Solved

Motorola Canopy Solution. What Access points are good to use.

Posted on 2006-06-12
7
333 Views
Last Modified: 2013-11-09
Hello Experts, I really need advice rather than a solid answer so I will split points on this question for those that help the most.  Here is my situation;

I am currently setting up a Motorola Canopy system, very simple system. My Backbone is Cable internet. On top of the main building I am going to have an Omni Directional antennawith a GPS unit that will be for my timing issues with my backhaul unit. There will be 12 Subscriber modules. These are the modules that will bring in the 5.9GHZ signal for the motorola Equipment. Off of these Subscriber modules I will need wireless access points inside the buildings. These buildings are built like bunkers, alot of concrete walls and fairly large. So in some buildings I will need multiple access points. What will be the best bang for my buck for a cheap access point. I do not need ciscos or any hi dollar solution for this project. The canopy solution is already setting me back about 20,000. What is everyones opinion on distance. My reasoning for not needing any hi dollar devices are because it is set so back out of the way that I am not really worried about security since the walls are like bunkers and it sets far off the road. I just want a reliable strong device. Also would anyone consider using an omni indoors? Please let me know. Thanks
0
Comment
Question by:darrenakin
  • 5
  • 2
7 Comments
 
LVL 18

Accepted Solution

by:
carl_legere earned 500 total points
ID: 16891305
linksys wrt54gs's with third party firmware (dd-wrt), wattage cranked up to 251mw,  plugged into Hawking 600mw amplifiers, plugged into hawking omni's
about $250 per spot or less.  I've done a couple of buildings this way.
realistic indoor coverage through normal walls is >800 feet, concrete walls 100-200 feet.

Put all units on the same SSID
put them on different channels.

It is possible to use wireless for building to building backhaul, although I have not done it.  the third party firmware greatly enhanses WDS wireless distibution system, eliminating the need for any wires.

Despite warnings against third party FW, and overheating due to the obvious increased wattage, I have one system that has been running building to building for 14 months.  

And for gods sake please turn on security at least WEP
0
 
LVL 5

Author Comment

by:darrenakin
ID: 16894705
I will definitely turn on Security, no doubt about it. Thanks for the info. I have been told by Motorola experts that they do not recommend Linksys; they say that they need to be power cycled way to often. I do not doubt what you are saying at all, and I love the idea of cranking the wattage up on them. Can you tell me how to do that, or is it the firmware that does that?
0
 
LVL 5

Author Comment

by:darrenakin
ID: 16934384
ANY OTHER SUGGESTIONS
0
Give your grad a cloud of their own!

With up to 8TB of storage, give your favorite graduate their own personal cloud to centralize all their photos, videos and music in one safe place. They can save, sync and share all their stuff, and automatic photo backup helps free up space on their smartphone and tablet.

 
LVL 5

Author Comment

by:darrenakin
ID: 16956974
Well I uploaded the 3rd Party FW, and yup, frird the Access Point in a matter of 4 hours.
0
 
LVL 18

Expert Comment

by:carl_legere
ID: 16958729
can you draw a quick sketch of your setup and post here or somewhere.  I don't understand why you are using Canopy but not end to end.
0
 
LVL 5

Author Comment

by:darrenakin
ID: 17083946
I have the problem all fixed, the network is up and running. I used Linksys despite what the Motorola people have said, it seems to be working fine. I have put multiple access points indoors with a 14 db omni in a few areas. Great coverage and works great.
0
 
LVL 5

Author Comment

by:darrenakin
ID: 17145984
I did not use the 3rd party firmware however
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now