Using a GPS to perform a Wi-Fi survey

It is important to perform a wi-fi survey so that you can determine not only the perfect place to locate your access point or bridge but to gain an understanding of the channel co-existence challenge you may face.  With wireless access points in surrounding neighborhoods and businesses, you will need to  perform a survey by walking around and mapping out the BSAs (Basic Service Area) of wireless that surrounds you and your organization.

Below is an example of our school’s perimeter.  Matt, Chris and James, students in the Computer Information Technology, class performed a survey using a Microsoft GPS and Vistumbler.  This survey revealed access points and their channels of current wireless at our institution and  includes APs in surrounding businesses and neighborhoods.  These were mapped using Google Earth after exporting their KML file from Vistumbler.

This type of survey allows IT professionals to analyze data exported to ensure the correct channels can be used at their organization.

Miller Goodroe Felts

After exporting the wireless information, you can analyze each access point or wireless device by clicking on it.  Below is an example of the information exported into Google Earth.   Each device shows SSID, Network Type, Mac Address, Channel, Security, Encryption Type, Data Rates, Latitude, Longitude and Manufacturer information.   Analyst using this information can also determine the best placement of wireless devices along with channel information.

ESSID Expanded

Channel co-existence is when access points share channels that are very close to one another.

802.11 wireless on 2.4 Ghz has three non-overlapping channels.  These channels are 1, 6 and 11.  The closer channels are, the more likely interference will take place.  With the amount of wi-fi in use today, IT professionals have to chose between 2.4 Ghz and 5 Ghz and and try to select channels that are not in use if possible.   Professional access points and bridges can also adjust power as necessary.   A dense population can make this very challenging.

If you look at the students’ survey by zooming out to see how many access points can be seen, this is what you are looking at!  Now you can see why site surveys are important at your organization.

Exploded

In addition to this survey, a secondary survey using a spectrum analyzer is very important to search for interference from other sources.  (See our review of the Airview Spectrum Analyzer)

analyzer-software

Channel information (Chart from Wikipedia)

NonOverlappingChannels2.4GHzWLAN-en.svg

Here’s another look at a wireless survey showing vertical lines and signal strength.  (James M. KML survey)

Another view James Miller KML

Network Switches – Avoid Daisy-Chains

When you are networking computers, wireless access points, printers and other nodes in multiple rooms, try to avoid daisy-chaining switches or using small 4-8 port switches when you are in a hurry.  Replace any hubs on your network as soon as you can.

With a hub, collisions can be >20% and utilization can stand at >50%.   By replacing a hub alone, you can reduce collisions to 5% on switches in rooms and <1% in the server room.  Switches help to isolate traffic, relieve congestion, separate collision domains (reduce collisions), segment and restart distance/repeater rules.

Daisy Chaining Switches -what not to do

Real world scenarios may require you to temporarily daisy chain switches.  If you do, test the network and run additional backbones or replace core switches to accommodate more nodes as soon as you can. (remember, replace any hubs in your network)

Daisy chaining

One of many solutions is to run independent lines to the core switch

alternative

Basic tips on optimization of your network -

  • Use stackable managed switches
  • Purchase switches that support
    IEEE 802.1D , IEEE 802.1p , IEEE 802.1Q , IEEE 802.1s , IEEE 802.1w , IEEE 802.1x , IEEE 802.3 , IEEE 802.3ab , IEEE 802.3ad (LACP) ,
    IEEE 802.3ae , IEEE 802.3u , IEEE 802.3x , IEEE 802.3z
  • Use a battery backup on the switches

This is the very basics behind network switch infrastructure.  Managing switches and using the IEEE standards above along with optimizing your network and managing the network infrastructure is important.

Excellent articles on Networking Infrastructure

http://www.lantronix.com/resources/net-tutor-switching.html

http://www.techrepublic.com/blog/it-consultant/only-novices-daisy-chain-switches/

Configuring WDS to extend your wireless network

Want to extend your network and make it more reliable and robust?   

Here’s what you will need -

  • Two routers with the same firmware
    • Preferably Tomato or DD-WRT

Login to the first router.  

In this example, the static number 192.168.1.1 is the Main router.

  • Enable the WAN to match your ISP  
  • Enable DHCP
  • Enable Access Point + WDS  (Picture two below)
    • You must have the same wireless configuration on both routers
      • Enter the MAC address of router two under WDS Link with.

Router 1 no 1

Router 1 no 2

Login to the second router

  • Disable the WAN
  • Disable DHCP
  • Assign the router a static IP address (Below we have given the router .250)
  • Enter Router One’s IP Address for the Gateway
  • Enter a DNS of your choice
  • Make the wireless configuration the same as the first router.  Under WDS, change the drop down to automatic.

Router 2 no 1

Router 2 no 2

With the same settings, you can now extend your network several hundred feet under the right conditions.  Because the SSIDs are the same, once you join one of the routers with a smartphone or laptop, it will seamlessly change to the stronger signal.

With Tomato, you can chain together approximately 12 devices.

Links-

Tomato RAF

Shibby’s Tomato

DD-WRT

Note; The IP addresses and MAC addresses are in a lab environment.

How does it look on a network map?  The two routers are actually connected together.  The switch is the four ports on the back of the router closest to the internet.

Map

Wi-fi takes a long time to find network after computer sleeps

After your computer goes to sleep, do you notice it takes a long time to connect to your wireless router?
slow
There can be several reasons for this.

Here are some tips~

  • Power management on the adapter is enabled
    • Disable in the Device Manager
  • Advanced Power Management
    • Disable under Power Options (Advanced)
  • Bluetooth Interference
    • Disable under the advanced tab on the wireless network card properties
  • Outdated Driver
    • Updated the driver from the manufacturer of the wirelesss chip and not from the computer’s support site
  • Disable the Virtual Wi-fi under the device manager if you don’t use Adhoc

Advanced Power options – Set to Max Performance

advanced wifi

Disable Bluetooth settings

 

Bluetooth

Disable Power Management

 

network power device manager

 

Use the following freeware to see if you have channel interference and to analyze the power in each room of your home or business:

Vistumbler
NetSurveyor
Xirrus

 

Ultimately, reset your network by going to a command prompt as an administrator and type the following:

netsh int ip reset reset.log
netsh int ipv6 reset reset.log
netsh winsock reset catalog
nbtstat -r
nbtstat -RR
ipconfig /flushdns

Restart your computer

Going to take a certification that involves binary?

Going to take a certification that involves binary?

Here’s a quick tutorial~

Let’s say you are given an IP address of 192.168.1.135 in an answer.

What is this number in binary?

Here’s what you do.

Take a simple key to convert the numbers in the octets into binary.
The key is this:

128   64   32   16   8   4   2  1

Now let’s take the first octet of 192 and let’s see how many times the numbers above (the key) go into the given octet.

How many times does 128 go into 192?     192 – 128        1 time
This will leave us 64.
Next, how many times will 64 (your remaining number) go into the next number in the key(64)?

64 -64       1 time

Now the remaining number is 0.   So if you subtract 32 from 0 the number will be 0.  16 from 0 is 0, 8 from 0 is 0, 4 from 0 is 0, 2 from 0 is 0 and finally 1 from 0 is 0.

Look at your answers. 11000000 -This will represent 192.

Now let’s do the 168 octet.

128 goes into 168 – 1 time.   The remaining number is 40.   64 goes into 40 – 0 times.    32 goes into 40 – 1 time.  This gives you a remainder of 8.   16 (the next number in the key) goes into 8 how many times? 0 . 8 goes into 8 – 1 time.  The remainder is now 0.    4 goes into 0 – 0 times.   2 goes into 0 – 0 times.  1 goes into 0 – 0 times.   Look at your answers (bold).

168 will be 1010100

Of course the next number (third octect) which is 1 will be 00000001.

If you use the above key for 132, along with the subtraction method, 132 will be 10000100.

Your final answer is 11000000.1010100.00000001.10000100

 

Try a these yourself using the subtraction method above -

192.168.1.32
192.168.1.111

 

Flip over and see the answers

11110110˙10000000˙00010101˙00000011
01100100˙10000000˙00010101˙00000011
:ɹǝʍsuɐ

How to tie your cloud storage services together

How can you tie your cloud storage services together?   It’s actually easy if you use MultCloud.   MultCloud ties together all of the most popular cloud storage services so you can upload files to multiple sites through a single sign-on.

Completely FREE app for home and commercial use.
Single login for multiple cloud accounts.
Add unlimited accounts such as Dropbox, Box, OneDrive, etc

logo

Add Cloud

Signing up is easy and free.   Once you sign in, you can connect your cloud services and use the power of MultCloud to Upload or Download files from a central dashboard.

services

See who’s on your wireless network – SoftPerfect WiFi Guard

Want to see who is on your wireless?  SoftPerfect’s  WiFi Guard is freeware that scans your network, both wireless and wired and it also inventories connections on your network.

Before setting up WiFi Guard, inventory your computers, printers, routers, TVs and other devices that use your network.  Get each devices’ MAC address.  Load WiFi Guard and mark each device as trusted.  WiFi Guard’s settings allows you to set a scan interval and to put comments on devices that you know.  In the event a new device is connected to your network, you’ll be alerted.

taskbar

Scanned

Set a scan interval that meets your needs.Settings 

WiFi Guard keeps a history of devices that connect to your network.History

SoftPerfect WiFi Guard