Multiple Wireless Access Points

Posted on 2012-09-02
Last Modified: 2012-09-02
At one site, there are 3 APs.
All 3 APs use the same SSID and wirelss security as well as password phrase.
Channels used are 1, 6 and 11.
I expect that when a laptop user moves from one point to another on the site, there should have been a seamless transition from a connected AP to another one with greater signal strength. Or is this a wrong presumption?
I have noticed that the connection to a particular AP remains persistently for as long as there is a workable signal.
Is there a way to reduce this tolerance or threshold such that the laptop connection automatically changes to a relatively stronger AP regardless.
Thanks, Experts.
Question by:garychu
    LVL 44

    Accepted Solution

    > Or is this a wrong presumption?
    The only way to do seamless roaming is with 802.1x authentication (aka WPA/WPA2 enterprise), not with the PSK type authentication.

    > Is there a way to reduce this tolerance or threshold
    > such that the laptop connection automatically changes
    > to a relatively stronger AP regardless
    Some drivers offer ways to control how roaming happens. It's usually in the Advanced options (Properties of the network adapter from Device Manager, Advanced tab, is one way to get to it)... other cards offer options in the connection manager.
    examples of both:
    Driver based roaming control
    Driver based roaming control
    Connection manager roaming control
    Connection manager roaming control
    And some cards don't offer any way to control when they roam.

    Author Closing Comment

    Thank you, Expert.
    A very concise and to the point answer.

    Featured Post

    How your wiki can always stay up-to-date

    Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
    - Increase transparency
    - Onboard new hires faster
    - Access from mobile/offline

    Join & Write a Comment

    Suggested Solutions

    Last Mile Wireless The term last mile wireless is a bit deceptive as it can be much more than a mile. It is also called WiMax and 802.16. It generally refers to relatively short distance point-to-point / point-to-multipoint secure wireless connecti…
    This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
    how to add IIS SMTP to handle application/Scanner relays into office 365.
    This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…

    728 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    21 Experts available now in Live!

    Get 1:1 Help Now