Skip to main content

20 Myths of Wi-Fi Interference (Cisco)

Read the full list here.

  • Myth #1: "The only interference problems are from other 802.11 networks."
  • Myth #2: "My network seems to be working, so interference must not be a problem." 
  • Myth #3: "I did an RF sweep before deployment. So I found all the interference sources."
  • Myth #4: "My infrastructure equipment automatically detects interference."
  • Myth #5: "I can overcome interference by having a high density of access points."
  • Myth #6: "I can analyze interference problems with my packet sniffer." 
  • Myth #7: "I have a wireless policy that doesn't allow interfering devices into the premises."
  • Myth #8: "There is no interference at 5 GHz."
  • Myth #9: "I'll hire a consultant to solve any interference problems I run into."
  • Myth #10: "I give up. RF is impossible to understand."
  • Myth #11: "Wi-Fi interference doesn't happen very often."
  • Myth #12: "I should look for interference only after ruling out other problem sources."
  • Myth #13: "There's nothing I can do about interference if I find it."
  • Myth #14: "There are just a few easy-to-find devices that can interfere with my Wi-Fi."
  • Myth #15: "When interference occurs, the impact on data is typically minor."
  • Myth #16 "Voice data rates are low, so the impact of interference on voice over Wi-Fi should be minimal." 
  • Myth #17: "Interference is a performance problem, but not a security risk."
  • Myth #18: "802.11n and antenna systems will work around any interference issues."
  • Myth #19: "My site survey tool can be used to find interference problems."
  • Myth #20: "RF analysis tools are too bulky and too expensive."

Comments

Popular posts from this blog

LDWin: Link Discovery for Windows

LDWin supports the following methods of link discovery: CDP - Cisco Discovery Protocol LLDP - Link Layer Discovery Protocol Download LDWin from here.

easywall - Web interface for easy use of the IPTables firewall on Linux systems written in Python3.

Firewalls are becoming increasingly important in today’s world. Hackers and automated scripts are constantly trying to invade your system and use it for Bitcoin mining, botnets or other things. To prevent these attacks, you can use a firewall on your system. IPTables is the strongest firewall in Linux because it can filter packets in the kernel before they reach the application. Using IPTables is not very easy for Linux beginners. We have created easywall - the simple IPTables web interface . The focus of the software is on easy installation and use. Access this neat software over on github: easywall

STG (SNMP Traffic Grapher)

This freeware utility allows monitoring of supporting SNMPv1 and SNMPv2c devices including Cisco. Intended as fast aid for network administrators who need prompt access to current information about state of network equipment. Access STG here (original site) or alternatively here .