Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Wireless for Beginners Part 3: Getting the Signal

Part 1 of this introduction to wireless outlines the basics of radio frequencies and waves. Part 2 explores the challenges of the half duplex properties of wireless networking and mechanisms for avoiding collisions that would disrupt traffic. The final installment addresses encoding algorithms and interference.

A wireless network has to transform data packets into waves to send them across the air. It does this by modulating the digital signals and then transmitting them by radio. The reverse happens when a wave is received; that is, it's transformed back into digital data. As part of that process, a signal is encoded before it's sent, and decoded at the other end.

More Insights

Webcasts

More >>

White Papers

More >>

Reports

More >>

Encoding algorithms, of which there are dozens, dictate the data rate a client gets. In other words, the speed of a wireless connection is governed by the encoding algorithm being used. For any given client-AP connection, the cleaner the signal, the better the encoding and the higher the data rate. As a client moves farther from an AP, the signal strength is reduced because of attenuation. The encoding rate will change to compensate.

Encoding rates are negotiated between a client and an AP when the client attaches to that network. APs advertise their capabilities to clients, and the client decides which rate to choose. Wireless standards (802.11a/b/g/n) have a set of data rates that must be supported, as well as optional data rates that can be used if both the endpoint and the AP can agree. The client's choice of data rate is based on factors such as signal strength and the signal-to-noise ratio (SNR). The client also decides when to change the encoding rate, if necessary.

Calling Interference

In addition to encoding algorithms, radio signals can be adversely affected by a variety of factors, including obstacles blocking the radio frequency (RF), the distance from the AP to the client, a high degree of ambient RF noise (called the noise floor) and power mismatches, in which an AP with radio power that's too high may not detect a client that's farther away.

Another common hazard in wireless networking is RF interference. The frequencies we use in WLANs are part of the spectrum set aside by the FCC for general use (that is, without the need to get a license). This is a convenience for manufacturers, but it also means there are a multitude of devices operating in the same frequency bands, which may cause interference. The 2.4 GHz band is an especially crowded one. For the time being, 5 GHz is less crowded, and so a great option for avoiding interference.

Unintentional interference can come from all types of devices, including other wireless networks, rogue APs, neighbors' APs and chatty clients. Non-WLAN equipment can also cause interference; this equipment can include microwaves, wireless cameras, Bluetooth, cordless phones, municipal Wi-Fi on 802.11, and really anything wireless that may be in the ISM and U-NII bands.

It's also worth noting that interference can come from your own APs if they're not properly placed or configured. If you have a single AP with dual radios and use both radios in the same frequency, then the rear lobes of the signal often cause interference.


Related Reading


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

Network Computing: April 2013



TechWeb Careers