• Wireless Network

    Factors to Consider for High Density WiFi Deployments

    You may think that for high density deployments, it’s best to increase the number of Access Points in order to cater to more WiFi users who are congregated within a small area. But that may not always be the best thing to do. Wireless interference is a major issue, all the more pronounced with high density WiFi deployments. Even if more APs need to be used, administrators may try to reduce the transmitted power of each AP so that their signals don’t interfere with neighboring APs. But that reduces the available bandwidth for intended users. Hence planning WiFi coverage for high density areas is complex. Here are some factors to consider…

    Comments Off on Factors to Consider for High Density WiFi Deployments
  • Wireless Network

    WiFi Hotspot Analytics

    If you run a retail chain or a large services-based organization like a mall or hospital, chances are you provide WiFi hotspot, perhaps with free Internet access, to visitors and guests. With WiFi Hotspot Analytics, you can do more with WiFi users accessing Internet through your infrastructure. For example, you can access more information about the visitors, analyze and categorize them based on information gathered, and provide them with relevant & targeted informational or marketing messages. WiFi Hotspot Analytics enables hosts to understand more about their visitors, understand how they move within the premises, which sections interest them least/most, etc. Gathering customer in-premise data and analysis can potentially increase customer…

  • Wireless Network

    Bluetooth Monitoring?

    Monitoring the Wi-Fi spectrum for unauthorized connections/probing/intrusion is quite common, but what about the Bluetooth spectrum? Shouldn’t unauthorized connections be monitored there too? Isn’t it possible for a scammer to connect with a Laptop, Computer or handheld device from outside your premises via Bluetooth and steal confidential info like payment card numbers, etc.? Especially when it is common for people to accidentally leave Bluetooth On. That’s why, when I came across the Motorola AirDefense Bluetooth Monitoring solution, I was surprised why I was not aware of it earlier, and why they are the only ones providing such a solution. Think of it – Bluetooth enables one to create a fairly…

    Comments Off on Bluetooth Monitoring?
  • Wireless Network

    Gigabit Wi-Fi – 802.11ac : Advantages & Limitations

    IEEE 802.11ac will be the next wireless (Wi-Fi) technology standard after 802.11n. A few consumer access points are already available with 802.11ac radios, but the currently available 802.11ac standard is only Draft 2.1. The final standard is expected to be released by late 2013. The first enterprise-grade Wi-Fi devices with 802.11ac radios are expected from early 2013. While 802.11ac products will eventually support specifications like 8 spatial streams, 8 antennas and 160 MHz channel width, the early (enterprise) 802.11ac products may most probably support 4 spatial streams, 4 antennas and 80 MHz channel width. The higher speeds/bandwidth supported by 802.11ac standard is expected to be useful for HD Video Streaming,…

    Comments Off on Gigabit Wi-Fi – 802.11ac : Advantages & Limitations
  • Wireless Network

    Can you stop Wi-Fi signals from leaving your building premises?

    Though Wi-Fi is relatively secure these days, its security implementation and user mishandling still remain a concern for network administrators. A new wall paper technology offers to block Wi-Fi signals at the perimeter. Though enterprise Wi-Fi technology is mature enough, there are still some security issues that need to be addressed. Not everyone is happy with wireless signals leaving the company premises. Not that WPA2 encryption can be hacked, but there might always be some loopholes. Some legacy laptops/guest laptops connecting to the network may not use the latest encryption or may not use encryption at all! Some users might leave their Wi-Fi adapters enabled with ad-hoc networking. Some users…

    Comments Off on Can you stop Wi-Fi signals from leaving your building premises?
  • Wireless Network

    Wi-Fi: Is 5 Ghz better than 2.4 Ghz for larger wireless networks?

    Even though many Wi-Fi networks operate primarily over the 2.4 Ghz band, there are distinct advantages of using the 5 Ghz band especially with the increasing popularity of 802.11n. Have you ever thought of creating an exclusive 5 Ghz Wi-Fi network? It’s no more an impractical idea, especially since the 2.4 Ghz spectrum is getting over crowded and 5 Ghz is the better option for channel bonding, which is key to higher 802.11 n performance. If you build a 5 Ghz network, your neighbors will love you 🙂 But practically, building a Wi-Fi network exclusively on the 5 Ghz band may not be possible because in larger wireless networks, there…

  • Wireless Network

    Why No Standards for Wireless Controller – Access Point communications in Wi-Fi networks?

    In other words, why are Wireless Access Points always proprietary to the vendor who supplied the Wireless Controller? Any customer who has built a large wireless network knows that all the access points and controllers deployed in their premises need to be from a single vendor to realize any kind of centralized management. We have SIP protocol in VOIP which enables any SIP Enabled IP PBX to connect with SIP Phones from any manufacturer, while still offering a good number of features. We always had standards in the Video Conferencing industry (like the current H.264 video compression standard) that enables any VC System to make a video call with any…

  • Wireless Network

    NFC – Near Field Communication & Its Applications

    NFC, also called as Near Field Communication is a short range wireless communication network that can be used by two devices supporting the NFC Standard to communicate with each other over a short range (20 cm, practically around 4 cm). NFC can be integrated into smart phones, tablet computers, laptops/ computers, point of sale equipments, etc by embedding additional hardware circuitry or it can be added to any object by fixing NFC Tags over them. The most common application of NFC (Near Field Communication) is to make credit card payments using an NFC enabled smart phone and NFC enabled Point of Sale terminal. One just needs to tap the smart…

    Comments Off on NFC – Near Field Communication & Its Applications
  • Wireless Network

    IEEE 802.11ac & IEEE 802.11ad Wireless Technologies – Think beyond 802.11n!

    Earlier, Wireless Networks were slow to catch up with Wired Networks in terms of speed and bandwidth. But with the implementation of IEEE 802.11n Wireless Networks, the equation slightly balanced out. Now, two more Wireless protocols (IEEE 802.11ac & IEEE 802.11ad) are in the making and they supposedly bring gigabit ethernet performance over the wireless network. Let's learn more about these two protocols in this article.

    Comments Off on IEEE 802.11ac & IEEE 802.11ad Wireless Technologies – Think beyond 802.11n!
  • Wireless Network

    How secure is your Wireless Access Point?

    Wireless networks are very comfortable and easy to use. Hence, a lot of people set up Wi-Fi connections using a wireless router or wireless access points. Even a small business/ SOHO normally has a standard access point to provide wireless network access to its employees. But, how secure is this Wi-Fi connection? Can it be hacked by a determined hacker? How secure is the encryption used in Wi-Fi networks? Let us explore the answers to these questions, in this article.

    Comments Off on How secure is your Wireless Access Point?
  • Wireless Network

    WiFi Adhoc Networks – What they are & how to mitigate the threats posed by them

    An ad-hoc network is enabled by connecting a wi-fi enabled device directly with another wi-fi enabled device over the wireless medium without requiring a wireless router / access point. But how secure is this mode of connection? What can you do to mitigate the threats posed by ad-hoc networks in an enterprise? Let us look at the answers to these questions, in this article.

Bitnami