Installation Verification Documentation Support Security
A site survey determines the optimal radio placement, antenna selection and channel layout to provide a framework for installation. Depending on the facility and operations, access point placement may require the use of lifts for access. Special enclosures may be needed to protect access points from the environment such as in wash down areas or possibly cold environments such as frozen distribution centers. Some of the activities may include:
All cabling and power runs should be done and tested prior to the installation of the access points. After completing the installation, testing for proper operation and coverage may indicate the need to move access points and possibly use different settings. Some of the testing will determine that clients are associating properly, clients are able to roam within the network and they clients can reach all required applications.
Following the physical installation, verification and testing of the wireless network provides valuable insight to future performance. For example, multiple access point environments behave significantly different than a single access point environment. Radio level tuning provides better resource allocation by reducing the coverage offered by each access point and allowing clients to better utilize the whole environment. Tuning the wireless environment to the specific facility permits better throughput, less contention and fewer problems commonly associated with wireless environments.
Final documentation pulls everything together and provides meaningful and useful road maps to your wireless infrastructure. Access point names, IP information, radio information and location information provide quick access to needed information when problem determination issues arise.
Support: Interference and Problem Determination
Interference detection is another aspect of wireless deployment that is often overlooked. The presence of conflicting frequencies or faulty equipment can at best degrade performance and at worst create havoc over large areas of a wireless network. Proper problem determination techniques and deployment methodologies provide a path to a robust and responsive radio network. Additionally, starting with properly developed baselines allow quick responses to common problems that arise and minimize exposure associated with radio frequency problems.
Wireless network security plays an important role when expanding or creating new wireless coverage and services. Wireless security has grown into a multifaceted technology endeavor. Multiple security levels can be deployed based on security needs and the ability to provide services to a variety of client devices. Open guest networks and very secure client specific networks may be deployed side by side according to the needs of the provider and the size and scope of the operations. Wireless network security must be designed based on the unique needs of each client and must ensure that the proper authentication and encryption methods are utilized in the client network and client devices.