Implementing a wireless network does not mean that a wired network can be completely eliminated – At best, it can reduce the edge switches/ switch ports and cables/ passive components. In this post, let us try to understand what components are reduced and what components are added to a network, when a wireless network is implemented.
What can you do with a controller based centralized wireless networks of today? Read on to find out the features and functionality provided by controller based wireless (Wi-Fi) networks for medium and large institutions/ enterprises.
This post gives an introduction to the two types of Antennas used in Wireless Networks – Directional Antennas and Omni-directional Antennas. We also have a look at in-built antennas and external antennas and the options available with Access Points for the same. We discuss the type of coverage provided by either and particular situations where their usage is recommended.
This article gives an introduction to the software applications that manage multi-vendor access points, controllers and other Wi-Fi devices on a huge disparate network. We look at the user, device monitoring, visual heat maps offering live coverage of the Wi-Fi network, security features like rogue access point detection etc. that can be uniformly applied to a large network of multi-vendor access points.
This article discusses the difference between Stand-Alone Access Points (Thick) and Controller based Access Points (Thin) – the basic structural difference, authentication, radio management, security, access control and other management features in both of them.
This article gives an introduction to the Wi-Fi based RFID Tags, how the location of assets can be devised by the combination of Enterprise Wi-Fi and RFID technologies, what can be accomplished by such a system, advantages and limitations of Wi-Fi based RFID Location tracking technology.
This article explores the ways in which the guests can be given access to wireless networks, whether they could be authenticated, whether their access can be restricted to certain services in the network and whether usage statistics and logs can be generated for guests.
This article introduces the QoS mechanisms followed by a wireless network like WMM(Wireless Multi-Media) and WMM-SA(Wireless Multi-Media Scheduled Access) which are both standards based and help wireless networks to reliably enable real time and latency sensitive applications like voice and video by prioritizing them and transmitting them ahead of the…
How safe is an organization (like a bank) which has prevented the use of Wi-Fi systems in its premisis? That’s what we are going to see in this article. We will also see how Wi-Fi infrastructure (Wireless Intrusion Prevention) can be helpful in enforcing the “No Wireless” policy.
This article explains the IEEE 802.11n standard for wireless (Wi-Fi) networks, what is the bandwidth supported by this standard, what is the distance covered by access points employing 802.11n, the advantages of 802.11n, what are the challenges faced by this standard, what steps must someone ensure before upgrading to 802.11n and if it is backward compatible with other earlier standards.
This articles gives a brief description of Femtocells – what they are, why the cellular industry is excited with this concept, what could be the benefit to the consumer and what are the various dis-advantages and technological challenges along with how Wi-Fi compares with Femtocells.
This article attempts to understand what kind of threats a Wi-Fi network could face, especially given the fact that even a person going on a road nearby could reach the enterprise Wi-Fi singals. We look at the vulnerabilities of WEP network, Network sniffers, SSID broadcasting, DOS attacks, De-Auth attacks, Mac-address spoofing, Man-in-the-middle attacks, honey pot attacks, rogue access points and the threat faced by them, Patches in your PC not being up to date, ad-hoc networks, Special Wi-Fi devices like Wireless cameras and wireless phones, loopholes in the authentication protocols, hackers who escape counter scanning by wireless IDS devices.
Wi-Max, What is Wi-Max, advantages benifits of wi-max, wi-max technology, Wi-fi vs wi-max, how wi-fi compares with wi-max, wi-max in corporate companies, wi-max in educational institutes, wi-max in public hot-spots
This article is about Wireless Mesh networks – how they eliminate the wires that connect to the wireless access point, applications of a mesh network, how mesh networks are formed and managed, what is mesh clustering and what are the advantages, what are the dis-advantages of a mesh network and of course, why mesh networks are exciting.