107 articles written
Jim Geier
Popular
How to: Sniff Wireless Packets with WireShark
WireShark is free software that sniffs packets on wireless...
How to: Provide Wi-Fi Coverage in Elevators
Most wireless LAN deployments require signal coverage inside elevators,...
How to: Optimize Wi-Fi Coverage in Multi-Floor Facilities
Sooner or later, you’ll need to install a wireless...
Explore
How to: Define Wireless Network Security Policies
With a wireless network, you must consider security policies that will protect resources from unauthorized people. Let’s take a look at what you should include in a wireless network security policy for an enterprise....
Capacity Analysis Key to Deploying VoWLAN Systems
This tutorial is excerpted with permission from the book, Deploying Voice over Wireless LANs (Cisco Press), written by Jim Geier.
Download Chapter 1, VoWLAN Applications and Benefits, free of charge. This chapter explains how to...
How to: Define Wireless Network Requirements
Requirements define what a wireless network must do, which provides the foundation for the design. Requirements for a wireless network include needs, such as signal coverage in elevators and support for voice telephony. Leave...
How to: Prevent Parking Lot Attacks
The application of shielding in the form of specialized wall paint substantially attenuates RF signals, which improves wireless security and performance.
Indoor wireless LANs transmit radio frequency (RF) signals that often propagate outside the...
How to: Conduct a Wireless Site Survey
With wireless systems, it’s very difficult to predict the propagation of radio waves and detect the presence of interfering signals without the use of test equipment. Even if the system implements omni-directional antennas, radio...
Troubleshooting 802.1x Missing Supplicant Problems (Part II)
How to deal with peripheral devices and hubs that don’t have 802.1x supplicants.
This tutorial is excerpted with permission from the book, Implementing 802.1x Security Solutions (ISBN: 978-0-470-16860-8), written by Jim Geier.
Download Chapter 2, Port-Based...
Troubleshooting 802.1x Port-Based Authentication Systems
The implementation of 802.1x port-based authentication over wireless networks can be a daunting task. Make life easier by learning how to most effectively troubleshoot 802.1x problems that will likely arise.
This tutorial is excerpted...
How to: Set Up a Wi-Fi Hotzone Using Meraki (Part II)
In Part I of this tutorial, we learned how to effectively plan for the deployment of a hotzone for neighborhoods and main city streets using low-cost Meraki equipment. Now, we’ll turn our attention to...