NETGEAR DG834N Network Router User Manual


 
DG834N RangeMax NEXT Wireless ADSL2+ Modem Router Reference Manual
2-2 Configuring Your Wireless Network and Security Settings
v1.0, October 2008
Wireless Placement and Range Guidelines
The range of your wireless connection can vary significantly based on the physical placement of
the modem router. The latency, data throughput performance, and notebook power consumption of
wireless adapters also vary depending on your configuration choices.
For best results, place your modem router according to the following guidelines:
Near the center of the area in which your PCs will operate.
In an elevated location such as a high shelf where the wirelessly connected PCs have
line-of-sight access (even if through walls).
Away from sources of interference, such as PCs, microwave ovens, and 2.4 GHz cordless
phones.
Away from large metal surfaces.
Put the antenna in a vertical position to provide the best side-to-side coverage. Put the antenna
in a horizontal position to provide the best up-and-down coverage.
If using multiple access points, it is better if adjacent access points use different radio
frequency channels to reduce interference. The recommended channel spacing between
adjacent access points is 5 channels (for example, use Channels 1 and 6, or 6 and 11).
The time it takes to establish a wireless connection can vary depending on both your security
settings and placement. WEP connections can take slightly longer to establish. Also, WEP
encryption can consume more battery power on a notebook computer.
Wireless Security Options
Indoors, computers can connect over 802.11g wireless networks at a maximum range of up to
300 feet. Such distances can allow for others outside your immediate area to access your network.
Unlike wired network data, your wireless data transmissions can extend beyond your walls and
can be received by anyone with a compatible adapter. For this reason, use the security features of
your wireless equipment. The modem router provides highly effective security features, which are
covered in detail in this chapter. Deploy the security features appropriate to your needs