Solved

Some Questions About Wireless Routers

Posted on 2004-10-17
5
177 Views
Last Modified: 2013-11-09
I want to setup a home network.

I am thinking of getting a Linksys Wireless Router, however, I have heard that a lot of connections such as on bit torrent or other P2P programs eventually kill the router.

Second, I read that an incoming call on a 2.4 Ghz phone interferes with the router since that is the same frequency as 802.11b.  Do these claims hold true for all routers?
0
Comment
Question by:abstractionz
  • 3
  • 2
5 Comments
 
LVL 32

Expert Comment

by:Luc Franken
ID: 12332865
Hi abstractionz,

>>I have heard that a lot of connections such as on bit torrent or other P2P programs eventually kill the router.
May I ask where you heard about that? A router is made for multiple connections to the internet... it'll feel fairly happy with this.

>>I read that an incoming call on a 2.4 Ghz phone interferes with the router since that is the same frequency as 802.11b.  Do these claims hold true for all routers?
Some may slow down the connection a bit, but don't expect mayor problems from this. The protocol is pretty fail proof and it should just keep working.

Greetings,

LucF
0
 

Author Comment

by:abstractionz
ID: 12332883
I am thinking about buying this router:

http://www.newegg.com/app/ViewProductDesc.asp?description=33-124-010&depa=0

and it's mentioned in the 1st customer review.
0
 
LVL 32

Accepted Solution

by:
Luc Franken earned 50 total points
ID: 12332908
abstractionz,
That first customer also said "check dslreports or sveasoft forums for more info..."
So I did, and also Linksys pages... the lastest firmware will prevent the lockup, it's in no-way close to "kill the router"

LucF
0
 

Author Comment

by:abstractionz
ID: 12332917
Thanks.
0
 
LVL 32

Expert Comment

by:Luc Franken
ID: 12332938
You're welcome :)

LucF
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Does your iMac really need a hardware upgrade? Will upgrading RAM speed-up your computer? If yes, then how can you proceed? Upgrading RAM in your iMac is not as simple as it may seem. This article will help you in getting and installing right RA…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

778 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question