Netgear 10300137 Manuel D’Utilisation

Page de 85
  Chapter 2:  Wireless Network Configuration
 
   
|
     
17
Mobile Broadband 11n Wireless Router MBR1000 
Wireless Placement and Range Guidelines
The range of your wireless connection can vary significantly based on the physical placement 
of the router. The latency, data throughput performance, and notebook power consumption of 
wireless adapters also vary depending on your configuration choices.
For best results, place your router according to the following guidelines:
•     
Near the center of the area in which your PCs will operate.
•     
In an elevated location such as a high shelf where the wirelessly connected PCs have 
line-of-sight access (even if through walls).
•     
Away from sources of interference, such as PCs, microwave ovens, and 2.4 GHz 
cordless phones.
•     
Away from large metal surfaces.
•     
Put the antenna in a vertical position to provide the best side-to-side coverage. Put the 
antenna in a horizontal position to provide the best up-and-down coverage. 
•     
If using multiple access points, it is better if adjacent access points use different radio 
frequency channels to reduce interference. The recommended channel spacing between 
adjacent access points is 5 channels (for example, use Channels 1 and 6, or 6 and 11).
The time it takes to establish a wireless connection can vary depending on both your security 
settings and placement. WEP connections can take slightly longer to establish. Also, WEP 
encryption can consume more battery power on a notebook computer.
Wireless Security Options
Indoors, computers can connect over 802.11g wireless networks at a maximum range of up 
to 300 feet. Such distances can allow for others outside your immediate area to access your 
network.
Unlike wired network data, your wireless data transmissions can extend beyond your walls 
and can be received by anyone with a compatible adapter. For this reason, use the security 
features of your wireless equipment. The Mobile Broadband 11n Wireless Router provides 
highly effective security features which are covered in detail in this chapter. Deploy the 
security features appropriate to your needs.