wifi repeater

Most Relevant Content

  • How to Use Old Router as Range Extender to Boost WiFi Signal

    WiFi is a technology to turn wired internet into WiFi internet and used in every home and office. Wireless internet gives you the freedom to use the internet without sitting in a single place. It is also true that speed performance drop in Wi-fi due to weak signal or interference. Sometimes laying a physical wired connection in every room is not possible. So Wi-Fi range extender setup helps you to boost signal strength. Instead of buying a new range extender device use old wifi router as range extender mode to boost Wifi signal. The easy method to boost Wi-fi signal coverage without using a range extender device is make wifi router as repeater mode which will extend signal. This post will help you turn old router as a range extender mode to improve wireless signals in the low signal areas. Setup WiFi Router as Range extender Mode To use the router as repeater mode need to access the settings page. To access the router login page use default IP Address router or Make factory reset if forget IP address. Connect Router LAN port to Desktop or Laptop LAN port. Use Static IP Address of the same series in LAN settings [...]

    READ MORE »

  • More Similar Content

  • »

    How to Buy a Good WiFi Router for Home or Office |   October 12, 2021

    You are here because you want to buy a WiFi Router and want to know how to buy a good WiFi Router for your home or office or business. A lot of wireless routers are nowadays available in the market. But before buying a WiFi Router, you should know which one is a good WiFi Router for your need based on some features and specifications of the router. We will now see some key points those should have well understand [...]

    READ MORE »

  • »

    MikroTik Wireless AP Configuration with DHCP using Winbox |   October 22, 2019

    MikroTik Wireless Router is one of the most popular and stable WiFi Routers. WiFi Zone for an ISP or for an office or for a home can easily be configured with MikroTik WiFi Router. MikroTik has a lot of WiFi Routers that can be used as a WiFi Access Point (AP), a WiFi Station or a WiFi Repeater. MikroTik Wireless Router can also be used as both WiFi Station and WiFi AP simultaneously. The simple usage of MikroTik Wireless Router [...]

    READ MORE »

  • You May Also Like

  • »

    MikroTik PCC Load Balancing over Unequal Dual WAN Links |   June 12, 2018

    Hi, you are here means you are finding a Load Balancing and Link Redundancy solution with Unequal WAN links in your MikroTik Router. If so, it is your right place. In my previous article I discussed how to configure a Dual WAN Load Balancing and Link Redundancy network using PCC method but it was assumed that both WAN links have equal bandwidth. But in real situation, you may have unequal WAN links such as ISP1 may have 10MB bandwidth and [...]

    READ MORE »

  • »

    MikroTik IPIP Tunnel with IPsec (Site to Site VPN) |   March 18, 2018

    VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides IPIP tunnel that is used to create a site to site VPN. IPIP tunnel is a simple protocol that encapsulates IP packets in IP to make a tunnel between two routers. To encapsulate [...]

    READ MORE »

  • »

    IP Based Virtual Hosting on CentOS 7 with Apache Server |   July 18, 2019

    Virtual Hosting is a method of hosting multiple domains on single web server. If you have multiple domains (such as domain1.com, domain2.com and so on) and want to host on single web server, Virtual Web Hosting is your right choice. Apache web server provides an easy way to manage Virtual Hosting. Virtual Hosting can be either Name Based or IP Based. In Name Based Virtual Hosting, multiple domains can be hosted on single IP address. On the other hand, in [...]

    READ MORE »

  • »

    MikroTik Load Balancing and Link Redundancy with PBR |   March 31, 2019

    In computer networking, the Load Balancing technique is used to send network traffic over multiple gateways. If you have multiple ISP connections available, you can use load balancing technique to establish a stable network. You may now ask, why will I use multiple ISP connections? What are the benefits to use multiple ISP connections in my network? For your satisfaction, the following points are some reasons to use load balancing technique in your network. No ISP can give you 100% [...]

    READ MORE »

  • »

    MikroTik Winbox 4: New, Fast and Simple RouterOS GUI |   September 16, 2024

    MikroTik Winbox 4 is a new era of MikroTik network management. Winbox 4 is a new, fast and simple RouterOS GUI. Winbox 4 has a modern and intuitive Graphical User Interface which is preferred and loved by the MikroTik network engineer to manage RouterOS. MikroTik Winbox 4 is now available for download and can be download for Windows, Linux and macOS. Winbox 4 has new features which was absent in previous Winbox version. In this article, we will see how [...]

    READ MORE »

  • »

    Free Online File Storage and File Sharing with Google Drive |   August 19, 2015

    Google Drive is a popular free online file storage and file sharing service by Google. Google Drive provides 15 GB free online storage where anyone can store or backup any kinds of file. That means, you can store your document file, picture, audio, video or any kinds of file into Google Drive and can read, write or download any file when you want. You can also share your stored file with your friends using Google Drive. But you are only [...]

    READ MORE »

  • »

    How to Create Free SSL/TLS Certificate with OpenSSL |   July 23, 2021

    SSL/TLS certificate is required to encrypt data sent over internet communication. Without encryption, the sent data can be hacked by the middle man attack. SSL/TLS certificate is usually a pair key, public key and private key, solution where data is encrypted with public key and decrypted with private key. In public communication, public key is required to be signed by a CA (certificate authority) but in private communication, there is no need to be signed by any CA. If we [...]

    READ MORE »