Wireless Signal problems/degradation

Posted on 2005-05-02
Medium Priority
Last Modified: 2010-08-05
Okay... I have a system setup with D-Link Wireless Router and two computers wired to that router.  I have a laptop wireless connected to the router.  The distance between the wireless router and the laptop is about 40 feet with a concrete wall separating them.  Also, between the laptop and the router I have a D-Link Range Expander.  I am not using WEP.  I am using MAC filtering.  The Dell laptop has a built-in wireless card and is the only hardware component that doesn't match the other D-Link hardware.  I cannot get a consistent high quality wireless signal to the laptop.  It is strong than weak.  Sometimes the signal is so week it seems as if I am using dial-up on the Internet.  Any suggestions?
Question by:Roger_Doger
LVL 88

Expert Comment

ID: 13933468
Where did you put the range expander? Is it on the laptop side of the wall or in the other side? Wireless range normally is only good if the two points are in line of sight. A wall immensly decreases the signal. If you have direct line of sight the range can be anywhere between 300 and 800 m. A wall with iron inside usually completely cuts off the signal, even if the distance is only 5 m! You might be able to improve the signal by testing different locations for the expander.

Accepted Solution

jpfx earned 750 total points
ID: 13939431
A signal that is strong and then weak would discount the wall as being the cause of 'interference'.
You might have some other apparatus in the vicinity broadcasting on the same frequency so I'd try changing channels. Maybe there's a hands-free phone nearby? I would certainly consider external sources of interference as being a prime suspect for your problems.
My experience with d-link wireless routers has been very poor. I have a D 524 which only works if no encryption is used. Range is good through 3 walls and at about 60 ft range, the signal is good enough. With encryption on, it won't connect at a couple of feet (not a key error either).

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have had so many issues with my Vodafone 3G card (Novatel Merlin u630, provided by French carrier SFR) on Windows XP laptops that I thought I would create an help page for other users (I solved the issues). First issue, with my IBM/Lenovo lapto…
DECT technology has become a popular standard for wireless voice communication. DECT devices are not likely to be affected by other electronic devices and signals because they operate in a separate frequency-band.
Despite its rising prevalence in the business world, "the cloud" is still misunderstood. Some companies still believe common misconceptions about lack of security in cloud solutions and many misuses of cloud storage options still occur every day. …
Look below the covers at a subform control , and the form that is inside it. Explore properties and see how easy it is to aggregate, get statistics, and synchronize results for your data. A Microsoft Access subform is used to show relevant calcul…
Suggested Courses
Course of the Month16 days, 20 hours left to enroll

864 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question