SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
Non-WiFi Interference Combat Guide (www.blog.airtightnetworks.com)

Interference    Nature of interference    Remedy principles
source
Microwave       Affects upper end (high   i) Deploy APs as far as possible from known
oven            channel numbers) of 2.4      microwave locations - at least 100 feet away,
                GHz WiFi spectrum            lesser distance will do if there are intervening
                when microwave is            obstacles such as walls.
                running (heating food).
                When running,             ii) Even then, degraded performance for users close
                interference duty cycle       to microwave oven is unavoidable.
                is about 50%.
Bluetooth       Bluetooth frequency       i) Bluetooth interference is generally not a major
                hopping sweeps across        concern due to its frequency hopping, narrow
                entire 2.4 GHz WiFi          band transmission (1 MHz), intermittent activity
                spectrum.                    and low transmit power. Still to be conservative,
                                             tell users to not use high power (class 1)
                                             Bluetooth on enterprise premises.

                                          ii) If users operate continuous transmission
                                              Bluetooth applications too close to WiFi client,
                                              they may see some performance hit on WiFi
                                              client, though it will be localized to those users.
                                              Bluetooth mice, headsets are generally not a
                                              concern.
Baby            Affects 2.4 GHz WiFi      i) Though this source is often cited, it is
monitors        spectrum.                     unforeseeable that employees will bring baby
                                              monitors (and babies to be monitored with them)
                                              to office. So in practice, baby monitors are not a
                                              concern for enterprise WiFi networks. It is
                                              highly unlikely that baby monitors in homes
                                              surrounding the office will generate interference
                                              enough to reach office WiFi networks (unless
                                              you have wall touch neighborhood around
                                              office).

                                          ii) I would like to hear your story if you have
                                              indeed faced baby monitor interference in
                                              enterprise WiFi networks.
Cordless        The digital cordless       i) Here again, most enterprises do not use cordless
phones          phones which operate in       phones on office premises. Cordless phones are
                2.4 GHz and 5 GHz             primarily used in homes. Further, even those
                bands can cause               used in enterprises mostly use 900 MHz DECT
                interference to WiFi in       technology. So in practice, they are not a concern
                respective spectrums.         for enterprise WiFi networks. It is highly
                                              unlikely that interference from cordless phones
                                              in homes surrounding the office will generate
                                              interference enough to reach office WiFi
                                              networks (unless you have wall touch


                                                                                 www.airtightnetworks.com
neighborhood around office).


                                                  ii) I would like to hear your story if you have
                                                      indeed faced cordless phone interference in
                                                      enterprise WiFi networks (even when you don’t
                                                      have cordless phones as part of enterprise
                                                      infrastructure).
 Analog            These cameras are               i) Check with your office security staff if they use
 wireless          typically used for video           analog wireless video surveillance cameras.
 cameras           surveillance and are               Deploy your APs as far away as possible from
                   older generation. The              known analog camera locations - at least 100 feet
                   newer generation is                away, lesser distance will do if there are
                   digital technology                 intervening obstacles such as walls. It won’t hurt
                   including co-existing              to consider upgrade of analog cameras to digital
                   WiFi transmission.                 versions during WiFi deployment project at
                   Analog cameras operate             incremental cost. If possible, check if your
                   in 2.4 GHz WiFi band               neighborhood premises use analog wireless
                   and depending on                   cameras and position your APs away from them.
                   which channels they are
                   tuned to, they cause           ii) Even when APs are placed away from analog
                   constant background                cameras, degraded performance for users close to
                   interference on                    analog camera locations is unavoidable.
                   respective WiFi
                   channels.
 Jammer            Jammer refers to               i) Since jammer is a source which cannot be a
                   deliberate generation of          priori known, only remedy for jammer is to
                   interference, typically           detect it when it happens and then physically
                   out of malicious intent           mitigate it.
                   (DoS attack). Jammer
                   can create interference        ii) Ask your access point vendor or wireless
                   in both 2.4 GHz and 5              security sensor vendor for jammer attack
                   GHz spectrums.                     detection capability.
                   Depending on its
                   intensity, it can degrade
                   or even completely
                   wipe out WiFi
                   communication.

AP operation in 5 GHz:

In general, you will notice that many of these non-WiFi interference sources (Microwave oven, Bluetooth,
baby monitors, many cordless phones, surveillance cameras) operate in 2.4 GHz band. So one solution to
avoid them altogether is to operate APs in 5 GHz band (802.11a/n). The flip side however is that AP
coverage will be smaller in 5 GHz. Also if you have any legacy clients, they will not be able to operate in 5
GHz band.




                                                                                         www.airtightnetworks.com

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless Fidelity
 
Datasheet: Umbrella Everywhere Solution Overview
Datasheet: Umbrella Everywhere Solution OverviewDatasheet: Umbrella Everywhere Solution Overview
Datasheet: Umbrella Everywhere Solution Overview
 
Wi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank SaxenaWi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank Saxena
 
Wi fi technology ppt mine
Wi fi technology ppt mineWi fi technology ppt mine
Wi fi technology ppt mine
 
hotspot(wi-fi)
hotspot(wi-fi)hotspot(wi-fi)
hotspot(wi-fi)
 
Wifi
WifiWifi
Wifi
 
What affects wi fi speed
What affects wi fi speedWhat affects wi fi speed
What affects wi fi speed
 
Who invented wi-fi
Who invented wi-fiWho invented wi-fi
Who invented wi-fi
 
Wifi Ppt
Wifi PptWifi Ppt
Wifi Ppt
 
Wi-Fi technology presentation
Wi-Fi technology presentationWi-Fi technology presentation
Wi-Fi technology presentation
 
Wifi technology ppt
Wifi technology pptWifi technology ppt
Wifi technology ppt
 
Wifi Challenges
Wifi ChallengesWifi Challenges
Wifi Challenges
 
Grouping
GroupingGrouping
Grouping
 
Wi fi
Wi fiWi fi
Wi fi
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology Writeup
 
WiFi Technology & IEEE
WiFi Technology & IEEEWiFi Technology & IEEE
WiFi Technology & IEEE
 
Wi fi network
Wi fi networkWi fi network
Wi fi network
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
Wi fi ppt project by Mubeen Momin
Wi fi ppt project by Mubeen MominWi fi ppt project by Mubeen Momin
Wi fi ppt project by Mubeen Momin
 

Ähnlich wie Non WiFi interference combat guide 1

Ähnlich wie Non WiFi interference combat guide 1 (20)

Wi-Fi Architecture
Wi-Fi ArchitectureWi-Fi Architecture
Wi-Fi Architecture
 
wi-fi technology
 wi-fi technology wi-fi technology
wi-fi technology
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Gi – fi technology
Gi – fi technologyGi – fi technology
Gi – fi technology
 
Wi fi
Wi fiWi fi
Wi fi
 
Presentation2
Presentation2Presentation2
Presentation2
 
Wi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification ProcessWi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification Process
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
 
A Review on Wireless Technologies
A Review on Wireless TechnologiesA Review on Wireless Technologies
A Review on Wireless Technologies
 
Camera
CameraCamera
Camera
 
Wi-Fi Tecnology
Wi-Fi TecnologyWi-Fi Tecnology
Wi-Fi Tecnology
 
Wi –fi
Wi –fiWi –fi
Wi –fi
 
wi-fi.pptx
wi-fi.pptxwi-fi.pptx
wi-fi.pptx
 
Internet of things Technology Review
Internet of things Technology ReviewInternet of things Technology Review
Internet of things Technology Review
 
Gi fi technology ppt
Gi fi technology pptGi fi technology ppt
Gi fi technology ppt
 
Wi fi
Wi fiWi fi
Wi fi
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
wireless networks.pptx
wireless networks.pptxwireless networks.pptx
wireless networks.pptx
 

Mehr von AirTight Networks

Is 11ac Right for Your Network?
Is 11ac Right for Your Network?Is 11ac Right for Your Network?
Is 11ac Right for Your Network?AirTight Networks
 
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014AirTight Networks
 
Wi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise ThyselfWi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise ThyselfAirTight Networks
 
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014AirTight Networks
 
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration AirTight Networks
 
AirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSPAirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSPAirTight Networks
 
AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6AirTight Networks
 
AirTight social wifi solution brief
AirTight social wifi solution briefAirTight social wifi solution brief
AirTight social wifi solution briefAirTight Networks
 
Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013AirTight Networks
 
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...AirTight Networks
 
Survey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise SecuritySurvey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise SecurityAirTight Networks
 
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...AirTight Networks
 
WPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQsWPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQsAirTight Networks
 
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation StrategiesWPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation StrategiesAirTight Networks
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseAirTight Networks
 
Windows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseWindows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseAirTight Networks
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsAirTight Networks
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresAirTight Networks
 
Retail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsRetail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsAirTight Networks
 

Mehr von AirTight Networks (20)

Is 11ac Right for Your Network?
Is 11ac Right for Your Network?Is 11ac Right for Your Network?
Is 11ac Right for Your Network?
 
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
 
Wi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise ThyselfWi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise Thyself
 
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
 
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
 
AirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSPAirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSP
 
AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6
 
AirTight social wifi solution brief
AirTight social wifi solution briefAirTight social wifi solution brief
AirTight social wifi solution brief
 
Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013
 
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
 
Survey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise SecuritySurvey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise Security
 
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
 
WPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQsWPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQs
 
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation StrategiesWPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the Enterprise
 
Windows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseWindows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the Enterprise
 
802.11w Tutorial
802.11w Tutorial802.11w Tutorial
802.11w Tutorial
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
 
Retail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsRetail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—Recommendations
 

Non WiFi interference combat guide 1

  • 1. Non-WiFi Interference Combat Guide (www.blog.airtightnetworks.com) Interference Nature of interference Remedy principles source Microwave Affects upper end (high i) Deploy APs as far as possible from known oven channel numbers) of 2.4 microwave locations - at least 100 feet away, GHz WiFi spectrum lesser distance will do if there are intervening when microwave is obstacles such as walls. running (heating food). When running, ii) Even then, degraded performance for users close interference duty cycle to microwave oven is unavoidable. is about 50%. Bluetooth Bluetooth frequency i) Bluetooth interference is generally not a major hopping sweeps across concern due to its frequency hopping, narrow entire 2.4 GHz WiFi band transmission (1 MHz), intermittent activity spectrum. and low transmit power. Still to be conservative, tell users to not use high power (class 1) Bluetooth on enterprise premises. ii) If users operate continuous transmission Bluetooth applications too close to WiFi client, they may see some performance hit on WiFi client, though it will be localized to those users. Bluetooth mice, headsets are generally not a concern. Baby Affects 2.4 GHz WiFi i) Though this source is often cited, it is monitors spectrum. unforeseeable that employees will bring baby monitors (and babies to be monitored with them) to office. So in practice, baby monitors are not a concern for enterprise WiFi networks. It is highly unlikely that baby monitors in homes surrounding the office will generate interference enough to reach office WiFi networks (unless you have wall touch neighborhood around office). ii) I would like to hear your story if you have indeed faced baby monitor interference in enterprise WiFi networks. Cordless The digital cordless i) Here again, most enterprises do not use cordless phones phones which operate in phones on office premises. Cordless phones are 2.4 GHz and 5 GHz primarily used in homes. Further, even those bands can cause used in enterprises mostly use 900 MHz DECT interference to WiFi in technology. So in practice, they are not a concern respective spectrums. for enterprise WiFi networks. It is highly unlikely that interference from cordless phones in homes surrounding the office will generate interference enough to reach office WiFi networks (unless you have wall touch www.airtightnetworks.com
  • 2. neighborhood around office). ii) I would like to hear your story if you have indeed faced cordless phone interference in enterprise WiFi networks (even when you don’t have cordless phones as part of enterprise infrastructure). Analog These cameras are i) Check with your office security staff if they use wireless typically used for video analog wireless video surveillance cameras. cameras surveillance and are Deploy your APs as far away as possible from older generation. The known analog camera locations - at least 100 feet newer generation is away, lesser distance will do if there are digital technology intervening obstacles such as walls. It won’t hurt including co-existing to consider upgrade of analog cameras to digital WiFi transmission. versions during WiFi deployment project at Analog cameras operate incremental cost. If possible, check if your in 2.4 GHz WiFi band neighborhood premises use analog wireless and depending on cameras and position your APs away from them. which channels they are tuned to, they cause ii) Even when APs are placed away from analog constant background cameras, degraded performance for users close to interference on analog camera locations is unavoidable. respective WiFi channels. Jammer Jammer refers to i) Since jammer is a source which cannot be a deliberate generation of priori known, only remedy for jammer is to interference, typically detect it when it happens and then physically out of malicious intent mitigate it. (DoS attack). Jammer can create interference ii) Ask your access point vendor or wireless in both 2.4 GHz and 5 security sensor vendor for jammer attack GHz spectrums. detection capability. Depending on its intensity, it can degrade or even completely wipe out WiFi communication. AP operation in 5 GHz: In general, you will notice that many of these non-WiFi interference sources (Microwave oven, Bluetooth, baby monitors, many cordless phones, surveillance cameras) operate in 2.4 GHz band. So one solution to avoid them altogether is to operate APs in 5 GHz band (802.11a/n). The flip side however is that AP coverage will be smaller in 5 GHz. Also if you have any legacy clients, they will not be able to operate in 5 GHz band. www.airtightnetworks.com