Solved

Creating W-LAN with multiple access points

Posted on 2009-03-31
3
362 Views
Last Modified: 2013-11-09
Hello There,

We have a couple of Wireless Access Points using which we are able to create two seperate WLANs. I ahve seen in many places where there will be only a single WLAN and multiple Access Points will be there to extend the range. Could anybody help me how to do that from scratch. The Access Points we have is one D-Link and one LinkSys
0
Comment
Question by:firstware
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 32

Accepted Solution

by:
Kamran Arshad earned 250 total points
ID: 24047363
Hi,

Check out if your AP's support bridging mode. If so then you can connect multiple AP's to create WLAN.
0
 
LVL 12

Expert Comment

by:sarangk_14
ID: 25221437
The easiest way, in my opinion would be to put one of the APs in a repeater mode. This basically allows you to increase the range of your wireless network while using a single WiFi Network.

For information on how to do this using a linksys / dlink routers, google the same. A sample query is : http://www.google.co.in/search?hl=en&source=hp&q=using+linksys+router+as+repeater&meta=&aq=1&oq=Using+Linksys+

You may have to specify the models to get more accurate results.

Hope this helps.

Warm regards,
Sarang
0
 

Author Closing Comment

by:firstware
ID: 31565179
Solved
0

Featured Post

Ready to trade in that old firewall?

Whether you need to trade-up to a shiny new Firebox or just ready to upgrade from whatever appliance you're using now, WatchGuard has the right appliance for you! Find your perfect Firebox today with appliance sizing tool!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
For many of us, the  holiday season kindles the natural urge to give back to our friends, family members and communities. While it's easy for friends to notice the impact of such deeds, understanding the contributions of businesses and enterprises i…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Suggested Courses
Course of the Month7 days, 10 hours left to enroll

632 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question