?
Solved

How to use multiple wireless routers in a home

Posted on 2007-11-23
2
Medium Priority
?
2,464 Views
Last Modified: 2013-11-09
I have a large home with several stories. One wireless router is not sufficient for access by laptops,  So we need to set up at least 2 wireless access points.  I have two (2) DIR-655 DLINK wireless routers.  I dont mind having two different SSIDs but I thought the sales person said that DHCP would have to be turned off.
I have TW cable modem.
0
Comment
Question by:rdunagan
  • 2
2 Comments
 
LVL 6

Accepted Solution

by:
cerrmj earned 2000 total points
ID: 20341608
rdunaga,

I've done this a few times.  Here is what you have to do.

1.  Setup the first router as the one handling the DHCP.
2.  Turn off DHCP on the second router (this turns it into an access point).
3.  Connect the first router to the second router with a network cable - but plug the network cable into the second router using one of the 'regular' network ports - not the Interner or WAN port.   You should probably manually set the IP address on the second router to some high number in your network IP range, etc.. 192.168.1.200
4.  Configure the second router's wireless settings
4a.  You can use the same SSID - which will make roaming in the house a bit easier if you need that.
4b.  Set the channel on the second router at least 5 channel numbers away from the first one (e.g. if the first router is on channel 6, set the second router to use channel 1 or 11.
4c.  If you used the same SSID - you can also set the WEP/WPA to the same key.

That should just about do it.  You are basically setting up the second router as an access point - which will pass though DHCP requests to the first router.

I hope this helps.
Bob.
0
 
LVL 6

Expert Comment

by:cerrmj
ID: 20341609
Oh, one other thing - when you manually set the IP on the second router - you will have to connect to its management screens using the IP address you set - and will have to reconnect after you set the IP address.
Bob.
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I recently purchased a Bluetooth headset called the Music Jogger (model BSH10). The control buttons on it look like this: One of my goals is to use it as the microphone and speakers for Skype calls. In that respect, it works well. However, I …
DECT technology has become a popular standard for wireless voice communication. DECT devices are not likely to be affected by other electronic devices and signals because they operate in a separate frequency-band.
Look below the covers at a subform control , and the form that is inside it. Explore properties and see how easy it is to aggregate, get statistics, and synchronize results for your data. A Microsoft Access subform is used to show relevant calcul…
As many of you are aware about Scanpst.exe utility which is owned by Microsoft itself to repair inaccessible or damaged PST files, but the question is do you really think Scanpst.exe is capable to repair all sorts of PST related corruption issues?
Suggested Courses

807 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question