We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Internet

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What is WLAN Monitoring?

Mary Elizabeth
By
Updated: May 17, 2024
Views: 2,781
Share

When speaking of computers, a network refers to connections between at least one computer and one peripheral device — that is, a peripheral device that is not directly connected to a port, but communicated through a wired or wireless connection. A Local Area Network (LAN) is a small, confined computer network, usually within a single building, and sometimes within a single room. It contrasts with a WAN, or Wide Area Network, which covers a much larger territory. A WLAN is a Wireless Local Area Network, and WLAN monitoring refers to keeping an eye on the network for the sake of management, on the one hand, and security, on the other hand.

WLAN monitoring for the sake of network management may include keeping track of coverage, usage, and performance. Coverage refers to the reach of the network. The standard systems are 2.4 GHz (GigaHertz) and 5 GHz, which is allowed in some countries, such as the United States, but not in others, such as China. In general, 5 GHz systems, having higher frequency, have less range than 2.4 GHz systems, and may not reach throughout a facility without engaging a number of Access Points (APs). It is important to be sure that the desired coverage is maintained, and WLAN monitoring helps achieve this.

Performance is another area of WLAN monitoring. The greater spectrum that 5 GHz systems have available means better performance. On the other hand, the signal of 2.4 GHz systems may suffer from RF (Radio Frequency) interference from other WLANs, microwaves, or cordless phones, so in both instances, WLAN monitoring may serve to pinpoint performance issues. Other performance areas that are often reviewed are Access Point overload, excessive numbers of retries, high noise levels, and implementation errors.

Usage comes into WLAN monitoring for the sake of capacity planning, as well as other reasons. Usage indicators may also point to or be evidence of intrusion. This can be the case when extraordinarily high bandwidth use or use of services that are out of the ordinary are detected. An even surer sign is traffic to points that are unmanned. Monitoring for intrusion has other facets as well, including watching for unauthorized users and making sure the key is secure. Intrusion monitoring includes regular security audits, surveillance, and tracking attack and break-in attempts.

Share
WiseGeek is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
Mary Elizabeth
By Mary Elizabeth
Passionate about reading, writing, and research, Mary Elizabeth is dedicated to correcting misinformation on the Internet. In addition to writing articles on art, literature, and music for WiseGeek, Mary works as a teacher, composer, and author who has written books, study guides, and teaching materials. Mary has also created music composition content for Sibelius Software. She earned her B.A. from University of Chicago's writing program and an M.A. from the University of Vermont.

Editors' Picks

Related Articles

Discussion Comments
Mary Elizabeth
Mary Elizabeth
Passionate about reading, writing, and research, Mary Elizabeth is dedicated to correcting misinformation on the...
Learn more
Share
https://www.wisegeek.net/what-is-wlan-monitoring.htm
Copy this link
WiseGeek, in your inbox

Our latest articles, guides, and more, delivered daily.

WiseGeek, in your inbox

Our latest articles, guides, and more, delivered daily.