAN capabilities with the most up to date security services, offering a unified solution to address the challenges posed by the increasing adoption of cloud applications and the rise of hybrid ways of working. It can integrate secure web gateways, firewall-as-a-service, data loss prevention, and secure remove access – plus do everything your SD-WAN does.

SASE incorporates Zero Trust Network Access principles, meaning that it doesn’t inherently trust any user or device, regardless of its location. This is a departure from the traditional security model that relied on a ‘castle-and-moat’ approach, where internal networks were considered safe, and external networks were treated as untrusted. SASE considers every user and device as untrusted and enforces security policies based on identity, device health, and other contextual factors – absolutely essential in today’s world where work, study and socialising can be on any device, anywhere, anytime.

Let’s bring this together

In summary, while SD-WAN primarily focuses on optimising and managing network connectivity, SASE takes a holistic approach by combining SD-WAN with a comprehensive set of security services. SD-WAN provides the agility and flexibility needed for efficient network operations, and although it has some security capabilities, they are typically limited to basic firewall capabilities and do not provide the comprehensive security stack SASE offers. In contrast, SASE enhances security by adopting a Zero Trust model and integrating security functions into the fabric of the network.

Organisations often find value in deploying both SD-WAN and SASE together, creating a robust and secure network infrastructure that meets the demands of the modern digital landscape. As technology continues to evolve, the integration of networking and security functions will likely become increasingly essential for organisations striving to meet the emerging security risks whilst keeping network management within the realms of realistic resourcing.

If you’d like to find out more about how to keep your organisation secure against today’s threats, take a look at our network security services, or download our partner eBook on planning a route to SASE.

If you’d like to get in touch, we’d love to hear from you!

Intelligent, intuitive, scalable and centralised, the dashboard is one of the biggest benefits of a Cisco Meraki solution. There are so many reasons our clients find it game-changing from a network management perspective, setting it miles apart from other vendors within a similar price-point.

So what makes the Cisco Meraki dashboard worth the hype?

1. Meraki is a cloud-first focused vendor – and the dashboard proves it

The Meraki dashboard is fully cloud-based, and was designed to be so from the off. Trust us when we say that this makes a difference. This is a game-changer for organisations with large, multi-site, or diverse networks, bringing the entire IT architecture together in one place, accessible from anywhere with an internet connection. This shift removes the need for on-site hardware, software installations, and on-site IT staff.

2. The most powerful, user-friendly interface on the market

The Meraki dashboard’s extensive tools and comprehensiveness might lead you to think that – as with many network dashboards – it’s complex, clunky and difficult to navigate. It’s rare to find a control centre that delivers both technically impressive controls and an intuitive experience for IT teams. Here’s where Meraki makes a huge difference; its dashboard was designed with simplicity in mind, which saves organisations time, and supports staff with less industry knowledge or experience by simplifying network management.

3. Your entire network in a single pane of glass

Meraki’s cloud-first approach means that your dashboard is designed to house your entire network, including switches, APs, security, IoT, and device management – plus so much more. This is truly transformative for organisations with scaling networks, removing the need to log in to separate platforms and manage devices disparately.

4. Real-time analysis, monitoring and remedial actions

The Meraki dashboard allows administrators to monitor their network in real-time, offering instant visibility into network traffic, device status, and performance metrics. Additionally, it can be configured to send alerts and notifications for specific events, ensuring timely responses to critical network issues. Longer term, the dashboard offers detailed analytics and reporting capabilities, allowing administrators to gain insights into network performance, event logs filterable by device, hardware type, or event type, as well as user behaviour, and application usage. This information can be valuable for making informed decisions about network optimisation and resource allocation.

5. Automated updates and optimisation that cut costs

The dashboard simplifies the process of keeping network devices up to date with the latest firmware and security patches. Automated updates ensure that devices are running optimally and protected against vulnerabilities. Wi-Fi in particular can be set to auto-optimise based on user behaviour to improve performance, reduce energy usage, and allocate bandwidth intelligently. When manual intervention is required, IT teams can identify and resolve network issues without needing to be physically present at the network location thanks to cloud-first technology.

6. Smarter security, sown network-wide

Meraki’s dashboard makes security simpler and stronger simultaneously. Digitisation has made networking the backbone of organisations, and as networks continue to grow in size and scope, the responsibility of managing them also scales. Meraki’s dashboard has powerful tools for creating network segments, applying role-based and/or device-based security policies, as well as multiple access permissions for the dash, ensuring just the right amount of visibility and control for every job function.

The Meraki dashboard really is a game-changer when it comes to network management. Don’t just take our word for it – take a look at our client case studies. From cutting costs in time to supporting staff with an easier management experience, it has the capacity to hugely simplify how you monitor, manage and master your networks.

If you’d like to find out more about Meraki’s portfolio – and dashboard – you can visit our partner page, or get in touch with our team for a full demo.

Today’s advanced networking technologies and architectures don’t just aim to enhance the performance of networks; they also have the capacity to transform how they are monitored, managed, and therefore budgeted. Next-gen networks can contribute to IT cost savings in the following ways:

Automation

Next-gen networking underpins automation through software-defined networking (SDN) and network functions virtualisation (NFV). These technologies enable centralised control and management of network resources, allowing administrators to automate various network tasks such as provisioning, configuration, and troubleshooting. Automation reduces the need for manual intervention, saving time and effort for network administrators and reducing operational costs. Some of our clients have saved up to 50% of their network engineers’ time – just have a read.

Network Programmability

Next-gen networks offer programmable interfaces and APIs (Application Programming Interfaces) that enable network administrators to develop custom applications and scripts to manage the network. This programmability enables the creation of network management tools and applications tailored to specific needs, streamlining management processes and reducing costs associated with third-party software or complex manual configurations.

Simplified Operations

Next-gen networking solutions often focus on simplifying network operations by abstracting complex underlying infrastructure and providing intuitive management interfaces, none more effectively so than the Cisco Meraki dashboard. Amongst our clients, we’ve noticed that this simplification makes it easier for network administrators to configure and manage the network, reducing the learning curve and potential errors. Simplified operations can lead to lower training costs, faster onboarding of new administrators, and fewer mistakes that could result in costly network downtime.

Centralised Monitoring and Analytics

Next-gen networking solutions typically incorporate centralised monitoring and analytics capabilities. These tools collect real-time data from network devices and provide comprehensive insights into network performance, utilisation, and security. By gaining visibility into the network’s behaviour and identifying potential issues proactively, network administrators can optimise network resources, plan capacity upgrades effectively, and minimise the risk of costly network failures or breaches.

Cloud-Based Management

Next-gen networking often leverages cloud-based management platforms that offer scalability, flexibility, and cost-efficiency. Cloud-based management eliminates the need for on-premises infrastructure and reduces the hardware and maintenance costs associated with traditional network management systems. Additionally, cloud-based management platforms provide centralised access to network management tools from anywhere, enabling efficient remote network administration and reducing travel expenses.

Network Function Virtualisation (NFV)

Next-gen networking embraces NFV, which allows network functions to be decoupled from dedicated hardware and run as software instances on commodity servers or virtual machines. NFV enables cost savings by consolidating network functions onto a smaller number of hardware devices, reducing power consumption, hardware maintenance, and upgrade costs. It also provides the flexibility to scale network functions dynamically, allocating resources as needed, which helps optimise costs based on demand.

By leveraging these and other next-gen networking capabilities, organisations can streamline network management processes, improve operational efficiency, and reduce overall costs associated with network administration. It is – however – vital that networks are designed with your organisation and its needs (both current and future) at their core. Poorly planned networks are the most common reason we see issues with performance, and solutions reaching obsolescence well before they needed to. Whilst many new networks can offer ROI for your organisation today, only those with the capabilities to handle tomorrow’s networks will be able to maintain and increase that ROI throughout your network’s lifetime.

With the increasing reliance of warehouses on technology, it is no surprise that as IT advances, the opportunity to close gaps in efficiency and reduce the impact of errors is one that the most successful warehouses are taking advantage of. High performance networking – and in particular wireless networking – underpins much of this emerging technology. Below we examine why superior Wi-Fi in warehouses is vital if businesses are to gain a competitive edge with today’s evolving supply chain.

Faster connectivity:

Next-gen networking technologies provide faster and more reliable connectivity within the warehouse environment. This enables real-time communication and data exchange between various systems, such as inventory management, warehouse management, and order fulfilment systems. With improved connectivity, warehouse operations can be streamlined, eliminating connectivity issues and enabling uninterrupted operations, improving efficiency.

Improved mobility:

It’s not all about speed. Next-gen networking technologies, such as Wi-Fi 6, offer improved coverage, enabling wireless connectivity throughout the warehouse. This is particularly important for the rising number of mobile devices used by warehouse staff, such as handheld scanners, tablets, and wearable devices, to say nothing of emerging tech yet to become widely adopted. With reliable wireless connectivity, employees can access real-time information, update inventory records, and communicate with colleagues from anywhere within the warehouse, improving productivity, responsiveness and the accuracy of inventory management and tracking.

Supporting successful warehouse automation:

Linked to both speed and coverage, superior Wi-Fi is crucial for supporting warehouse automation initiatives which are seeing rapid adoption due to their ability to deliver and maintain a competitive edge to businesses. Automated systems, such as robotic picking systems or autonomous guided vehicles (AGVs), rely on Wi-Fi connectivity to communicate with the warehouse management system (WMS) and coordinate tasks efficiently. A reliable and high-speed Wi-Fi network with 100% coverage delivers ROI on the cost of having implemented automated processes and devices.

Supporting IoT integration for greater awareness:

Similarly to larger automated machines and tools, warehouses are increasingly adopting smaller IoT devices such as sensors to automate processes, track inventory, and monitor equipment. Next-gen networking infrastructure supports the seamless integration of these IoT devices, allowing them to communicate and share data efficiently. This integration enables real-time monitoring, predictive maintenance, and optimization of warehouse operations, leading to reduced downtime and cost savings on building and contents maintenance. Find out more about designing wireless networks with IoT in mind.

Cloud integration and data management:

Next-gen networking facilitates seamless integration with rapidly expanding cloud-based services and platforms which we are already seeing become a pillar of networks. This easy integration enables warehouses to leverage cloud computing power and storage for data-intensive applications, such as data analytics, machine learning, and artificial intelligence. By leveraging cloud services, warehouses can optimise their data management processes, gain actionable insights, and make data-driven decisions to improve operational efficiency and inventory management – all without needing additional data storage.

Security and data protection:

Next-gen networking technologies incorporate advanced security features, including robust encryption, authentication mechanisms, and network segmentation. In a warehouse setting, where sensitive data such as inventory information and customer details are stored and transmitted, ensuring the security and protection of data is of paramount importance. This is only becoming more critical as the number of devices (including those that are cloud-first) grows, permitting more breach points for cyber-attacks. Next-gen networking provides the foundation for implementing strong security measures to safeguard critical information from unauthorised access and potential cyber threats.

Voice and video communication:

In some warehouse operations, voice communication is critical for coordinating tasks, providing instructions, or addressing safety concerns. With superior Wi-Fi, voice-over-Wi-Fi (VoWi-Fi) solutions can be implemented, enabling employees to use wireless headsets for real-time voice communication. Additionally, Wi-Fi can support video communication for remote collaboration, troubleshooting, or training purposes, improving communication effectiveness and reducing the need for physical presence.

Future-readiness:

As technology continues to advance, warehouse businesses need to be prepared for future requirements. Superior Wi-Fi provides the foundation for adopting emerging technologies, such as augmented reality (AR) or virtual reality (VR) for warehouse training, or advanced analytics for operational optimisation. By investing in a robust Wi-Fi infrastructure, warehouse businesses can adapt to evolving technology trends and remain competitive in a rapidly changing industry.

Wondering whether your wireless network can support your warehouse into the future? Find out about our range of WiFi surveys here.

IoT has revolutionised the way we interact with technology, connecting various devices and enabling seamless communication. But whilst it offers tremendous benefits to organisations as a whole as well as individuals, it also introduces significant challenges, particularly in the realm of network security. Networks need to be designed with the internet of things in mind.

The interconnected nature of IoT devices creates a vast attack surface, making network security a paramount concern. In this article, we will explore how network security is impacted by the rapidly increasing sphere of IoT.

Exponential increase in breach points

One of the primary challenges posed by IoT is the sheer number of interconnected devices. Traditional network security measures designed for a limited number of endpoints struggle to cope with the scale and complexity introduced by IoT. With billions of devices connected to the internet, each potentially acting as a potential entry point for attackers, the risk of unauthorised access and data breaches increases exponentially. Network administrators must grapple with the task of securing a multitude of devices, each with its unique security vulnerabilities.

Insufficient device protection

Often, IoT devices often have limited computing power and memory, making it difficult to implement robust security measures. Many IoT devices are built with cost-efficiency in mind, resulting in manufacturers prioritising functionality over security. This leads to the presence of default usernames and passwords, lack of regular firmware updates, and insufficient encryption protocols. Attackers can exploit these vulnerabilities to gain unauthorised access to devices or launch large-scale attacks, such as Distributed Denial of Service (DDoS) attacks.

Varied security protocols increasing IT management time

Another significant concern in IoT network security is the lack of standardised protocols and communication frameworks. IoT devices employ a wide range of communication protocols, including Wi-Fi, Bluetooth, Zigbee, and more. This diversity makes it challenging to implement consistent security measures across different devices, as each protocol has its specific security considerations. Network administrators face the daunting task of ensuring compatibility and security across numerous protocols, often requiring specialised knowledge and expertise.

Edge interconnectivity complicates traffic monitoring

Furthermore, the proliferation of IoT devices increases the complexity of network monitoring and threat detection. With a multitude of devices constantly exchanging data, it becomes harder to distinguish legitimate traffic from malicious activities. Traditional security solutions, such as firewalls and intrusion detection systems, may struggle to detect threats originating from IoT devices due to their unconventional communication patterns. Advanced security tools leveraging artificial intelligence and machine learning algorithms are becoming crucial for identifying anomalous behaviour and detecting potential attacks in IoT networks.

Increased risk of data protection infractions

Privacy and data protection also become critical concerns in the context of IoT network security. IoT devices often collect and transmit vast amounts of sensitive data, ranging from personal information to industrial secrets. The interconnected nature of IoT poses a risk of unauthorised data access, interception, or manipulation. Securing data both in transit and at rest becomes paramount, requiring robust encryption, access controls, and secure data storage practices.

This much is clear; security fit for today’s diverse and in demand networks requires an additional consideration for IoT and edge connectivity.

So what can organisations do?

If you’d like help either designing a new network capable of securely supporting IoT, or addressing security concerns with an existing network, we’re always happy to help. Just get in touch with our team.

Full-stack networking solutions have revolutionised the way businesses operate and communicate. These solutions offer comprehensive and cohesive tools that allow businesses to streamline their operations, improve their security, and enhance their overall performance – both now and as networks become increasingly complex. In this blog post, we’ll discuss some of the benefits of a full-stack networking solution from Cisco Meraki and why it drives the ROI that more diverse IT infrastructures can’t.

Compatibility

Full-stack networking solutions are designed to work seamlessly together because they are built by the same manufacturer. This means that all the components of the solution, including switches, routers, and access points, are designed to be compatible with one another. This compatibility ensures that the network operates efficiently and that there are no conflicts between different products.

In contrast, when using products from different brands, there may be compatibility issues that arise due to different protocols, standards, and configurations. This can result in issues such as slow performance, network downtime, and security vulnerabilities.

Easier to manage

Full-stack networking solutions are designed to be managed through a single interface. This means that administrators can configure and monitor the entire network from a central location, making it easier to manage and troubleshoot issues. This streamlined management approach can save time and reduce the need for IT staff, which can be especially beneficial for small to medium-sized businesses.

When using products from different brands, network administrators may need to use multiple interfaces to manage different components of the network. This can be time-consuming and result in errors or misconfigurations, which can compromise network performance and security.

Enhanced security

Full-stack networking solutions are designed to work together to provide enhanced security features. For example, a full-stack networking solution may include a firewall, intrusion detection and prevention system, and virtual private network (VPN) that work together to provide a layered security approach.

When using products from different brands, there may be gaps in security due to the lack of integration between the products. This can result in vulnerabilities that can be exploited by attackers.

Better support

Full-stack networking solutions come with dedicated support from the manufacturer. This means that if there are any issues with the network, businesses can rely on the manufacturer’s support team to provide assistance. The manufacturer’s support team is familiar with the products and can troubleshoot issues more efficiently.

When using products from different brands, there may be challenges in getting support because different manufacturers have different support teams and policies. This can result in delays in getting issues resolved and can be frustrating for network administrators.

Cost savings

Full-stack networking solutions can offer cost savings compared to a network with multiple products from different brands. By using a full-stack solution, businesses can avoid the costs associated with purchasing and integrating different products. Additionally, the centralized management and support provided by the manufacturer can save time and reduce the need for IT staff, resulting in cost savings.

In conclusion, a full-stack networking solution from one brand can provide significant advantages over a network with multiple products from different brands. These advantages include compatibility, easier management, enhanced security, better support, and cost savings. By choosing a full-stack networking solution, businesses can ensure that their network operates efficiently, securely, and reliably.

Traditionally every change to a network configuration is done manually by a member of the organisation’s IT Team or other trusted professionals. Network Automation allows changes to the network’s configuration without needing a person to implement these changes manually. This is often achieved through APIs, and the result is improved efficiency and functionality. Let’s look at a few examples:

APIs

APIs are a way for computers (in our case, Networking equipment such as Access Points or Switches) to communicate. We often take for granted that two people share information and make decisions. However, an Access Point from vendor A and a switch from vendor B can’t always communicate to share information and make decisions. This is the problem APIs solve.

Most recent networking equipment support APIs; these devices are called API clients. API client will talk to an API server, and the API server will run scripts (a set of instructions for a computer to follow); these scripts can collect information and change the network configuration. Here are a few examples:

The above may sound familiar to you, as this is precisely the configuration and monitoring IT staff are used to doing. The critical difference is that this is accomplished with APIs.

Bringing it all together

When you bring Network Automation and APIs together, it suddenly becomes a very powerful tool.

A script using APIs could be run that reduces the available bandwidth (speed) for wireless users when a switch’s uplink is nearing its capacity. And once the uplink capacity has been reduced, the available bandwidth could be increased again. This change can happen in near real-time without any involvement from the IT staff, who, by comparison, would be much slower to respond.

Let’s look at our earlier example of IP phones where the power was disabled between the hours of 7 pm to 7 am. What happens when a new phone is added to the network? Or when devices get moved to a new switchport? Our configuration will need to be updated, and if missed, it may cause problems, for example, turning off the power on the wrong PoE device, such as a CCTV camera. The solution is a script using APIs that could reconfigure each port when a new phone is detected and reconfigure the same port when the phone is removed.

The possibilities are almost endless, and if you’re looking for assistance on how you can start to automate your network with APIs, Redway Network engineers have lots of experience in this field and are happy to assist.

If the Bett 2023 agenda is anything to go by, a huge priority in education is sustainability – both in how schools operate and as an essential topic in classrooms. Advocates such as Dr Sally Uren OBE (Forum for the Future), Professor Dame Alison Peacock (Learning Without Limits originator), climate activists and UNESCO representatives will all attend the show in March.

Schools, colleges and universities are key players in addressing the challenge of climate change, as nurturing grounds for younger generations who will face the increasing consequences of an unsustainable world. It is vital to both educate them on the issues the planet faces, as well as providing an environment for learning that demonstrates a strong effort to tackle them. Campuses are also spaces where young people can be inspired to take action, putting their knowledge to practical, proactive use.

In addition, sustainability on-campus is becoming a huge focus for schools, both to lower carbon footprints and cut energy costs, as well as responding to government initiatives, and public demand for environmentally-focused organisations. The department for education (DfE) writes that “schools perform better when they take responsibility for their own improvement. We want schools to make their own judgements on how sustainable development should be reflected in their ethos, day-to-day operations and through education for sustainable development.”

So how are schools educating on sustainability within the classroom?

How are schools showing students the way in terms of sustainable campus management?

If you’d like to know more about making your school or college network more sustainable, get in touch with us.