We provide a stable wireless network using wireless data collection.
A stable wireless network is the backbone of a data collection system. Tecsys offers advice and equipment for setting up a wireless network.
The network will ensure radio coverage wherever handheld terminals and PCs are used. At the same time, the network needs to stay connected when users are moving around, for example driving a forklift.
Testing wireless networks
Tecsys performs site surveys (radio coverage measurements) so that the final result provides coverage in the desired areas and with the required bandwidth.
You can have a new wireless network set up or troubleshoot your existing wireless network. The network is documented so that maintenance and extensions are facilitated considerably.
We also advise and assist in optimising the security of wireless networks.
is ready to help you.
Wireless network equipment
Wireless switches are centrally controlled wireless networks with simpler distributed access ports (antennas). The systems support current standards and are easy to upgrade to future standards and security protocols. Future-proof your wireless installation and investment.
Access points integrate seamlessly into existing networks or can be used to build entire wireless networks. All products support IEEE 802.11a/b/g technologies.
The site survey includes a radio noise analysis to ensure that alarm systems, gates and other wireless systems will not interfere with the future network. Then, the position of each access point is optimised until an optimal number of access points covers the desired area.
No network is 100% secure. But the better you secure your network, the harder it is for unauthorised people to gain access. By following some simple advice, you can achieve a reasonable level of security.
Always use encryption
By using encryption, you minimise the risk that unauthorised people can access your network and your data. Use WPA or WPA2. This encryption is the best currently available. If this is not possible, you should use WEP encryption.
Turn off broadcast messages
However, with the right tools, hackers will still be able to find your network, but if you turn off broadcast messages, you may be able to reduce the likelihood of your network being targeted by hackers.
MAC address filtering
Computers and other network devices have a unique identification number called a MAC address. You can make it more difficult for unauthorised people to access your network by only allowing specifically specified MAC addresses to access the network.
Overall level of security
It is important to stress that the precautions are no guarantee that unauthorised persons will not gain access to your data and network. But you can minimise the risk and make it much harder for intruders to gain access.