Why Wireless Interference is an important consideration in Wi-Fi networks

Unlike a Wired Network, where adding more network switches gives better performance, a wireless network cannot be optimized for performance by adding more access points/ denser deployment of access points – mainly due to the Wireless Interference. In this article, we’ll try to understand frequency bands, interference, interference from 802.11 Wi-Fi enabled devices, interference from Non-Wi-Fi devices and how to identify and mitigate wireless interference.

Continue reading

Wireless Intrusion Prevention System (WIPS) Deployment Architectures – Overlay, Integrated & Hybrid

As you might be knowing, a wireless network consists of a centralized wireless controller, access points, and some servers for specialized functioning. All the laptops/ wi-fi enabled devices connect to the access point to communicate with the network over the air (wireless medium). Now, some organizations deploy a wireless intrusion prevention system to secure their wireless networks. WIPS can be deployed in different ways. We discuss some of the popular WIPS architectures, and their merits and demerits, in this article.

Continue reading

Using Directional and Omni-Directional Antennas in Wireless Networks

This post gives an introduction to the two types of Antennas used in Wireless Networks – Directional Antennas and Omni-directional Antennas. We also have a look at in-built antennas and external antennas and the options available with Access Points for the same. We discuss the type of coverage provided by either and particular situations where their usage is recommended.

Continue reading

Managing multi-vendor wireless access points in Wi-Fi networks

This article gives an introduction to the software applications that manage multi-vendor access points, controllers and other Wi-Fi devices on a huge disparate network. We look at the user, device monitoring, visual heat maps offering live coverage of the Wi-Fi network, security features like rogue access point detection etc. that can be uniformly applied to a large network of multi-vendor access points.

Continue reading