Solved

bridging Wireless Access point

Posted on 2011-09-28
5
391 Views
Last Modified: 2013-12-21
Hi EE,

I have a project to install wifi in serveral sites for a client. Bascially each site will have between 6 and 10 wifi APs. What i would like to know is how do i setup the APs so that when moving from one side of the building to another. a laptop is handed off from one AP to the next to maintain its wifi signal. These are healthcare facilities so for example a doctor or nurse would move from room to room with a tablet checking up on patients, but still have stable wifi as long as they are in range of an AP

Any ideas on how to setup such and environment, or even what hardware i should consider purchasing would be great!

Thanks
0
Comment
Question by:Sanga Collins
  • 2
  • 2
5 Comments
 
LVL 21

Expert Comment

by:Rick_O_Shay
ID: 36814341
This is normal wireless roaming so just make sure the AP's you get can handle roaming of clients amongst themselves.
0
 
LVL 44

Accepted Solution

by:
Darr247 earned 500 total points
ID: 36819000
Every installation is likely to pose its own unique unforeseen problems, which is why there are so many different types of routers/APs made, and not really any one-size-fits-all installation guides.

An actual physical site survey should be done, including temporary installations of a few APs to ensure they're going to provide good signal and bandwidth from the contemplated locations and channels. Possibly you won't need as many APs for adequate coverage, as you're planning to use; possibly, the 3 non-overlapping channels in the 2.4GHz ISM band are already heavily used (or overlapped by networks setup by the uninformed) in that area and you'll need to supplement with 5GHz equipment. et cetera

If you're using a windows RADIUS server and AD credentials for authentication, in its wireless profile[s] you can select the Enable Pairwise Master Key (PMK) Caching option under Fast Roaming, then the clients should get nearly seamless roaming between APs.
Otherwise, when using strictly WPA2 for authentication AND encryption (certainly, no lower level of encryption should be allowed when you're talking about medical records), there can be a noticable lack of connectivity (like, up to 30 seconds or so) when switching between APs, but generally the only time it will be noticed is when the laptops are mounted on rolling carts and new pages/saves/refreshes are attempted right after a roaming change occurs; If they're carried between rooms on battery power then setup on a stand and plugged in upon arrival, usually any lack of connectivity right after a roaming switch is made should be unnoticable.

For hardware recommendations, there are many brands and models that will do what you want... still, the saying, "nobody was ever fired for buying Cisco" isn't about the stock listed on NASDAQ. Next (in my opinion) would be the D-Link Business WLAN series, then Linksys, Buffalo and Ruckus.

(I'm not sure why this is in the Intrusion Detection Systems zone, since very-few routers or APs include any kind of IDS built-in.)
0
 
LVL 18

Author Closing Comment

by:Sanga Collins
ID: 36893257
What a great answer. Without getting into the specific details you have given me an excellent overview of how to proceed. I have even placed orders for the Dlink DWL3000 series of APs. Thanks for the great assist.
0
 
LVL 44

Expert Comment

by:Darr247
ID: 36895698
Definitely install and check out the the AP Manager II software that should be included on the CDs that come with those D-Link units. It should make setup and maintenance of multiple units much easier.
0
 
LVL 18

Author Comment

by:Sanga Collins
ID: 36897040
I am testing the AP manager right now. from looking at the documentation i can tell it will be quite useful. Having a few problems with psotgreSQL on my windows 7 test machine, but im pretty sure once i work out the kinks i can roll out the software to the management servers at each of my remote sites.

Thanks!
0

Featured Post

Gigs: Get Your Project Delivered by an Expert

Select from freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
As technology users and professionals, we’re always learning. Our universal interest in advancing our knowledge of the trade is unmatched by most industries. It’s a curiosity that makes sense, given the climate of change. Within that, there lies a…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question