Skip to main content

20 Myths of Wi-Fi Interference (Cisco)

Read the full list here.

  • Myth #1: "The only interference problems are from other 802.11 networks."
  • Myth #2: "My network seems to be working, so interference must not be a problem." 
  • Myth #3: "I did an RF sweep before deployment. So I found all the interference sources."
  • Myth #4: "My infrastructure equipment automatically detects interference."
  • Myth #5: "I can overcome interference by having a high density of access points."
  • Myth #6: "I can analyze interference problems with my packet sniffer." 
  • Myth #7: "I have a wireless policy that doesn't allow interfering devices into the premises."
  • Myth #8: "There is no interference at 5 GHz."
  • Myth #9: "I'll hire a consultant to solve any interference problems I run into."
  • Myth #10: "I give up. RF is impossible to understand."
  • Myth #11: "Wi-Fi interference doesn't happen very often."
  • Myth #12: "I should look for interference only after ruling out other problem sources."
  • Myth #13: "There's nothing I can do about interference if I find it."
  • Myth #14: "There are just a few easy-to-find devices that can interfere with my Wi-Fi."
  • Myth #15: "When interference occurs, the impact on data is typically minor."
  • Myth #16 "Voice data rates are low, so the impact of interference on voice over Wi-Fi should be minimal." 
  • Myth #17: "Interference is a performance problem, but not a security risk."
  • Myth #18: "802.11n and antenna systems will work around any interference issues."
  • Myth #19: "My site survey tool can be used to find interference problems."
  • Myth #20: "RF analysis tools are too bulky and too expensive."

Comments

Popular posts from this blog

easywall - Web interface for easy use of the IPTables firewall on Linux systems written in Python3.

Firewalls are becoming increasingly important in today’s world. Hackers and automated scripts are constantly trying to invade your system and use it for Bitcoin mining, botnets or other things. To prevent these attacks, you can use a firewall on your system. IPTables is the strongest firewall in Linux because it can filter packets in the kernel before they reach the application. Using IPTables is not very easy for Linux beginners. We have created easywall - the simple IPTables web interface . The focus of the software is on easy installation and use. Access this neat software over on github: easywall

No Scrubs: The Architecture That Made Unmetered Mitigation Possible

When building a DDoS mitigation service it’s incredibly tempting to think that the solution is scrubbing centers or scrubbing servers. I, too, thought that was a good idea in the beginning, but experience has shown that there are serious pitfalls to this approach. Read the post of at Cloudflare's blog: N o Scrubs: The Architecture That Made Unmetered Mitigation Possible

Should You Buy A UniFi Dream Machine, USG, USG Pro, or Dream Machine Pro?