Wi-Fi is a Passion


Designing for roaming

There are three types of roaming ways:
- Layer 2 roaming across access points with one or no controller (intracontroller roaming)
- Layer 2 roaming across access points with separate controllers (intercontroller ro... <read more>

Designing for security

Security is a hot item, and with wireless, also, an important item to think about is how you are going to implement security in a wireless network. Are you going to use passphrases, RADIUS, and what type of EAP and encryption will you select?
... <read more>

Designing for other wireless features

Quality of Service (QoS)
As mentioned previously in other blogs with voice and video communication, QoS is an essential technology to implement. QoS needs to be end-to-end, so that means you also need to implement QoS at the wired netwo... <read more>

Older blogs:

Designing for applications
Selecting and configuring access points
Infrastructure Services
RF and channel management
Overview - Wireless Architectures
Site Survey specific scenarios
Site Survey tools and process
Overview - Site Survey
Upgrades and documentations
Defining requirements
Client and application planning
Requirement Analyse
Overview - Wireless design
Preparation CWSP
Overview - WIDS and WIPS
WIDS and WIPS analysis and monitoring
Rogue detection and mitigation
Overview - Roaming
Key Caching
Fast Secure Roaming
Fast BSS Transition
Overview - Encryption
Encryption Methods
Authentication and Key Management
Aruba event
WLAN Security Infrastructures VPN and Management
WLAN Security Infrastructures terms
WLAN Security Infrastructures Architectures
2.4GHz is not dead
per-user PSK and SAE
PSK Authentication
Overview - LDAP and RADIUS
EAP Authentication
Overview - Authentication
Security Policies
Wi-Fi Home Design
Network Attacks
Legacy Security
Legacy Encryption
Legacy Authentication
Overview - Security
Wireless a shared medium with a high throughput?
Preparation CWAP
Common Wireless issues
Common Wired issues
Spectrum Analyses
RF Math (2)
RF Math (1)
Protocol Analyses
Security - WPA2-Enterprise
Security - WPA2-Personal
Frames - Data
Frames - Control
Frames - Management (2)
Frames - Management (1)
MAC Layer - QoS
MAC Layer - Frame Control
MAC Layer - Header
PHY Layer
Overview - Architectures
Overview - Authentication
Overview - Troubleshooting
Configuring Mesh with Ethernet Bridging
Wires?!? It is a wireless training
Hotspot 2.0