Using Directional and Omni-Directional Antennas in Wireless Networks

This post gives an introduction to the two types of Antennas used in Wireless Networks – Directional Antennas and Omni-directional Antennas. We also have a look at in-built antennas and external antennas and the options available with Access Points for the same. We discuss the type of coverage provided by either and particular situations where their usage is recommended.

Continue reading

Managing multi-vendor wireless access points in Wi-Fi networks

This article gives an introduction to the software applications that manage multi-vendor access points, controllers and other Wi-Fi devices on a huge disparate network. We look at the user, device monitoring, visual heat maps offering live coverage of the Wi-Fi network, security features like rogue access point detection etc. that can be uniformly applied to a large network of multi-vendor access points.

Continue reading

What is IEEE 802.11n, what are the advantages and challenges for 802.11n in Wi-Fi networks

This article explains the IEEE 802.11n standard for wireless (Wi-Fi) networks, what is the bandwidth supported by this standard, what is the distance covered by access points employing 802.11n, the advantages of 802.11n, what are the challenges faced by this standard, what steps must someone ensure before upgrading to 802.11n and if it is backward compatible with other earlier standards.

Continue reading

Security threats in a Wi-Fi Network

This article attempts to understand what kind of threats a Wi-Fi network could face, especially given the fact that even a person going on a road nearby could reach the enterprise Wi-Fi singals. We look at the vulnerabilities of WEP network, Network sniffers, SSID broadcasting, DOS attacks, De-Auth attacks, Mac-address spoofing, Man-in-the-middle attacks, honey pot attacks, rogue access points and the threat faced by them, Patches in your PC not being up to date, ad-hoc networks, Special Wi-Fi devices like Wireless cameras and wireless phones, loopholes in the authentication protocols, hackers who escape counter scanning by wireless IDS devices.

Continue reading

Wireless Mesh Networks

This article is about Wireless Mesh networks – how they eliminate the wires that connect to the wireless access point, applications of a mesh network, how mesh networks are formed and managed, what is mesh clustering and what are the advantages, what are the dis-advantages of a mesh network and of course, why mesh networks are exciting.

Continue reading