Designing a Wi-Fi Network

Phil Morgan • February 27, 2025

Designing a Wi-Fi Network


This is the first in a series of blogs on Wi-Fi operation, design, and troubleshooting.


Designing a Wi-Fi network is much easier if you have the right procedures and tools in place.


First you must collect data about the network:

  • What are the requirements of the network?
  • What is the goal of the new network?
  • What is it meant to achieve?
  • Are there any constraints you have to overcome?

Next you have to decide what wireless vendor is being used? One of the most important things to get is an accurate map (or plan) of the site and the various floors. 

Now you need to validate the map(s), and confirm the accuracy. This usually involves a site visit. During your site visit, you may take measurement to test the walls, to see what they are made of, and check their dB loss for use in your model.


Your goal now, is to build a model, to simulate the environment, so you can see how signal propagates, and how the network will perform.


Next you test and validate the model, and plan AP positions. 


To collect accurate data, and build an accurate model, the right tools are necessary. Ekahau provides a suite of tools that are invaluable for Wi-Fi network design:

  • Ekahau AI Pro
  • Ekahau Connect subscription
  • Ekahau Sidekick 2 (hardware)

When used together, these give you the ultimate toolset for designing Wi-Fi networks!


These packages include tools that run on local PC's, or mobile devices for easy data collection. They include cloud systems for advanced 3D simulation and modeling, along with advanced optimization and insights. They also include packet capture tools for analysis and troubleshooting. 

You can easily use these tools to design a network model simulating the operation of your proposed network. They are so powerful, you can even capture data from your current network, build a model, and simulate how newer APs will operate. 


One of the most amazing features is that you can capture a 2.4 and 5GHz Wi-Fi 5 or 6 network today, with your current AP equipment, and build a model, that can be leveraged to show how a brand new set of 6GHz Wi-Fi 7 APs will perform in a new network design! This is truly amazing!


Once you have designed your network model, you can order the equipment and create an installation plan.


Now you simply install the network, power it on, and then validate its operation again with the same tools, making fine tweaks and adjustments if necessary.


Then, as if by magic, “hey presto”, you have a wonderful Wi-Fi network that just works great!

Ekahau also provides award winning training that teaches you how to use these tools, and move from Wi-Fi novice to expert in easy-to-digest steps!


To learn about NC-Expert Consulting Services, to help you design and manage Wi-Fi networks, click here 


To learn more about Ekahau, or get a Demo, click here: https://wifi.ekahau.com/demo-phil/ 


See you next time!

===


#General #Ekahau #NetworkDesign #WiFi


===

About NC-Expert

NC-Expert is a privately-held California corporation and is well established within the Wireless, Security, and Collaboration industry certification training, courseware development, and consulting markets.

NC-Expert has won numerous private contracts with Fortune level companies around the world. These customers have depended on NC-Expert to train, advise, and mentor their staff.

So remember, if you are looking for the best IT training just call us at (855) 941-2121 or contact us

NC-Expert Blog

By Rie Vainstein March 31, 2025
A Digital Shield for Your Online Adventures As tech professionals, we often spend a good chunk of our lives navigating the digital realm. Whether you’re troubleshooting a network, coding a new app, or just binge-watching the latest series, one thing is clear: your connection to the internet is a double-edged sword. It’s both incredibly convenient and, if not properly secured, a potential vulnerability. Enter the VPN (Virtual Private Network) our trusty, digital bodyguard. If you’re not already using one, or if you’re not entirely sure why you should, let’s walk through some of the reasons why a VPN is essential for anyone working in IT and, frankly, for anyone who uses the internet. What Is a VPN? In simple terms, a VPN creates a secure, encrypted tunnel between your device and the internet. It allows your data to travel securely, masking your IP address, and ensuring that no one (be it hackers or nosy advertisers) can track or intercept your online activity. Think of it as your personal “cloak of invisibility” in the digital world! 
By Phil Morgan March 13, 2025
Troubleshooting Wireless Networks with Ekahau: A Professional Engineer’s Guide Wireless networks have become the backbone of modern business infrastructure. From office environments to large-scale enterprises, ensuring a seamless wireless experience is essential for productivity. However, despite advancements in Wi-Fi technology, network performance issues often arise, ranging from signal interference and dead zones to capacity overloads and channel mismanagement. To tackle these issues efficiently, professional engineers rely on powerful tools. One such tool, Ekahau AI Pro, has become a gold standard in the wireless industry for troubleshooting and optimizing Wi-Fi networks. This blog delves into troubleshooting wireless networks using Ekahau tools, providing practical examples and technical insights to guide professional engineers in improving network performance.
By Rie Vainstein March 3, 2025
Futureproofing Our Security In our increasingly connected world, the security of digital information has never been more critical. From banking transactions to private communications, our data is constantly transmitted and stored across the internet. The current systems that protect this data rely on cryptography, a branch of mathematics that helps keep information secure by encoding it in ways that are difficult to decode without the proper key. However, with the rise of quantum computers, traditional cryptography is facing new and significant threats. This is where Post-Quantum Cryptography comes into play. What is Post-Quantum Cryptography? Post-Quantum Cryptography (PQC) [1] refers to cryptographic algorithms that are specifically designed to be secure against the power of quantum computers. Quantum computers, once they become practical, will be capable of solving complex mathematical problems much faster than classical computers. This will render many of the encryption methods we rely on today [such as RSA (Rivest, Shamir, and Adleman – initials of the inventors) and ECC (Elliptic Curve Cryptography)] vulnerable to attack. Quantum computers operate on quantum bits, or “qubits”, which can exist in multiple states simultaneously, unlike classical bits that are either a zer (0) or one (1). This allows quantum computers to perform certain calculations exponentially faster than classical computers. For example, in a matter of seconds, a quantum computer could potentially break an RSA key, which is considered secure by today’s standards. As quantum computing technology advances, the need for PQC becomes even more urgent.