List and describe three RF site tuning settings.
What will be an ideal response?
Adjust radio power levels on all access points-Because firmware upgrades may increase the RF coverage areas, it may be necessary to readdress the power settings on all APs.
Adjust channel settings-It may be necessary to restore the channel settings to their original configuration. Once the original channel plan is restored, channels may be adjusted based on adjacent channels, cellular overlap, and adjusted radio power settings.
Validate coverage area-As a part of the RF site tuning, it is important to re-determine the perimeter of each AP's RF coverage area. Each AP should be measured independently of all other access points and then the overall coverage of the WLAN should be measured. During this process additional configuration adjustments may be required on different access points.
Modify integrity and throughput-Once the RF coverage cells have been determined,
throughput rates and proper cellular overlap may need to be determined and adjusted.
Document changes-Any changes should be clearly documented. The edited entries should include channel selection, power settings, firmware version, and modulation corrections. Additionally, maps should be created that offer a visual representation of the RF coverage cells and AP placement.
You might also like to view...
What can be a problem with the Help screen?
A) The search function within Word Help is not concise enough. B) Since Help screens were written prior to finalization, they are not always accurate. C) Word Help assumes that the user is not at all familiar with Word. D) Many of the Help screens do not include applications or instructions.
Explain MAC address filtering.
What will be an ideal response?
Which of the following ways to create a loop can only be used with PHP arrays or objects?
a. the while loop b. the do...while loop c. the for loop d. the foreach loop
Internet Explorer's ________ feature enables you to open multiple websites and then switch among them
A) Protected mode B) InPrivate Browsing C) Tabbed browsing D) Windows Defender