
188
Chapter 10: RF Management
AirMagnet Laptop Wireless LAN Policy Reference Guide
Mobile
detects 5 APs operating in channel 1, 2, 3, 4, 5, and 6
individually, it would generate this alarm to indicate these APs all
interfere with each other and exceeded the default threshold of 3 APs
with overlapping frequency usage. Most experts advise the use of
channels 1, 6 and 11, while some recommend the use of only channels
1 and 11. The user can use the AirMagnet Infrastructure view to
further investigate current channel usage and take counter measures.
See illustration below.
Figure 10-13: AirMagnet Infrastructure View (List by Channel) showing
channel allocation
Non-802.11 Interfering Source Detected
Currently, WLAN system administrators lack sufficient awareness of
the RF environment in which their APs and stations operate; present-
day WLAN technologies are only aware of other network elements.
They have no way to discover other nearby sources emitting RF in
the unlicensed bands. Because WLANs operate in the unregulated 2.4
and 5 GHz frequency bands, they are subject to interference from
other devices operating in this same frequency spectrum. These
include microwave ovens, cordless phones and headsets, wireless
surveillance cameras, garage door openers, Bluetooth technology,
and other devices. There can also be co-channel interference due to
neighboring WLANs. These competing devices can degrade 802.11
network performance, resulting in unacceptably slow data rates and
excess packet re-transmissions. These technologies are aware of
network devices and can determine if there is excess load on the
Laptop Wireless LAN Policy Reference Guide.book Page 188 Thursday, January 25, 2007 5:36 PM
Содержание PRG-Laptop 7.0
Страница 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 30: ...22 Chapter 1 Configuration Vulnerabilities AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 136: ...128 Chapter 5 Authentication and Encryption AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...