Q
Problem solve Get help with specific problems with your technologies, process and projects.

# Transmit power

Is it possible to use a Wireless LAN using 802.11a within a building in which we have more than 100 PCs - all are...

connected to a server that is operating at 100M bytes? Also the total output should not exceed 100 mW(20dbi)? Let's start with power. Transmit power output depends upon the size and RF characteristics of the building you need to cover, because that will determine the number of APs, channels, and need for antennas. In the US, the maximum power permitted in the 5.15-5.25 frequency band is 40 mW. Between 5.25-5.35, maximum power is 200 mW. Limits in other regulatory domains vary. To reduce interference and satisfy different regulatory constraints, IEEE 802.11h specifies transmit power control procedures. In other words, you'll probably be able to configure your 802.11a APs to reduce power output - but whether the result will actually meet your 100 mW limit depends on your WLAN layout.

Next, let's consider bandwidth. If you have 100 PCs sharing one server with a 100M bit/sec. interface, you might say that each PC needs 1M bit/sec. Even an 802.11b WLAN can provide 1M bit/sec. to one station, but of course not to 100 stations at the same time. But all 100 PCs are probably not accessing the server at once. You really need to define your requirements for number of simultaneous users and per-user throughput. For example, suppose you decide that any single user requires 2M bit/sec. with 25 users needing simultaneous access at any time. That's an aggregate throughput of 50M bit/sec.

Now, how do you know whether your 802.11a WLAN can support this? Standard 802.11a data rates range from 6 to 54M bit/sec. But data rate varies with distance, so again the answer depends upon your actual WLAN layout. How far your stations are from your APs will directly impact throughput, and effective application throughput is about half the data rate. Conduct a site survey to determine the effective throughput delivered to each station, laying out APs so that every station receives the per-user throughput that you require. Finally, consider number of users per AP - stations using the same channel share the aggregate bandwidth provided by that channel.

This was last published in January 2003

## Content

Find more PRO+ content and other member only offers, here.

#### Have a question for an expert?

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

#### Start the conversation

Send me notifications when other members comment.

## SearchSDN

• ### Consider the Ethernet option for primary SD-WAN connectivity

SD-WAN connectivity offers the ability to use a variety of links. While most enterprises opt to use cable or DSL as the primary ...

• ### SD-branch network concept as next stage of WAN connectivity

SD-branch uses SD-WAN technology to simplify the branch network. It integrates multiple network functions now housed in separate ...

• ### Existing branch routers could be replaced as SD-WAN matures

Enterprises are moving away from traditional branch routers, as SD-WAN capabilities mature and offer consolidated network ...

## SearchEnterpriseWAN

• ### How to calculate network bandwidth requirements

Figuring out how to calculate bandwidth requirements is vital to ensuring your network runs smoothly, and it's best to get the ...

• ### How types of noise in data communication systems affect the network

Learn about the different types of noise in data communication -- including thermal, intermodulation, cross-talk, impulse and ...

• ### The best VPNs for enterprise use

This slideshow highlights the best VPNs used in enterprise wide-area networks (WANs) and offers principles for designing and ...

## SearchUnifiedCommunications

• ### Email collaboration evolves in the modern enterprise

Messaging apps are great for team collaboration, but bridging the gap between internal and external communication remains a ...

• ### Enterprises given clarity on cost of cloud services

Enterprises are gaining greater clarity about the cost of cloud services for UCC, as many IT departments are discovering that ...

• ### The evolution of unified communications technologies

Over the years, unified communications tools have evolved to incorporate different modes of collaboration. Enterprises need to be...

## SearchMobileComputing

• ### Five steps to effective usability testing for mobile apps

To avoid costly mistakes down the road, conduct usability testing and get a grasp on users' reactions to an app before rolling it...

• ### The new role of identity and authentication in the enterprise

It's increasingly important to use identity and access management systems in the enterprise. Luckily, an emerging market fills ...

• ### How to manage multi-factor authentication for Office 365

Security is a priority now more than ever. IT pros can manage MFA for Office 365 using conditional and application access to ...

## SearchDataCenter

• ### Evaluate read-intensive and write-intensive SSD use cases

Consider write wear, performance and other factors when choosing between read-intensive, write-intensive and mixed-use ...

• ### Some hyper-converged infrastructure use cases pose pitfalls

Hyper-converged infrastructure adoption is skyrocketing, but that doesn't mean that the technology is the best choice for every ...

• ### Dell hyper-converged reorg streamlines products, ups CI odds

Market pressures and manufacturing synergies drove Dell to integrate its HCI and CI products with its core business units, but ...

## SearchITChannel

• ### Anomali targets managed security service providers for global expansion

Threat management platform vendor Anomali said it will tap MSSPs for help reaching medium-sized businesses; other channel news ...

• ### Carbonite agrees to acquire competitor Mozy

Carbonite stays busy with its pending acquisition of Mozy and a forthcoming DRaaS product. The data protection vendor also ...

• ### CloudCoreo deal portends VMware cloud security tool

VMware cloud security tools will get a boost from the company's acquisition of CloudCoreo, a security and management startup ...

Close