(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Improving Your Wi-Fi May Have Something To Do With Your Router

Tip of the Week: Improving Your Wi-Fi May Have Something To Do With Your Router

While many may want their Internet to be faster, not many realize that their router may be contributing to the problem. For this week’s tip, we’ll discuss how to configure your router for a faster Internet connection.

Gaining Access to the Administration Console
Of course, before you can make any changes to your router, you need to access the place where those changes can be made. With your router connected to your device (either a wired or wireless connection is fine) access your web browser. In the address bar, enter your router’s IP address, which can be found in the router’s user manual. Alternatively, you can check for your router’s IP address by clicking into the Control Panel and then, under the Network and Internet category, View network status and tasks.

To make this easier, you should use the dropdown menu in the top-right corner of the window to view your options by category.

In the Network and Sharing Center, click into your current network connection. An Ethernet Status window will appear. Once you click on the Details… button, your router’s IP address will display under IPv4 Default Gateway.

Once you have the IP address of your router, enter it into your browser’s address bar. Before you can access your router, you will need to enter your username and password. This could actually be one of the factors causing your problems: if your router’s access credentials have been left to the factory defaults, anyone can access your Internet connection without your knowledge and eat up your bandwidth. This is why it is important to change your access credentials to something more secure.
Once you have secured your access to your router, you should also look for Wireless Settings or Advanced Wireless Settings. This is where the rest of the changes to help speed up your connection will be made.

Checking the Bands
Based on what gigahertz your routers use for their signal, they come in different types--also known as ‘bands.’ Today’s routers will often support multiple bands, identified by the letter at the end of the router’s protocol. Older routers will often have a ‘G’ denoted at the end, while new ones are denoted with an ‘N’ or ‘AC.’ Even newer ones might end their protocol with ‘AD.’

These bands will tell you what devices will play nice with your router, but the multi-band capabilities of many routers will allow a single router to support numerous devices with different protocols.

Selecting a Channel
A connection can also be made slower if the router is set to a channel with higher traffic. If set to the 2.4GHz frequency, for example, your router has to compete with common devices like cordless phones, Bluetooth speakers, and others. Switching to a less busy channel may improve your connection speed and overall quality.

You can check which channels are available to you with some utilities for Windows devices and applications for Android devices. After running your scan and identifying a promising channel, use your Administration Console to switch over and test for any improvements.

Optimizing the Security Settings
As referenced above, it is important that your router is secured for the sake of your network security, but even the way it is secured can influence the speed of your connection. Setting your router to WPA2 with AES should give you fast, yet secure, connection.

If this all seems like a bit much, don’t worry--the IT professionals at NTConnections are ready and willing to help you with your networking. Reach out to us at (703) 288-9767.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 24 April 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Hackers Business Computing Productivity Microsoft Backup Hosted Solutions Malware Internet Google Mobile Devices Efficiency VoIP IT Support Business IT Services Email Network Security Miscellaneous Managed Service Provider Server Innovation Workplace Tips Network Disaster Recovery Data Business Continuity Software Windows Upgrade Business Management Hardware Mobile Device Management Communication Android Computer Virtualization Save Money Browser Smartphone Saving Money Managed IT Services User Tips Smartphones communications Microsoft Office Data Backup Holiday Computers BYOD Cybercrime WiFi Windows 10 Outsourced IT Cloud Computing Small Business Hacking Chrome Big Data Ransomware Social Media Remote Monitoring Operating System Mobile Computing Alert Apple VPN Managed IT Services Proactive IT Application Avoiding Downtime Data Recovery IT Solutions Budget Quick Tips Collaboration Internet of Things Information Technology Social Engineering Passwords Automation Marketing Employer-Employee Relationship The Internet of Things Office Health Mobility Bring Your Own Device Gadgets Recovery spam Cybersecurity Telephone Systems BDR Going Green Remote Computing Managed IT Vendor Management Redundancy Wireless Technology User Error IT Support iPhone Two-factor Authentication Data Protection Business Intelligence Save Time Firewall App Gmail Private Cloud Bandwidth Compliance How To Vulnerability Data Security Office 365 Antivirus Data Management Analytics PowerPoint Router Windows 10 Website Excel Phone System Tech Term Money Office Tips Content Filtering Downtime History Artificial Intelligence Tablet Lithium-ion battery Value Retail Memory Apps Search Phishing Identity Theft Mouse Document Management Networking Risk Management Cleaning Online Currency Network Congestion Credit Cards Trending Meetings HaaS Fax Server Printer Black Market Law Enforcement Solid State Drive Humor Statistics Current Events Productivity Data Storage Internet Exlporer Maintenance Workers Word Data storage Encryption Biometrics Comparison Business Owner Outlook eWaste OneNote Flexibility Hard Drives Intranet IT Management Mobile Device Work/Life Balance Facebook Administration IT Plan Entertainment Running Cable DDoS CES Physical Security Unsupported Software Unified Threat Management Robot Data loss Skype Public Cloud Mobile Office Environment IT Consultant Update Google Drive Customer Relationship Management Human Resources SaaS Best Available Training Saving Time People Safety HIPAA Programming Government Video Surveillance HBO Cameras Customer Service Inventory Cortana Mobile Keyboard Consultant Entrepreneur Digital Signature Education Multi-Factor Security Screen Mirroring Frequently Asked Questions Tech Support Printer Server Access Control Fraud Hacker Google Apps Professional Services Worker Commute Cost Management Strategy Piracy Computer Fan Lifestyle Cast Tip of the week Shadow IT Applications Authentication Print Server Amazon Science Infrastructure Tools User Wireless Files Streaming Media Password Instant Messaging Analysis Licensing FENG Samsung Windows Server 2008 Wi-Fi Shortcut Amazon Web Services Twitter Windows 8 Computer Repair Password Manager SharePoint Net Neutrality Colocation Accountants Electronic Medical Records Crowdfunding Windows 7 Sports Bluetooth Online Shopping Tablets Business Mangement Botnet Monitor Hosted Solution Computing Infrastructure Notifications Legal Specifications Data Warehousing Evernote Regulations YouTube USB Recycling Travel Reputation Wearable Technology Touchscreen End of Support Windows Media Player Social IoT Millennials Wireless Charging Servers NarrowBand Internet exploMicrosoft Criminal Customers Best Practice Social Networking Smart Tech Hiring/Firing Root Cause Analysis Workforce Fiber-Optic Flash Chromecast WIndows 7 Advertising Analyitcs Software as a Service Patch Management Insurance Telecommuting Cables Sync Laptop Managing Stress Settings Distributed Denial of Service Content Management Scam LinkedIn Charger Software Tips Virus Virtual Desktop Practices Remote Work Unified Communications Telephony Touchpad IT service Hybrid Cloud Virtual Reality Blockchain Debate Google Docs Relocation Computer Care Uninterrupted Power Supply Computer Accessories Hosted Computing Theft Start Menu Domains Company Culture IaaS PDF Bloatware Windows 8.1 Update Staff Spam Blocking Voice over Internet Protocol Audit Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Television Nanotechnology Users Troubleshooting Techology Public Computer Employer Employee Relationship Data Breach Automobile Emails Books CrashOverride IBM Webinar Emergency Worker Supercomputer Content IT solutions Rootkit Video Games Knowledge Audiobook Netflix Scalability Politics Transportation How to webinar Benefits