Life Cycle of Wireless:
Bad WiFi designs:
--The attenuation and propagation of RF signal is important and use case again depends on the deployment requirements.
--Its important where APs are placed.
--Bad WIFI design results in "coverage hole" "sticky client behavior""throughput issue"client disconnection""application drop" and more.
Pic courtesy "Bad-fi"
Steps for Deploying a Good Wireless LAN:
Step 1: Information Gathering("THE INTERVIEW")
--Type of Environments
--Client device type to be used
--Application to be used
--Expected growth vs Current growth
#Access point to be used:
--Coverage Vs Capacity planning
--Security Enterprise and Guest use
#Its all about the client:
--What clinet type & capabilities
--How many devices
--Determine Capacity Requirements
--Proper Floor plan and Scales
I would recommend try using capacity planner from Andrew Von Nagy
Step2: Predictive Survey
--Once you are on target with your data gathering for designing the WI-FI, you should be good to go.
--You have Tool from Airmagnet and Ekahua planners for predictive designing a WLAN.
Step3: Pre-Deployment Survey:
--A site visit comes handy before implementing the output design from the Predictive site survey tool based from our requirement.
--Here an example from Aaron Scott where he was told its an dry wall and what he found behind the dry wall during the onsite visit.
#Understand the Environment:
Step4: Validation survey
--After the deployment its important to run validate a post deployment survey to see if the network meets the client requirement in coverage Capacity and Application capacity for the business.
--Check the noise floor not the RSSI. Having a good signal strength will not help the client to get good MCS rate.
--It needs a better SNR for good MCS rate
Step5: Spectrum Analysis/Protocol Anlaysis
--The WiFi spectrum has to be analysed periodically to avoid the WiFi Network getting choked by wifi and any other non wifi interference.
--These non wifi interference just uses all the airtime and makes the wifi devices life miserableness.
--You can use the spectrum analyzer from the Airmagnet and Ekahua to identify the source of interference.
--The interference from a microwave has the following signature patter which is compared with a no interference view.
--Protocol Analysis to be done, so you can find if an Rouge AP or Rouge Devices which is causing security threat can be figured out.
--You could use "Savvius Omnipeek" for packet captures and protocol analysis.