107 articles written

Jim Geier

Popular

How to: Sniff Wireless Packets with WireShark

WireShark is free software that sniffs packets on wireless...

How to: Provide Wi-Fi Coverage in Elevators

Most wireless LAN deployments require signal coverage inside elevators,...

How to: Optimize Wi-Fi Coverage in Multi-Floor Facilities

Sooner or later, you’ll need to install a wireless...

Explore

How to: Define Wireless Network Security Policies

  With a wireless network, you must consider security policies that will protect resources from unauthorized people. Let’s take a look at what you should include in a wireless network security policy for an enterprise....

Capacity Analysis Key to Deploying VoWLAN Systems

This tutorial is excerpted with permission from the book, Deploying Voice over Wireless LANs  (Cisco Press), written by Jim Geier. Download Chapter 1, VoWLAN Applications and Benefits, free of charge. This chapter explains how to...

How to: Define Wireless Network Requirements

Requirements define what a wireless network must do, which provides the foundation for the design. Requirements for a wireless network include needs, such as signal coverage in elevators and support for voice telephony. Leave...

How to: Prevent Parking Lot Attacks

The application of shielding in the form of specialized wall paint substantially attenuates RF signals, which improves wireless security and performance. Indoor wireless LANs transmit radio frequency (RF) signals that often propagate outside the...

How to: Conduct a Wireless Site Survey

With wireless systems, it’s very difficult to predict the propagation of radio waves and detect the presence of interfering signals without the use of test equipment. Even if the system implements omni-directional antennas, radio...

Troubleshooting 802.1x Missing Supplicant Problems (Part II)

How to deal with peripheral devices and hubs that don’t have 802.1x supplicants.     This tutorial is excerpted with permission from the book, Implementing 802.1x Security Solutions (ISBN: 978-0-470-16860-8), written by Jim Geier.     Download Chapter 2, Port-Based...

Troubleshooting 802.1x Port-Based Authentication Systems

The implementation of 802.1x port-based authentication over wireless networks can be a daunting task. Make life easier by learning how to most effectively troubleshoot 802.1x problems that will likely arise.   This tutorial is excerpted...

How to: Set Up a Wi-Fi Hotzone Using Meraki (Part II)

In Part I of this tutorial, we learned how to effectively plan for the deployment of a hotzone for neighborhoods and main city streets using low-cost Meraki equipment. Now, we’ll turn our attention to...

Other Articles