Wi-Fi has become the primary network access method, and today you work as much from your laptop as from your phone or tablet. But how does your iPhone see your Wi-Fi network? How does it choose between Wi-Fi and cellular connections? How do random MAC address implementations affect their behaviour? How should you design your Wi-Fi network to optimally support phones and tablets, and help them roam between cells without disconnections? This session will answer these questions, and give you a view on how iPhones, iPads and the main Android brands implement Wi-Fi efficiency.
Getting connected: how does your phone discover and see your Wi-Fi (probing, AP selection behaviour, and thresholds)
Location Based Services (random MAC address and location issues)
Wireless communications in an organisation are business and sometimes mission critical. Because of the exponential growth of Wi-Fi connections and ever increasing cyber security threats, it is important to better understand the security risks.
Wi-Fi security risks and the way to address them
Planning for Wi-Fi security in an organisation
Optimising roaming (cell positions and overlaps)
Improving your career in W-Fi security by following vendor neutral professional wireless trainings
This webinar will explore the fundamentals of protocol analysis, namely, why and when to use a protocol analyser and the benefits of doing so. In addition, we will walk through a basic troubleshooting methodology to aid problem identification. This topic will be addressed through exploring different options for capturing wireless frames and discussing different capture locations. We will also see how to correctly interpret a wireless protocol trace file including some of the common pitfalls.
When a random disconnect of some of the Councils business-critical cloud applications began affecting productivity for dozens of users every day, they knew they would need to do some detective work to find the issue.