Solved

How to monitor if Access Points are running - Monitor health of network

Posted on 2011-02-24
8
376 Views
Last Modified: 2013-11-09
I would like to add multiple access points to a private network.  I am not trying to hop from one point to another but thinking that I want to create a mesh type network so people can move around and have wide coverage.  We will have cat6 ethernet cables ran to each location and the signals should be overlapping each other.  We will have about 8-10 access points and I would like to remotely monitor the heath of the network and that all of the AP are up and running.  Better yet, it would be great to be notified if there is a problem.  I was thinking about using Open-Mesh.   Does this sound like a good approach or heading the wrong direction.  Suggestions.  
0
Comment
Question by:MrGD
  • 5
8 Comments
 
LVL 9

Expert Comment

by:rawinnlnx9
Comment Utility
Almost all such devices implement SNMP. You could use this to monitor everything.

http://en.wikipedia.org/wiki/Simple_Network_Management_Protocol
0
 
LVL 24

Assisted Solution

by:rfc1180
rfc1180 earned 100 total points
Comment Utility
> I am not trying to hop from one point to another but thinking that I want to create a mesh type network so people can move around and have wide coverage.

Then you do not need a mesh network

The idea is to ensure that your AP cell coverage is adequate for roaming

At the edge of each AP signal cell, the received signal strength measurement should be -67 dBm.

 Cell Overlap
Each cell in the network should overlap with the adjacent cells in order to facilitate uninterrupted handoff (Roaming) as a client moves between cells and to provide a minimum service even in case of access point failure.

As far as monitoring, setup a VPN into the site and utilize Nagios with Cacti for monitoring of the devices with the possibility of also using SNMP traps (Notifying you of an issue).

Billy
0
 

Author Comment

by:MrGD
Comment Utility
Billy.  Would I have to have a workstation or server running at all times to utilize the monitoring recommendation?
0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 

Author Comment

by:MrGD
Comment Utility
I have ordered routers from Open-Mesh for evaluation.  Simple to set-up and add to monitoring software.  Certainly recommended for someone who wants a quick solution.  Since I will be monitoring multiple access points at different locations.  This seemed to be a good solution for a quick implementation.  I will look into SMTP monitoring and give feedback if this question is not deleted.
0
 

Author Comment

by:MrGD
Comment Utility
Had to wait for an order and testing.
0
 

Accepted Solution

by:
MrGD earned 0 total points
Comment Utility
Open-Mesh has proven to be a cost effective approach for the features that I was after.  Although I believe some of the other suggestions would be a better enterprise approach,  it requires far more set-up and costs compared to open-mesh.  

Setting up two access points took less than a half hour and full coverage of a two story home with notification hourly of any outages.  Again, sufficient for residential or non critical areas.
0
 

Author Closing Comment

by:MrGD
Comment Utility
I am awarding some points to rfc1180 because although not a good solution for this application, there was some good information conveyed.
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Let’s list some of the technologies that enable smooth teleworking. 
Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now