Pepper Tech
  • Home

  • Blog

  • About

  • More

    Use tab to navigate through the menu items.

    peppertechnc@gmail.com

    919.928.1048

    • twitter
    APoS

    APoS

    Getting Started with Aruba Wireless

    Getting Started with Aruba Wireless

    Gathering Wall Attenuation Values for a Predictive Model

    Gathering Wall Attenuation Values for a Predictive Model

    Archive

    • October 2020
    • September 2020
    • August 2020
    • January 2020
    • December 2019
    • October 2019
    • February 2018
    • January 2018

    Tags

    • 2.4
    • 802.11
    • arbitration
    • channel
    • EDCA
    • spectrum
    • Wireless

    Recent Posts

    APoS

    APoS

    So you have been asked to design for this: A predictive model won't even get you close here. The environment is too complex. You need...
    Getting Started with Aruba Wireless

    Getting Started with Aruba Wireless

    Let's start by talking about the hardware which comprises an Aruba wireless enterprise infrastructure. Although components can be...
    Gathering Wall Attenuation Values for a Predictive Model

    Gathering Wall Attenuation Values for a Predictive Model

    For a predictive model to be valuable, attenuation values for objects in the environment such as walls must be obtained. The tools needed...
    Accredited Wireless Adjuster Training:  How to troubleshoot about 80% of wireless with tools that co

    Accredited Wireless Adjuster Training: How to troubleshoot about 80% of wireless with tools that co

    The Wireless Adjuster course, from wireless industry veteran, Devin Akin, is described as training that teaches “WLAN best practice...
    The 802.11 State Machine: Joining Your Friends

    The 802.11 State Machine: Joining Your Friends

    A station will search for a BSS to join by either active, passive scanning or both. In passive scanning a STA listens to Beacons and...
    Wireless Roaming Part 2 - PMK Caching and Preauthentication

    Wireless Roaming Part 2 - PMK Caching and Preauthentication

    Two methods of secure roaming were introduced in 802.11i-2004: PMK Caching and Preauthentication. PMK caching is a method of roaming...
    Wireless Roaming Part 1

    Wireless Roaming Part 1

    The simplest form of roaming is reassociation. The client always makes the decision to roam based on proprietary criteria that are most...
    802.11 Arbitration Part 2: Getting your marbles in the right bucket

    802.11 Arbitration Part 2: Getting your marbles in the right bucket

    Part Two: EDCA How is it different than DCF? Wireless is a shared medium. The fundamental method for sharing this medium is DCF,...
    802.11 Arbitration: I could have been a contender.

    802.11 Arbitration: I could have been a contender.

    Part One: DCF Wireless is a shared medium. The fundamental method for sharing this medium is DCF, Distributed Coordination Function. ...
    Mind Your Channels: The not so polite world of wireless in 2.4 gHz

    Mind Your Channels: The not so polite world of wireless in 2.4 gHz

    Since the introduction of 802.11g each channel in the 2.4 GHz spectrum is 20 MHz wide. Therefore, in the US it is recommend to use...
     
    • twitter

    peppertechnc@gmail.com

    919.928.1048

    Durham, NC 27705

    ©2017 BY PEPPER TECH