box-sousmenu-top
box-sousmenu-bottom
Wi-Fi Router 

Security and Environment Wi-Fi router 

Wireless routers use the technology of radio waves, whose travel velocity in a straight line is as fast as light’s.
A wireless router’s theoretical range is 400 metres outside and 100 metres inside.
A wave passes through nearly every obstacle it encounters, and is therefore rarely obstructed. However, the signal can be slowed by interference factors (absorbent or refractive materials, walls, doors, or Hertzian pollution due to home appliances or electronics used nearby and at the same frequency).

The standard model used is the “802.11.” It has two connection modes:
- Infrastructure mode, the most common configuration, where the wireless user connects to a common access point (AP)
- Ad-hoc mode, where all users of the wireless network connect to each other, each serving as access point (AP) and client at the same time, creating a peer-to-peer network (p2p)

The communication quality of Videotron products can be optimized as follows:

Managing your environment

1. Before installing your router, choose a site for your wireless equipment that is as far as possible from the interference factors described above.

2. Choose a “line of sight” between the access points, routers and computers that is as straight as possible.
A wall 50 cm thick at a 45-degree angle to the access point or adapter is as obstructive as a wall one metre thick!

3. If possible, put your equipment in rooms with thin walls and open doors.
A supporting wall or armoured door can compromise the quality of the signal between wireless peripherals.

4. Keep your material at least one or two metres away from any kind of Hertz interference (TV tuner, microwave, mobile phones, etc.).

Follow these instructions, and you’re sure to have an optimally connected wireless network.

 

To secure your wireless network, current encryption methods use the WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access) protocols.
The principle is based on a set of keys of various lengths (64, 128 or 256 bits) that encrypt the data during wireless transmissions.

 
WPA technology, the enhanced version of WEP, is based on a so-called “dynamic key” procedure, where the encryption key is regularly changed during the connection phase using a new type of keys, TKIP (Temporal Key Integrity Protocol).

 

 

Has this article answered your questions?
YES
No
 
 

 

Business Support > Internet Support > Cable Internet > Wi-Fi Router > Security and Environment Wi-Fi router