RAATS WIFI




Wi-Fi is a Passion

blogs

Validation tools and troubleshooting

Tools

In previous blogs, we discussed the survey tool, but there are other tools to validate a network. It is important to document items such as the validation, what and why it is tested, which methods are used, what are the en... <read more>


WLAN design validation and failure remediation

After you have designed a wireless network, the last step is validating your network. Tools for validating are site survey tools, protocol analyzers, spectrum analyzers and throughput testers.

Post-Installation site survey, or validat... <read more>


WLAN deployment pt 2.

Infrastructure
As a wireless designer, you should not have a tunnel vision. Wireless needs an infrastructure, mostly wired. This network is most of the time already in place, or done by another engineer. However, there are moments that ... <read more>



Older blogs:

WLAN deployment pt 1.
Designing for vertical markets
Designing for Mesh and bridge links
Designing for Branch offices
Designing for roaming
Designing for security
Designing for other wireless features
Designing for applications
Selecting and configuring access points
Infrastructure Services
RF and channel management
Overview - Wireless Architectures
Site Survey specific scenarios
Site Survey tools and process
Overview - Site Survey
Upgrades and documentations
Defining requirements
Client and application planning
Requirement Analyse
Overview - Wireless design
Preparation CWSP
Overview - WIDS and WIPS
WIDS and WIPS analysis and monitoring
Rogue detection and mitigation
Overview - Roaming
Key Caching
Fast Secure Roaming
Fast BSS Transition
Overview - Encryption
Encryption Methods
TSN and RSN
Handshakes
Authentication and Key Management
Aruba event
WLAN Security Infrastructures VPN and Management
WLAN Security Infrastructures terms
WLAN Security Infrastructures Architectures
2.4GHz is not dead
per-user PSK and SAE
PSK Authentication
LDAP and RADIUS
Overview - LDAP and RADIUS
EAP Authentication
Overview - Authentication
Security Policies
Wi-Fi Home Design
Network Attacks
Legacy Security
Legacy Encryption
Legacy Authentication
Overview - Security
Wireless a shared medium with a high throughput?
Preparation CWAP
Common Wireless issues
Common Wired issues
Spectrum Analyses
RF Math (2)
RF Math (1)
Protocol Analyses
Security - WPA2-Enterprise
Security - WPA2-Personal
Frames - Data
Frames - Control
Frames - Management (2)
Frames - Management (1)
MAC Layer - QoS
MAC Layer - Frame Control
MAC Layer - Header
PHY Layer
Overview - Architectures
CSMA-CA
Overview - Authentication
Overview - Troubleshooting
Configuring Mesh with Ethernet Bridging
Wires?!? It is a wireless training
Hotspot 2.0