This curriculum spans the technical and operational rigor of a multi-workshop wireless deployment program, covering the same scope of tasks as an on-site advisory engagement for enterprise Wi-Fi rollout, from initial site assessment to ongoing maintenance.
Module 1: Site Survey and RF Environment Assessment
- Conducting passive and active site surveys using spectrum analyzers to identify existing Wi-Fi networks and non-Wi-Fi interference sources such as microwaves or Bluetooth devices.
- Determining optimal access point placement based on building materials, physical obstructions, and expected user density.
- Selecting appropriate survey tools (e.g., Ekahau, NetSpot, or inSSIDer) based on client environment complexity and budget constraints.
- Mapping channel utilization across 2.4 GHz and 5 GHz bands to avoid co-channel interference in dense deployments.
- Documenting signal-to-noise ratio (SNR) thresholds at various locations to ensure minimum connectivity standards are met.
- Adjusting transmit power settings on access points to balance coverage and capacity while minimizing overlap.
Module 2: Access Point Selection and Hardware Deployment
- Evaluating ceiling-mount versus wall-mount access points based on physical layout and coverage requirements.
- Verifying PoE (Power over Ethernet) compatibility between switches and access points, including IEEE 802.3af/at/bt standards.
- Planning cable runs and conduit placement for permanent installations, ensuring compliance with local fire and safety codes.
- Configuring standalone versus cloud-managed APs based on organizational IT staffing and remote management needs.
- Labeling and documenting each AP with location, MAC address, and VLAN assignment for operational tracking.
- Testing AP firmware versions pre-deployment to avoid known bugs or compatibility issues with existing infrastructure.
Module 3: Wireless Network Configuration and SSID Design
- Segmenting SSIDs by function (e.g., corporate, guest, IoT) and assigning appropriate VLANs for traffic isolation.
- Configuring band steering and dual-band broadcasting to encourage client devices to use 5 GHz where available.
- Setting appropriate beacon intervals and DTIM periods based on device types, especially for battery-powered clients.
- Disabling legacy 802.11b rates in high-density environments to improve airtime efficiency.
- Implementing multiple BSSIDs per AP when required for network segmentation without additional hardware.
- Adjusting RTS/CTS thresholds to mitigate hidden node issues in large or obstructed coverage areas.
Module 4: Authentication, Security, and Policy Enforcement
- Deploying WPA2-Enterprise with 802.1X/EAP-TLS instead of PSK in corporate environments to enable individual user accountability.
- Integrating wireless authentication with existing directory services (e.g., Active Directory via RADIUS) and validating certificate trust chains.
- Configuring captive portals for guest access with time-limited credentials and bandwidth throttling.
- Enabling management frame protection (802.11w) to prevent deauthentication attacks on client sessions.
- Disabling WPS due to known security vulnerabilities, even if requested by end users for convenience.
- Implementing MAC address filtering only as a supplemental control, not as a primary security measure.
Module 5: DHCP, DNS, and IP Addressing Integration
- Ensuring sufficient DHCP scope size and lease duration to support peak wireless client counts without exhaustion.
- Configuring DHCP option 43 and 60 to enable plug-and-play provisioning for vendor-specific access points.
- Validating DNS resolution from wireless clients, especially for internal resources and authentication servers.
- Implementing IP helper addresses on VLAN interfaces to forward DHCP requests to centralized servers.
- Reserving static IP addresses for critical APs and wireless controllers to simplify management and monitoring.
- Monitoring for rogue DHCP servers on the wireless network that could disrupt client connectivity.
Module 6: Wireless Performance Monitoring and Troubleshooting
- Using packet capture tools (e.g., Wireshark with wireless adapters) to diagnose retransmission and latency issues.
- Interpreting airtime utilization metrics to identify over-saturated channels or malfunctioning clients.
- Responding to user complaints by replicating issues with test devices and checking historical performance logs.
- Identifying sticky clients that fail to roam by analyzing signal thresholds and AP load balancing settings.
- Checking for asymmetric uplink/downlink performance caused by misconfigured QoS or bandwidth shaping.
- Validating roaming behavior across APs by walking test paths and monitoring 802.11r/k/v handoff events.
Module 7: Guest Network and BYOD Policy Implementation
- Isolating guest traffic at Layer 3 using dedicated VLANs and firewall rules to prevent access to internal resources.
- Configuring splash pages with acceptable use policies and integrating with social or email registration where required.
- Enforcing bandwidth limits per guest session to prevent network abuse and ensure fair usage.
- Implementing device registration workflows for BYOD, including certificate enrollment and MDM onboarding.
- Blocking high-risk application traffic (e.g., peer-to-peer, remote desktop) on guest and BYOD SSIDs via DPI or firewall policies.
- Setting session timeouts and re-authentication intervals for guest users to maintain security hygiene.
Module 8: Documentation, Change Control, and Ongoing Maintenance
- Maintaining up-to-date network diagrams that include AP locations, channel assignments, and VLAN mappings.
- Logging configuration changes to wireless infrastructure in a change management system with rollback plans.
- Scheduling regular firmware updates for APs and controllers, including testing in staging environments first.
- Conducting periodic site validation to reassess coverage after physical changes (e.g., new walls, furniture).
- Archiving survey data and performance baselines to support future troubleshooting and expansion.
- Coordinating with facilities and security teams when deploying APs in restricted or high-security areas.