What are the criteria for evaluating an indoor wireless network?
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
A deployed WLAN can be evaluated for many reasons -- the criteria really depend on the type and purpose of the evaluation. For example:
- WLAN performance can be measured and compared to site survey predictions or defined coverage/capacity needs. Such an evaluation usually involves surveying the site, taking measurements like link speed, signal strength, noise floor, and signal-to-noise ratio at regular intervals and key locations (e.g., data rate boundaries, apparent dead spots). It may also involve measuring client performance metrics like throughput and handoff latency when roaming. If the WLAN must support voice, the tester might also measure jitter and call quality. Here, some possible criteria are minimum acceptable signal and data rate throughout a required coverage area, maximum acceptable handoff latency and noise floor, or ability to support a targeted number of users at a given bandwidth.
- WLAN activities can also be compared to a defined security policy or an industry regulation like HIPAA or PCI. During such an evaluation, the site may be surveyed manually, looking for unknown devices (rogue APs). It is often more effective to monitor the site full-time, using a WIPS to detect unauthorized devices, connections to banned destinations (e.g., ad hocs, neighbor APs), security policy violations (e.g., unencrypted sessions), and suspicious activity (e.g., DoS attacks, hacker tool signatures). Penetration tests may also be run to spot AP and client vulnerabilities (e.g., open ports, weak passwords, exploitable bugs). Here again, criteria depends on the evaluation's goal. For example, a security audit counts the number of rogue APs, policy violations, etc., to determine how close the WLAN came to meeting established requirements, while a vulnerability assessment gathers information needed to remediate problems and compare current and past results to verify fixes.
To learn more, check out searchNetworking's WLAN All-in-One Guide and consult the chapters that cover WLAN design, security, and performance.
Dig Deeper on WLAN Standards
Related Q&A from Lisa Phifer
Need to send an email, check your flight's status or get ready for a presentation? You can do it all on your smartwatch, thanks to a slew of Apple ...continue reading
New and improved management features have made Android devices more suitable for enterprise use, and API and EMM tools can streamline the device ...continue reading
Whether you need a basic open source mobile device management tool for your company's Apple or Android devices, or something more customized, you ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.