Solved

Wifi - When setting up a repeater, should it be set to repeat the same SSID on the same channel? If true, how does a PC decide which AccessPoint to connect to?

Posted on 2008-10-09
4
1,189 Views
Last Modified: 2010-04-29
Wifi - When setting up a repeater, should it be set to repeat the same SSID on the same channel?
If true, how does a PC decide which AccessPoint to connect to?
0
Comment
Question by:Cruicky
  • 3
4 Comments
 
LVL 44

Accepted Solution

by:
Darr247 earned 125 total points
Comment Utility
> When setting up a repeater, should it be set to repeat the same SSID on the same channel?

As far as I know, that's the only choice you have.  In order to talk to the 'parent', the 'child' (repeater) must be on the same channel and using the same SSID and security protocols that the 'parent' uses. I have never seen a ''repeater'' that offers to talk to the client on a different channel or SSID than the parent. Doing so would likely require 2 radios... in that case a bridge would be possible, which would double the bandwidth available over repeater mode.


> If true, how does a PC decide which AccessPoint to connect to?

Typically the repeater will offer a much-stronger signal, and that usually decides. Most 3rd-party connection managers allow you to set the roaming decisions according to different criteria; the windows WZC service does not offer roaming decision options at all.  If the computer is located about halfway in between the repeater and the parent, the decision is normally made based on which is offering a stronger signal (even though it should probably be based on which has the greater signal to noise ratio), and it may spend quite a bit of time each day disconnecting from one and then associating with the other one unless you're using a 3rd-party connection manager with which to force it to connect to a specific AP (e.g. by MAC address).
0
 

Author Comment

by:Cruicky
Comment Utility
Thank you, I suspected it true but wanted to be certain, it was the only thing that made sense.
0
 

Author Comment

by:Cruicky
Comment Utility
Thank you
0
 

Author Closing Comment

by:Cruicky
Comment Utility
Thankyou Darr247
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

I recently purchased a Bluetooth headset called the Music Jogger (model BSH10). The control buttons on it look like this: One of my goals is to use it as the microphone and speakers for Skype calls. In that respect, it works well. However, I …
DECT technology has become a popular standard for wireless voice communication. DECT devices are not likely to be affected by other electronic devices and signals because they operate in a separate frequency-band.
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now