CAPsMAN selecting channels

Frequency overlapping makes network performance so poor. So, CAPsMAN channel configuration with proper planning is required to avoid frequency overlapping.

Most Relevant Content

  • CAPsMAN Channel Planning with Non-Overlapping Frequency

    MikroTik CAPsMAN is an excellent application for managing multiple CAPs (Controlled Access Point) in a Wireless Network. But multiple APs create frequency overlapping issue if channels are not configured properly. Channel overlapping is required for smooth connection while roaming but there should not be frequency overlapping because frequency overlapping makes wireless performance so poor. In my previous article, I discussed MikroTik CAPsMAN basic configuration with default channel configuration. In this article, I will discuss how to configure CAPsMAN channel to avoid frequency overlapping. Non Overlapping Channels One of my previous articles on WiFi Frequency Band and Channel Width showed the available non overlapping channels in 2.4 GHz Band. There are five non overlapping channel sets on 20MHz channel width in 2.4 GHz frequency but globally 1, 6 and 11 channel set is usually used.  The middle frequency of these channels is given in the following table: Channel Number Middle Frequency 1 2412 6 2437 11 2462 In a multi WiFi AP network, the coverage of WiFi AP must be overlap for smooth connection but frequency overlapping must be avoided. So, we have to plan properly for designing a multi WiFi AP network. A possible multi WiFi AP network where there [...]

    READ MORE »

  • You May Also Like

  • »

    MikroTik Firewall Basic Concept |   October 6, 2017

    MikroTik Firewall functions as a network security tool for preventing unauthorized access to networks as well as provides Network Address Translation functionality. So, a network administrator who is using MikroTik Router in his network cannot go a single day without MikroTik Firewall. Actually, the main duty of a MikroTik administrator is to maintain Firewall properly along with Bandwidth management after completing MikroTik Router basic configuration. So, a MikroTik administrator should have enough knowledge on MikroTik Firewall and so this article [...]

    READ MORE »

  • »

    Turn Computer into Wi-Fi Hotspot |   September 17, 2015

    Internet Connection Sharing is an awesome feature in windows operating system. Using this feature, you can turn your computer which has wireless network card integrated into Wi-Fi hotspot and share your internet connection with your friends or family members. Generally, each laptop has a wireless network card integrated by default. So, if you are a laptop user, you can turn your laptop into Wi-Fi hotspot so easily. If you are a Desktop user, you can also turn your desktop as [...]

    READ MORE »

  • »

    MikroTik Load Balancing and Link Redundancy with ECMP |   October 28, 2016

    Load balancing and link redundancy is the main concern to any network administrator. Because, they always want to keep live their network 24/7. If you have multiple WAN connections, you can easily make a load balancing as well as link redundancy network with MikroTik Router. Different types of load balancing and link redundancy are present in MikroTik Router. ECMP Load Balancing is one of them. ECMP is so easy to implement and it provides an perfect load balancing solution. In this [...]

    READ MORE »

  • »

    Computer Networking Basics |   February 10, 2017

    Computer networking is a buzzword to the present world. By the virtue of computer networking, the world has become just like a village. So, anyone of the world can communicate with any person of the world within seconds as if they are living in a village. Computer networking does not mean a single element. A lot of networking elements and protocol work behind a computer networking. So, the computer guys who are interested to learn how computer networking works should [...]

    READ MORE »

  • »

    MikroTik Router Web Proxy Configuration |   August 28, 2016

    A Proxy Server is usually placed between users and the internet so that the proxy server can track the activities of any user. Formerly, a proxy server was mainly used for caching the static content of any web server because the internet speed was too slow. So, users would get high speed for browsing as if they were browsing a local server. But nowadays the internet bandwidth has increased. So, the proxy server is usually not used for web caching [...]

    READ MORE »

  • »

    User Management in Linux (Red Hat/CentOS) |   September 28, 2017

    User management is an important part of Linux (especially Red Hat Enterprise Linux) system administration. Linux users can be administrated using user or group administration GUI (Graphical User Interface) tool as well as through Red Hat/CentOS Linux command prompt. But I will always suggest you to do command line user administration as much as possible because in production GUI will not be provided always. Many people who are learning Linux administration do not know all features of user administration command [...]

    READ MORE »

  • »

    MikroTik VPN Configuration with Site-to-Site PPTP |   February 19, 2018

    VPN (Virtual Private Network) is a technology that provides a secure and encrypted tunnel across a public network and using this VPN tunnel a private network user can send and receive data to any remote private network as if his/her network device was directly connected to that private network. MikroTik PPTP is a popular client-server VPN service that provides a secure and encrypted link across public network. MikroTik PPTP can be applied in two methods. Connecting remote workstation/client: In this [...]

    READ MORE »

  • »

    How to Recover MikroTik User Password |   August 9, 2018

    MikroTik Wiki and Forum say that there is no way to recover MikroTik user password without losing MikroTik configuration. But if you have an unencrypted configuration file backup taken before, you will be able to recover your user password using MikroTik password recovery tools. How to Backup and Restore MikroTik configuration file manually was discussed in my previous article. I also discussed how to backup MikroTik configuration file automatically via Mail in another article and in this article I will [...]

    READ MORE »

  • »

    MikroTik OpenVPN Setup with Windows Client |   April 2, 2018

    VPN (Virtual Private Network) technology provides a secure and encrypted tunnel across a public network. So, a private network user can send and receive data to any remote private network through VPN tunnel as if his/her network device was directly connected to that private network. MikroTik OpenVPN Server provides a secure and encrypted tunnel across public network for transporting IP traffic using PPP. OpenVPN uses SSL Certificates. So, OpenVPN Tunnel is a trusted tunnel to send and receive data across [...]

    READ MORE »