Specifications
One of the big advantages with Meru is that once we have identified the channels that have
interference we can configure the Meru APs to be on different channels.
Evaluate Current Wireless Environment
This step involves leaning about the existing WLAN (if there is one). Will the new Meru
network coexist at anytime, anywhere with the existing network?
Establish Application Requirements
Not all applications come with the same set of throughput, latency, loss and jitter
requirements. It is important that we discover the details (e.g. application names, versions,
manufacturers, transport protocols, bandwidth and latency requirements, VoIP signaling
protocols used, ports used, etc.)
We’ll need to ask if multicast is required. Meru has some advantages over other vendors that
allow us to support multicast streaming video. However, a network configured to support
multicast video will be architected a specific way as far as VLANS and ESSs are concerned.
Knowing about this requirement up front is imperative to a successful deployment that
supports multicast.
Wi-Fi Clients
This task involves documenting the various types of clients that will use the WLAN. For
controlled environments this task is straight forward but for some environments where any
number of client types may be used (e.g. higher education) this task can be daunting.
Nevertheless it is always helpful to start with a list of known clients. This will help us build
our Proof of Concept and our Acceptance Test Plans.
Establish Availability Requirements
These requirements will vary from one type of installation to another. For example, hospitals
typically mandate system availability approaching 99.999% uptime, whereas universities are
typically satisfied with less demanding uptime requirements.
The availability requirements will influence the WLAN design so knowing them upfront is key
to a successful deployment. Again, remember to query all stake holders!
Define Security Requirements
This is where we ferret out all of the security policies and requirements. Make sure a dialog is
established with the team responsible for all things security related. Before getting into the
specifics about how the WLAN will be configured we should start by getting a solid
understanding of the security policies and philosophy of the organization.
BPG_11n_v1.0 | Page 8
MERU BEST PRACTICES GUIDE | 11n Design, Implementation and Optimization