Multiple WIFI points in 60000 sqft building

Posted on 2012-08-30
Last Modified: 2012-08-31
Ok .... Can I set up three routers, one as primary handing out DHCP, two as AP's no DHCP connected on LAN side to primary. Set Channels to 1,6,11 and create a roaming wifi connection   (Same SSID and Security on all three)?????

Also may have second set on another network in the mix... staggering radio chanells appropriately...
Question by:Grizzler
    LVL 4

    Expert Comment

    I would think that your wireless devices may have issues in areas where two or more APs overlap.  Devices will tend to jump erratically and cause networking issues.

    Have you looked at any appliances like SonicWALL that have integrated AP technology?
    LVL 44

    Accepted Solution

    For true 'seamless roaming' you need to use 802.1x/RADIUS authentication with e.g. domain credentials...
    and enable fast roaming on the server[s] and on the clients.

    Enable Fast Reconnect in XPXP - fast reconnectEnable Fast Reconnect in 7Win7 - fast reconnect
    When roaming with WPA2 authentication, you *will* get a 20-45 second gap when they switch while the roamer waits to be issued a new IP address; with the 802.1x's fast-reconnect option, they preauthenticate when approaching another AP, keep the same IP address when they switch APs, and the roaming occurs seamlessly with no wait time between connections.

    Author Comment

    Even with 1 DHCP server at the primary router there will still be a renegotiation for IP address

    Author Comment

    Using mobile sorry that was a question
    LVL 44

    Assisted Solution

    > Even with 1 DHCP server at the primary router there
    > will still be a renegotiation for IP address

    Yes. The client might even get the same IP address, but the AP using WPA2-PSK that the client roamed to is unaware of the previous connection without the fast reconnect extension (which is available only with 802.1x authentication).

    Author Closing Comment


    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Find Ransomware Secrets With All-Source Analysis

    Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

    MAC Filtering: MAC filtering is like handing a list of names to a doorman. If someone comes to the door and mentions a name, this name is checked by the doorman on his list and granted or denied access by this. This means that if someone menti…
    DECT technology has become a popular standard for wireless voice communication. DECT devices are not likely to be affected by other electronic devices and signals because they operate in a separate frequency-band.
    This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
    Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now