Planning your Wireless Network for IT Professionals. Can the Access Point Hear You?

Home > Blogs > Wireless > Planning your Wireless Network for IT Professionals. Can the Access Point Hear You?

Planning your Wireless Network for IT Professionals. Can the Access Point Hear You?

Like This Blog 0 Dr. Avril Salter
Added by January 15, 2016

With IT professionals, I’m sure all of us have done things that we’ve been rather embarrassed about and would be considered to be rather silly.
001-Planning-your-Wireless-Network-for-IT-Professionals

For instructor led wireless training, see our 5-day course: WIRE400: Wireless Networking for the IT Professional

I’m going to share with you one of the funniest things that IT professionals do regarding planning their wireless networks.

002-Planning-your-Wireless-Network-for-IT-Professionals

It is really common for IT professionals to use the smartphones, the “bars” that are shown on the smartphones, to actually assess whether or not there is WiFi coverage.

003-Planning-your-Wireless-Network-for-IT-Professionals

We’re going to take a look at why that is a nonsensical thing to do.

Over the years we’ve all been trained by the cellphone industry that when we can’t make a phone call or can’t get data across on our cellphone, that we look at the bars and say, “Are we under coverage or not?” and, “Am I able to communicate with a base-station?” We’ve taken that awareness and started now to apply it to WiFi.

Deployment Scenario

I’m finding that WiFi professionals will take a look at their smartphone and say, “Yes, I have WiFi coverage, and therefore I should be able to connect.” Now, to understand why this doesn’t make sense, let’s look at a deployment scenario.

004-Planning-your-Wireless-Network-for-IT-Professionals

Imagine if you would, you’ve deployed an access point, and in this example we’re going to assume that the access point has been deployed with a maximum transmit power of 800mW (milliwatts). Imagine that we have a laptop that we want to be able to communicate with this access point. When the signals come from the access point to the client, the client can hear the access point.

Laptops are designed to be utilized away from your desk, i.e., not plugged in to the main power. It is therefore fairly common for a laptop to be designed with a WiFi radio that minimizes the transmit power in order to conserve the battery power, and therefore the life which your laptop will continue to operate.

005-Planning-your-Wireless-Network-for-IT-Professionals

In this example, I’ve set up a laptop and let’s assume that the maximum transmit power is 200mWs. It is still able to hear the access point, but when the laptop goes to respond to the access point and say, “Hey, it’s me. Please, can I connect?”

It cannot transmit at the high power level of the access point, and therefore even though it can hear the access point, when it transmits, the access point is unable to hear the signals from the laptop. It is therefore impossible to establish two‑way communication between the access point and the laptop.

006-Planning-your-Wireless-Network-for-IT-Professionals

In other words, when you look at the “bars” on your device, what you’re looking at is how well you can hear the access point. What you haven’t done is determine whether the access point can hear your device. It may appear to you that you have WiFi coverage, but in reality you can hear the access point, but the devices cannot communicate with the access point.

What you might think your coverage looks like this:

007-Planning-your-Wireless-Network-for-IT-Professionals

In reality your coverage is actually significantly less because your coverage is where devices can form two‑way communication.

008-Planning-your-Wireless-Network-for-IT-Professionals

Not just hear the access point, but the access point being able to hear the device. Indeed, if you have devices, such as VoIP devices, some of those have a maximum transmit power as little as 40 mW or 50 mW.

For those devices to be able to connect, they need to be even closer to the access point. In other words, when you’re planning out a WiFi network, you need to know what the transmit power is of the devices that are connecting to it, and you need to plan around the weakest device that you have connecting to the network.

Just because you can hear the access point doesn’t mean the access point can hear you.

In order to do effective WiFi coverage planning, you must consider communications in both directions. The uplink from the client to the access point is typically always the weakest link because you can always raise the power level of your access point, but you cannot always raise the power level of your client.

If you enjoyed this and now find it quite amusing when you see people trying to do WiFi coverage planning using the bars on their cellphone, then please come and join me for one week of super‑fun wireless training class where you’ll really start to understand how wireless works, how to configure a WiFi network, and how to optimize and troubleshoot it and not make these rather amusing silly mistakes that many IT professionals make today.

WIRE400: Wireless Networking for the IT Professional
5-Day course at Interface Technical Training in Phoenix, Arizona.
Learn how to take control of your enterprises Wi-Fi network. In this 5-day hands-on course, you will learn how to plan, configure, deploy and manage a wireless network, secure and troubleshoot interference sources, identify and analyze Wi-Fi packets in Wireshark for data transfer. This course finishes with an overview of the latest next generation in Wi-Fi product enhancements for enterprise and end-users.

 

Videos You May Like

Agile Methodology in Project Management

0 153 0

In this video, you will gain an understanding of Agile and Scrum Master Certification terminologies and concepts to help you make better decisions in your Project Management capabilities. Whether you’re a developer looking to obtain an Agile or Scrum Master Certification, or you’re a Project Manager/Product Owner who is attempting to get your product or … Continue reading Agile Methodology in Project Management

JavaScript for C# Developers – September 24, 2014

0 487 3

Is JavaScript worth taking the time to learn if I’m a server-side .NET developer? How much of C# carries over to JavaScript? In this recorded video from Dan Wahlin’s webinar on September 24,2014, Dan answers these questions and more while also discussing similarities between the languages, key differences, and the future of JavaScript (ES6). If … Continue reading JavaScript for C# Developers – September 24, 2014

Detailed Forensic Investigation of Malware Infections – April 21, 2015

4 608 5

How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.