Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Wireless Access Point signal strenght

Posted on 2016-10-15
5
Medium Priority
?
109 Views
Last Modified: 2016-10-16
I have a Verizon wireless router that also have 5 Rj45 ports for wire connection, this device only allow 5 wireless connections for 5 computers.

If I connect a Wireless Access point using one of the Rj45 ports can I connect wireless more than 5 computers and if I can, will the signal strength be the same?
0
Comment
Question by:FCHCAdmin
  • 3
  • 2
5 Comments
 
LVL 99

Expert Comment

by:John Hurst
ID: 41845342
I would turn the Wi-Fi OFF on the Verizon router.

Hook up a good solid Wi-Fi router to the Verizon router using Ethernet. Hook a LAN port on the new router to a LAN port on the Verizon.

Log into the Wi-Fi router and give it a Static IP on the Verizon router and then turn DHCP OFF on the new Wi-Fi router.

Pick a router that permits as many Wi-Fi connections as you need.
0
 

Author Comment

by:FCHCAdmin
ID: 41845352
So doing it this way, will the computers getting the signal from the new router (that allows as many connections as I need) have the same signal strength as the original 5?
0
 
LVL 99

Accepted Solution

by:
John Hurst earned 2000 total points
ID: 41845582
The signal strength is a property of the new router. If you select a good router, you should be fine.
0
 

Author Comment

by:FCHCAdmin
ID: 41845780
Thank You
0
 
LVL 99

Expert Comment

by:John Hurst
ID: 41845816
You are very welcome and I was happy to assist
0

Featured Post

[Webinar] Cloud Security

In this webinar you will learn:

-Why existing firewall and DMZ architectures are not suited for securing cloud applications
-How to make your enterprise “Cloud Ready”, and fix your aging DMZ architecture
-How to transform your enterprise and become a Cloud Enabler

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
What monsters are hiding in your child's room? In this article I will share with you a tech horror story that could happen to anyone, along with some tips on how you can prevent it from happening to you.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Suggested Courses

971 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question