What is WiFi SON distributed network

- May 16, 2019-

The emergence of WiFi son distributed network is to solve the growing problem of network equipment terminals in modern homes. As the number of terminals increases, the network system is bound to become more congested and busy. Smooth network operation, network automation and bandwidth optimization are all issues to consider. Qualcomm's Wi-Fi SON (Self-Organizing Network) has the following features.


Simple way to manage a growing network


Simple / With Qualcomm's Wi-Fi SON, installing a Wi-Fi router/home gateway and adding devices is easy.


Smart / The technology dynamically selects the best Wi-Fi links, giving each functional requirement the bandwidth to distribute the best performance.


Security / More terminal devices mean more hidden dangers of destroying a Wi-Fi network. This is why Wireless Networking SON provides a framework to build and is designed to prevent the detection of potential cyber threats and problems.


Wireless network SON needs to take care of itself


Self-configuring / installing wireless routers / home gateways and adding devices and Wi-Fi range extenders is easy to integrate with auto-discovery and smartphones.


Self-management/functions include automatic performance degradation detection and dynamic band steering to provide equipment for the band to optimize network capacity. Seamless roaming ensures bandwidth is available when and where it is needed. End-to-end content-aware routing ensures that each device gets the right bandwidth, whether it's transferring files, 4K video or web browsing.


Self-healing / "Mesh" network finds alternate connection paths in a multi-router network, or takes advantage of the expander. If an existing connection experiences a bandwidth bottleneck or hangs, the network switches the access point to continue to provide optimal performance.


Self-defense / Attacked home terminal equipment can endanger the entire network. The Wi-Fi SON framework provides the security technology to continuously learn and adapt to user behavior in order to identify and prevent potential threats.