Solved

Wireless network with Draytek

Posted on 2011-09-30
1
841 Views
Last Modified: 2013-12-27
Hi all,

Planning on setting up a WDS in a hotel for a client but I need clarification on a few things.

1. Using a V3200n as the central point how may V700ap's can I control in a WDS distribution?
2. If it were to be a mesh type configuration are V700 clever enough to have 2 links back to the base station/central point to allow for redundancy?
3. If the V700's are to be in a chain type configuration how long can the chain be?
4. Is it sufficient to have only wireless links to the A700's or would you recommend having each connected back to a central switch by cat5?
5. Do the A700's allow for switching from one A700 to another, as if someone walked to the next room, without the user havingt to reconnect?
6. Do the A700's have some sort of QOS on them to allow for a small amount of voice traffic over them?

Many thanks in advance
Gareth
0
Comment
Question by:gareth629
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 46

Accepted Solution

by:
Craig Beck earned 500 total points
ID: 36894728
If you want voice, don't do WDS repeating... You'll get jitter and dropped calls for sure!  I would wire all APs in this scenario.

If you want to do a chain-type WDS setup you will lose half the bandwidth for every link in the chain, so if you link an AP to an AP to an AP you will have very little bandwidth left for your clients.

Depending on how you configure the SSIDs on the APs will determine how well roaming functions.  If you configure the same SSID and security parameters on each AP roaming will work well in a WDS setup.  You must remember to set different channels on adjacent APs though or you will create interference.
0

Featured Post

Secure Your WordPress Site: 5 Essential Approaches

WordPress is the web's most popular CMS, but its dominance also makes it a target for attackers. Our eBook will show you how to:

Prevent costly exploits of core and plugin vulnerabilities
Repel automated attacks
Lock down your dashboard, secure your code, and protect your users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When you try to share a printer , you may receive one of the following error messages. Error message when you use the Add Printer Wizard to share a printer: Windows could not share your printer. Operation could not be completed (Error 0x000006…
For many of us, the  holiday season kindles the natural urge to give back to our friends, family members and communities. While it's easy for friends to notice the impact of such deeds, understanding the contributions of businesses and enterprises i…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question