?
Solved

What happens when you hve a G or B device on an N network like the Linksys WRT150N or WRT300N

Posted on 2007-10-11
3
Medium Priority
?
239 Views
Last Modified: 2013-11-09
using Linksys WRT150N or WRT300N or other n router, what happens when a B or G device connects?  Will all things revert to the B / G range / speeds?

I remember reading that with (older?) g routers, when a B connects, then all wireless PCs will be dealing wiht the box at B speeds.  Is that an old problem and newer G and N machines aren't affected?
0
Comment
Question by:babaganoosh
  • 2
3 Comments
 
LVL 66

Accepted Solution

by:
johnb6767 earned 2000 total points
ID: 20059484
There is a feature in the Linksys routers called CTS Protection Mode. It ensures the slower band cards would connect with no problems, of course with a reduced speed. It is still in the Current models I believe.

I dont think it was that bigof a problem on the G bands personally. Havent taken the leap to N yet. But I wouldnt think its a big deal.....

0
 

Author Comment

by:babaganoosh
ID: 20061119
but the n devices will stay at n speeds / n range while the b and g will be slower?

thanks!
0
 
LVL 66

Expert Comment

by:johnb6767
ID: 20062764
It should help, but the more G devices connected will eventually slow the transmissions down some....
0

Featured Post

Prep for the ITIL® Foundation Certification Exam

December’s Course of the Month is now available! Enroll to learn ITIL® Foundation best practices for delivering IT services effectively and efficiently.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is a step by step guide on how to create a basic PTP link using Ubiquiti airOS devices. This guide can be used on the following Ubiquiti AirMAX devices. Nanostation, Bullets, AirBridge, Nanobeam, NanoBridge to name a few. Please review …
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
this video summaries big data hadoop online training demo (http://onlineitguru.com/big-data-hadoop-online-training-placement.html) , and covers basics in big data hadoop .
Screencast - Getting to Know the Pipeline
Suggested Courses
Course of the Month16 days, 13 hours left to enroll

864 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question