Netgear WGX102 WGX102v2 Reference Manual - Page 43

Wireless Configuration and Security, Observing Performance, Placement, and Range Guidelines

Page 43 highlights

Chapter 5 Wireless Configuration and Security This chapter describes how to configure the wireless features of your Wireless Range Extender. In planning your wireless network, you should consider the level of security required. You should also select the physical placement of your wireless range extender in order to maximize the network speed. For further information on wireless networking, refer to Appendix C, "Wireless Networking Basics". Observing Performance, Placement, and Range Guidelines The operating distance or range of your wireless connection can vary significantly based on the physical placement of the wireless range extender. The latency, data throughput performance, and notebook power consumption of wireless adapters also vary depending on your configuration choices. Note: Failure to follow these guidelines can result in significant performance degradation or inability to wirelessly connect to the wireless range extender. For complete range/performance specifications, please see Appendix A, "Technical Specifications". For best results, place your wireless range extender: • Near the center of the area in which your computers will operate. • Away from sources of interference, such as computers, microwaves, and 2.4 GHz cordless phones. • Away from large metal surfaces. The time it takes to establish a wireless connection can vary depending on both your security settings and placement. Connections using WEP or WPA can take slightly longer to establish. Also, WEP and WPA encryption can consume more battery power on a notebook computer. Wireless Configuration and Security 5-1 202-10042-02 v1.1

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169

Wireless Configuration and Security
5-1
202-10042-02 v1.1
Chapter 5
Wireless Configuration and Security
This chapter describes how to configure the wireless features of your Wireless Range Extender. In
planning your wireless network, you should consider the level of security required. You should
also select the physical placement of your wireless range extender in order to maximize the
network speed. For further information on wireless networking, refer to
Appendix C, “Wireless
Networking Basics”
.
Observing Performance, Placement, and Range Guidelines
The operating distance or range of your wireless connection can vary significantly based on the
physical placement of the wireless range extender. The latency, data throughput performance, and
notebook power consumption of wireless adapters also vary depending on your configuration
choices.
For best results, place your wireless range extender:
Near the center of the area in which your computers will operate.
Away from sources of interference, such as computers, microwaves, and 2.4 GHz cordless
phones.
Away from large metal surfaces.
The time it takes to establish a wireless connection can vary depending on both your security
settings and placement. Connections using WEP or WPA can take slightly longer to establish.
Also, WEP and WPA encryption can consume more battery power on a notebook computer.
Note:
Failure to follow these guidelines can result in significant performance
degradation or inability to wirelessly connect to the wireless range extender. For
complete range/performance specifications, please see
Appendix A, “Technical
Specifications”
.