Are you responsible for managing and monitoring your company’s network? Has your company deployed wireless or is planning to deploy a wireless network? Are your users increasing demanding the ability to connect multiple wireless devices, including smart phones, tablets and netbooks?
In the past few years, Access Points have become cheaper and simpler to configure. Wi-Fi hotspots have become pervasive in public locations such as cafes, hotels and libraries, and most people have deployed wireless in their homes. Every day people enjoy the ability to connect to the Internet using their laptops, e-books, iPhones and iPads from anywhere in their home.
The rapid adoption of Wi-Fi and Internet enabled devices has resulted in a growing expectation by users that they should be able to connect their devices to the corporate network and be able work anywhere at any time.
Rogue Access Points are a common problem in companies that do not provide corporate access to wireless devices. These devices are often connected to the network by well-meaning users that do not understand the security implications. These users generally do not realize their actions can expose the corporate network to attack. They also don’t recognize how rogue Access Points can cause interference, impacting the wireless performance for others.
In response to these growing demands, many IT managers decide to deploy wireless networks for employees and guests.
If you’re looking to unlock the secret knowledge of wireless networking, check out this month’s Wireless Black Magic article by Dr. Avril Salter. In it, you’ll learn wireless concepts and practical advice on how to manage and monitor your wireless network.
You’ll discover the ways wireless networks behave differently from wired networks, and understand the essential aspects of monitoring coverage, performance, and traffic. You’ll even recognize how to identify the presence of rogue Access Points, all using basic wireless tools including spectrum and WLAN packet analyzers.