NSB Infrastructure

Each NSB is built using Nile-designed and manufactured wireless and wired infrastructure. Built-in MACsec support, high-speed interfaces, microservices-based software, and natively designed AI and cloud management ensure a high degree of consistency and uptime.

Nile Services Edge (NSE)

Available in four different form factors to deliver wired and wireless connectivity to customers of any size. The NSE is architected with high availability, tamper-proof design, Campus Zero Trust endpoint isolation, cloud management, and advanced AI automation features. NSE Access devices include up to 48 MultiGigabit PoE+ ports, 4 10/25Gbps uplinks, and 2 100 Gbps ring ports. Distribution NSE devices size up to 28 10/25 Gbps ports, 3 25/40/100 Gbps ports, and 3 40/100 QSFP ports. Most NSE devices offer dual redundant load-sharing power supplies and hot-swappable fans.

Nile Access Points

Wi-Fi 6 and 6E APs deliver high-performance, secure, and fully managed wireless connectivity. Wired to NSEs in a “Salt & Pepper” design for redundancy, an NSB can include indoor and outdoor APs to satisfy any deployment requirements. Nile APs dynamically adjust channel and power settings for optimal performance. A dedicated third radio is used for security purposes.

Additionally, each AP includes a built-in sensor that transmits telemetry data for AI-driven performance and security analysis in the Nile Services Cloud.

Nile Performance Sensors

Wi-Fi-enabled devices strategically placed throughout your facility when needed. They work with virtual sensors to continuously monitor performance, capacity, and availability baselines to help monitor Nile’s Performance Guarantee. Each transmits network telemetry data to the Nile Services Cloud for user experience service quality monitoring.

NSB Campus Zero Trust

The NSB architecture is based on a Layer 3 segmentation model and per-endpoint isolation of all user and IoT devices. Eliminating L2 VLAN-based policy enforcement radically reduces the complexity of enforcing Zero Trust security policies within the Nile Access Service.

Key capabilities of the Nile Service Block for enabling Campus Zero Trust security:

  • Tamper-proof hardware with secure boot and up-to-date patches
  • Encrypted management/control planes with mutual validation
  • “Default: deny” policy requiring authentication before IP assignment
  • No VLANs or ACLs, eliminating lateral movement of malware and other threats
  • Layer 3 isolation for every connected device
  • Continuous session verification with first-hop security
  • Centralized encryption and firewalls for north-south traffic
  • Microsegmentation securing east-west traffic

NSB Telemetry

Natively captured network and user data fuels our AI Automation model, driving Nile’s closed-loop automation framework. All telemetry is securely transmitted from the NSB to the Nile Services Cloud for analysis and automated actions. This enables real-time visibility and continuous optimization of Nile Service Blocks across campus and branch deployments.

NSB Telemetry Framework

Sensor telemetry is continuously transmitted from the NSB to the Nile Services Cloud to automate operations, orchestrate remediation or repairs, and report on the status of Nile’s NSB Performance Guarantee. Health data such as Wi-Fi signal quality and environmental data, including power/voltage fluctuations, cabling issues, and RF interference, are used to monitor the status of the NSB.

Three types of sensors transmit real-time network performance and security data.

  • Dedicated 3rd Radio AP Sensors are integrated into all Nile access points, and a dedicated radio is used to monitor the Nile Service and wireless medium.
  • Virtual Sensors are embedded in NSE devices to monitor infrastructure components such as DHCP, DNS, RADIUS, internet connectivity, and internet application health.
  • Physical Sensors are wall-mounted devices connected to the Nile network via Wi-Fi and deployed in network environments when necessary to deliver added fidelity against Nile’s Performance Guarantee. They transmit network and user experience health and performance data every minute to the Nile Services Cloud for continuous analysis.

Deterministic NSB Deployment

The Nile deterministic design approach contrasts with traditional network architectures, which often consist of hardware and software built by different vendors or business units, configuration templates, and multiple service licenses based on site size and configuration. With NSB, the design, installation, and maintenance process remain uniform across locations of all sizes. Campus and branch network deployments are powered by the same firmware and cloud-based orchestration, ensuring consistent performance and security, even at smaller sites.

pattern img

Protect your campus, branch, and remote users with Nile Trust Service