AccessAgility Blog

Generic Speed Testing

[fa icon="calendar'] Jan 4, 2019 11:48:13 AM / by Blog Team posted in WiFi

[fa icon="comment"] 0 Comments

Whether building a new network or upgrading one, generic speed testing is a must. It is important to have testing controls to create baselines so that true and expected speeds can be properly evaluated.  Use proper software for this testing, such as iPerf or WiFiPerf / WiFiPerf Professional as well as something like fast.com to tests internet speeds from different servers around the world.

Let's start with some definitions. 

Read More [fa icon="long-arrow-right"]

WiFi Antenna Types

[fa icon="calendar'] Dec 7, 2018 11:15:04 AM / by Blog Team posted in WiFi

[fa icon="comment"] 0 Comments

Several varying types of antennas exist for WiFi, each with a specific purpose for how and when they should be used. Different types of antennas can be found anywhere from small office settings to outdoor camping grounds. While there are many types of antennas, all of them have the same purpose: producing radio waves to send information through the air. The three main antenna types are omnidirectional, semi-directional, and highly directional.

Read More [fa icon="long-arrow-right"]

Measuring Client WiFi Health

[fa icon="calendar'] Dec 3, 2018 4:05:27 PM / by Blog Team posted in WiFi

[fa icon="comment"] 0 Comments

Clients that use WiFi can experience a number of issues that can affect the speed and performance of a wireless network. Below, we have listed out a variety of simple tests that give users a basic look at client health. While additional tests may be needed to fully troubleshoot an issue, the following tests are a great starting point.

 

Read More [fa icon="long-arrow-right"]

Captive Portal Benefits

[fa icon="calendar'] Nov 30, 2018 9:50:05 AM / by Blog Team posted in WiFi

[fa icon="comment"] 0 Comments

A captive portal is a web page that a user is prompted with when connecting to a public access WiFi network. The captive portal states the terms, agreements, and acceptable usage policy for the user and then permits usage of the guest network upon the user’s acceptance of the policies. There are a handful of benefits that come with using a captive portal, including the ability to separate network traffic, limit data usage, collect valuable data, marketing and business recognition, and liability protection. With all of these benefits, there is very little reason to not have a captive portal as the gateway to your guest network.

Read More [fa icon="long-arrow-right"]

The Benefits of Subnetting

[fa icon="calendar'] Nov 16, 2018 3:21:03 PM / by Blog Team posted in WiFi

[fa icon="comment"] 0 Comments

What is subnetting, what is it used for, and why is it important?

Subnetting is the practice of dividing up a network into two or more networks. Common advantages of subnetting include enhancing routing efficiency, network management control, and improving network security. While these are just a few of the benefits that subnetting provides, they are the most noticeable after immediately implementing a subnet system.

Read More [fa icon="long-arrow-right"]

WiFi 6, WiFi 5, WiFi 4: New Generational WiFi Names from the WiFi Alliance

[fa icon="calendar'] Oct 19, 2018 12:52:12 PM / by Blog Team posted in WiFi

[fa icon="comment"] 0 Comments

WiFi Alliance is a non-profit organization that promotes WiFi technology and certifies WiFi products for conformity to certain standards of interoperability. While the WiFi Alliance owns the WiFi trademark, manufacturers may use the trademark to brand certified products that have been tested for interoperability.

Read More [fa icon="long-arrow-right"]

Cabling and Pathways: Best Practices for an Office Setting

[fa icon="calendar'] Oct 5, 2018 10:11:16 AM / by Blog Team posted in WiFi

[fa icon="comment"] 0 Comments

There are wires in wireless networks? Yes, and probably more than you think. For an office’s wireless setup, there are wires and cables that need to be run throughout the entire office. In this post, we will be talking about the basics that are required in order to prepare and execute the pathways and cabling in an office setting.

Read More [fa icon="long-arrow-right"]

Access Point Hanging Techniques

[fa icon="calendar'] Sep 28, 2018 10:44:12 AM / by Blog Team posted in WiFi

[fa icon="comment"] 0 Comments

Where and how an access point (AP) is hung is a simple process that requires planning and logical decision making based on a handful of factors, including the surface material, the mounting type of the access point, and the neighboring entities. Using a combination of proper mounting equipment and precise placement allows for an access point to perform to the best of its ability.

Read More [fa icon="long-arrow-right"]

Understanding Intrusion Detection and Prevention Systems

[fa icon="calendar'] Sep 21, 2018 10:07:01 AM / by Blog Team posted in WiFi

[fa icon="comment"] 0 Comments

An intrusion detection system (IDS) monitors network devices in order to grant security administrators the ability to identify attacks in progress and take appropriate action to protect a network. In order for users on a network to access a web server on the internet, the firewall must allow traffic through port 80. However, this open port is often used as an attack vector for hackers and malware to gain access to your network. An IDS examines this traffic and compares it with known exploits; similar to how antivirus software uses known virus signatures to identify threats. When the intrusion system detects a match to a known exploit, it sends an alert to the security or web server administrator so they can take action. Intrusion prevention systems (IPS) are very similar to IDSs, but as opposed to just sending an alert, these systems go one step further and automatically take action to prevent an intrusion.

Read More [fa icon="long-arrow-right"]

Social Engineering: Educating Users on How to Strengthen Networks

[fa icon="calendar'] Sep 14, 2018 1:39:48 PM / by Blog Team posted in WiFi

[fa icon="comment"] 0 Comments

“If it is online, it can be hacked!” This phrase has served as the motivation for both hackers and security professionals for years. Every network has its weaknesses and vulnerabilities that hackers can exploit to gain access to your network. The only way to completely avoid a potential attacker is to pull the network cable. However, depending on the circumstances, doing this could actually create the exact denial of service result the attacker intended.

Read More [fa icon="long-arrow-right"]

Subscribe to Email Updates

DOWNLOAD TRIAL Windows WiFi Scanner