Q
Problem solve Get help with specific problems with your technologies, process and projects.

# Setting up WLAN for a student hall (40 simultaneous connections)

I'm trying to set up a wireless network in an old motel that's been converted into a student hall. The building...

is roughly 65 x 25 feet -two stories high. There are forty rooms altogether. Assuming two students per room, that should be 40 simultaneous connections at peak. We're planning to subscribe to a DSL connection and share the connection via a wireless network. Could you advise on what is the best way to do this? We're considering Wi-Fi. However we're not sure how well the signal will propagate through walls and ceilings. Could you also suggest some hardware for our kind of application that will be able to cater to roughly 40 users at peak? Also, is there any way of assigning a rule such that users who've used up a lot of bandwidth will have lower priorities? Thanks! My guess is that you need two APs, depending upon your building's RF characteristics and your users' performance requirements. Suppose you place two 802.11b APs about 17 feet from each end-wall. If each AP has an 11 Mbps footprint of just 40 feet due to RF absorption by all of your walls, this provides high-speed coverage for everyone. Twenty users per AP would share roughly 6 Mbps of effective bandwidth ? that's about 300 Kbps/user for simultaneous downloads.

Note that I said guess. It isn't possible to know without a site survey and a sense of your application and throughput requirements. You need a survey to identify RF obstacles like steel posts and plumbing and to measure actual signal loss due to your walls and first-floor ceiling. According to Planet3 Wireless, dry wall cuts effective range in half, but a solid-core wall (or ceiling) drops strength to 15%. If your users need higher sustained throughput, you could deploy 802.11a or 802.11g instead of 802.11b. Another consideration: If one AP is down, do you need distant students to be able to use the other AP at a lower rate?

You could hire a local network integrator to perform a site survey, refine your requirements and install the AP(s) you need. Or you could conduct a site survey yourself: buy one AP and card, put the AP where you think you might want it, and use a laptop with monitoring software that comes with the card or NetStumbler to take some measurements. Map out where link speed drops from 11 to 5.5 to 2 to 1 Mbps by walking very slowly away from the AP, standing in the corners and center of each room, etc. Relocate the AP if necessary to eliminate important RF deadspots. Most APs can support 20 associations, but your real limitation probably will not be connection limit. Throughput requirements will dictate what kind of link speed you need to deliver per user and therefore how many APs you will need.

As for hardware, you could buy a broadband router/firewall with integrated DSL modem, hanging APs off the router's Ethernet. Or you could buy a basic DSL modem from your telco and a separate SOHO/wireless firewall, hanging APs off the firewall. Why bother with a separate firewall? Because some firewalls provide bandwidth management features that let you limit per-station or per-group usage - for examples, see the NetScreen-5XT, WatchGuard V60L, Bluesocket WG-1000 SOE and ReefEdge CS-50. When selecting APs, give some thought to security - if you need to keep users from breaking into and reconfiguring your APs, steer clear of entry-level APs that lack security features like configurable admin logins, port numbers and interfaces and support for secure management protocols.

This was last published in April 2003

## Content

Find more PRO+ content and other member only offers, here.

#### Have a question for an expert?

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

#### Start the conversation

Send me notifications when other members comment.

## SearchSDN

• ### Consider the Ethernet option for primary SD-WAN connectivity

SD-WAN connectivity offers the ability to use a variety of links. While most enterprises opt to use cable or DSL as the primary ...

• ### SD-branch network concept as next stage of WAN connectivity

SD-branch uses SD-WAN technology to simplify the branch network. It integrates multiple network functions now housed in separate ...

• ### Existing branch routers could be replaced as SD-WAN matures

Enterprises are moving away from traditional branch routers, as SD-WAN capabilities mature and offer consolidated network ...

## SearchEnterpriseWAN

• ### How to calculate network bandwidth requirements

Figuring out how to calculate bandwidth requirements is vital to ensuring your network runs smoothly, and it's best to get the ...

• ### How types of noise in data communication systems affect the network

Learn about the different types of noise in data communication -- including thermal, intermodulation, cross-talk, impulse and ...

• ### The best VPNs for enterprise use

This slideshow highlights the best VPNs used in enterprise wide-area networks (WANs) and offers principles for designing and ...

## SearchUnifiedCommunications

• ### Email collaboration evolves in the modern enterprise

Messaging apps are great for team collaboration, but bridging the gap between internal and external communication remains a ...

• ### Enterprises given clarity on cost of cloud services

Enterprises are gaining greater clarity about the cost of cloud services for UCC, as many IT departments are discovering that ...

• ### The evolution of unified communications technologies

Over the years, unified communications tools have evolved to incorporate different modes of collaboration. Enterprises need to be...

## SearchMobileComputing

• ### Five steps to effective usability testing for mobile apps

To avoid costly mistakes down the road, conduct usability testing and get a grasp on users' reactions to an app before rolling it...

• ### The new role of identity and authentication in the enterprise

It's increasingly important to use identity and access management systems in the enterprise. Luckily, an emerging market fills ...

• ### How to manage multi-factor authentication for Office 365

Security is a priority now more than ever. IT pros can manage MFA for Office 365 using conditional and application access to ...

## SearchDataCenter

• ### Evaluate read-intensive and write-intensive SSD use cases

Consider write wear, performance and other factors when choosing between read-intensive, write-intensive and mixed-use ...

• ### Some hyper-converged infrastructure use cases pose pitfalls

Hyper-converged infrastructure adoption is skyrocketing, but that doesn't mean that the technology is the best choice for every ...

• ### Dell hyper-converged reorg streamlines products, ups CI odds

Market pressures and manufacturing synergies drove Dell to integrate its HCI and CI products with its core business units, but ...

## SearchITChannel

• ### Anomali targets managed security service providers for global expansion

Threat management platform vendor Anomali said it will tap MSSPs for help reaching medium-sized businesses; other channel news ...

• ### Carbonite agrees to acquire competitor Mozy

Carbonite stays busy with its pending acquisition of Mozy and a forthcoming DRaaS product. The data protection vendor also ...

• ### CloudCoreo deal portends VMware cloud security tool

VMware cloud security tools will get a boost from the company's acquisition of CloudCoreo, a security and management startup ...

Close