- IT Support
- IT Security & Data Protection
- IT Services
- Voice & Cable
- About Us
Using our fully certified WiFi testing software we will attend your site and complete a full WiFi survey. Testing for signal strength, data rate, channel overlaps, sources of interference and much more!
The survey data allows our skilled engineers to identify both strengths and weaknesses in your current provision. You will receive a full survey report showing the access points and current coverage.
Armed with a mass of data we will determine the best locations for access points to balance internet speeds with minimal interference. We will design a complete and secure Wifi solution to satisfy your needs for today as well as future requirements.
All of our Wifi installations and enhancements are covered by the latest security encryption protocols, thus ensuring security compliance and providing you with total peace of mind.
Heat Maps of the coverage in both 2.4Ghz and 5Ghz
Everything about the physical environment is critical when designing a wireless network, and it’s the first place we’ll start.
What materials were used to construct the building or buildings you are planning to have Wi-Fi in? Is it reinforced concrete, stud construction, cinder blocks, brick, plaster, drywall, in rare cases you may even have steel construction or lead-lined walls? Building materials have different impacts on RF signal crucial and will impact the overall performance of your network design.
We will refer to the building size, layout and identify the most important areas for high density coverage along with potential sources of interference.
Along with devices it is equally important to understand what kinds of applications your network will be supporting;
You may only use business applications or communications such as VoIP or skype or you may offer streaming options such as YouTube or Spotify.
Each application impacts the performance of your network differently and requires different network resources to operate properly.
Many of today’s wireless networks need to be designed to allow access to both business and personal devices without compromising security.
Who will access your network? We need to know if access will be granted to just company owned devices, known end-users using their own device or guests (unknown users) – of course you may need to allow access to all three.
With this information in hand we can plan and address who is accessing your network and how and allow you to stay in control of where these guests can go and what they can do on your network.