(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Improving Your Wi-Fi May Have Something To Do With Your Router

While many may want their Internet to be faster, not many realize that their router may be contributing to the problem. For this week’s tip, we’ll discuss how to configure your router for a faster Internet connection.

Gaining Access to the Administration Console
Of course, before you can make any changes to your router, you need to access the place where those changes can be made. With your router connected to your device (either a wired or wireless connection is fine) access your web browser. In the address bar, enter your router’s IP address, which can be found in the router’s user manual. Alternatively, you can check for your router’s IP address by clicking into the Control Panel and then, under the Network and Internet category, View network status and tasks.

To make this easier, you should use the dropdown menu in the top-right corner of the window to view your options by category.

In the Network and Sharing Center, click into your current network connection. An Ethernet Status window will appear. Once you click on the Details… button, your router’s IP address will display under IPv4 Default Gateway.

Once you have the IP address of your router, enter it into your browser’s address bar. Before you can access your router, you will need to enter your username and password. This could actually be one of the factors causing your problems: if your router’s access credentials have been left to the factory defaults, anyone can access your Internet connection without your knowledge and eat up your bandwidth. This is why it is important to change your access credentials to something more secure.
Once you have secured your access to your router, you should also look for Wireless Settings or Advanced Wireless Settings. This is where the rest of the changes to help speed up your connection will be made.

Checking the Bands
Based on what gigahertz your routers use for their signal, they come in different types--also known as ‘bands.’ Today’s routers will often support multiple bands, identified by the letter at the end of the router’s protocol. Older routers will often have a ‘G’ denoted at the end, while new ones are denoted with an ‘N’ or ‘AC.’ Even newer ones might end their protocol with ‘AD.’

These bands will tell you what devices will play nice with your router, but the multi-band capabilities of many routers will allow a single router to support numerous devices with different protocols.

Selecting a Channel
A connection can also be made slower if the router is set to a channel with higher traffic. If set to the 2.4GHz frequency, for example, your router has to compete with common devices like cordless phones, Bluetooth speakers, and others. Switching to a less busy channel may improve your connection speed and overall quality.

You can check which channels are available to you with some utilities for Windows devices and applications for Android devices. After running your scan and identifying a promising channel, use your Administration Console to switch over and test for any improvements.

Optimizing the Security Settings
As referenced above, it is important that your router is secured for the sake of your network security, but even the way it is secured can influence the speed of your connection. Setting your router to WPA2 with AES should give you fast, yet secure, connection.

If this all seems like a bit much, don’t worry--the IT professionals at NTConnections are ready and willing to help you with your networking. Reach out to us at (703) 288-9767.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 19 November 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Google Efficiency Mobile Devices IT Support Business VoIP Managed Service Provider Miscellaneous IT Services Server Workplace Tips Business Continuity Data Upgrade Disaster Recovery Network Innovation Hardware Email Software Windows Save Money Saving Money Business Management Communication Computer Mobile Device Management User Tips Microsoft Office Network Security Virtualization Browser Smartphones Managed IT Services Holiday Android Windows 10 WiFi Smartphone Mobile Computing communications Hacking BYOD Social Media Operating System Computers IT Solutions Cybercrime Chrome Small Business Application Apple Outsourced IT Proactive IT Remote Monitoring Avoiding Downtime Marketing Budget Collaboration The Internet of Things Big Data Alert Ransomware Quick Tips Data Backup Automation Information Technology Passwords Office Going Green Remote Computing Mobility Health Bring Your Own Device VPN Managed IT Services Recovery spam Social Engineering Employer-Employee Relationship Managed IT Wireless Technology User Error Vendor Management iPhone Cybersecurity Gadgets Save Time Firewall Telephone Systems App Redundancy Office 365 IT Support PowerPoint Website Excel Phone System Antivirus Content Filtering Office Tips Downtime History Tablet Lithium-ion battery Analytics Router Gmail Retail Memory Search Private Cloud Bandwidth Compliance Mouse Networking Network Congestion Meetings Trending HaaS IT Consultant Cloud Computing Fax Server Apps Law Enforcement Black Market Data Management Solid State Drive Humor Two-factor Authentication Saving Time Statistics Internet of Things Document Management Data Storage Risk Management Internet Exlporer Online Currency Word Data storage Biometrics Windows 10 Outlook Business Owner Printer Money Flexibility Hard Drives Current Events Administration Facebook Data Recovery Maintenance Entertainment Running Cable DDoS Value Physical Security Skype Unsupported Software BDR Unified Threat Management Robot Public Cloud Mobile Office Environment Google Drive Intranet Customer Relationship Management Phishing Vulnerability SaaS How To Best Available Data Security Artificial Intelligence People Safety Government Programming Video Surveillance HBO Cleaning Cameras Customer Service Consultant Mobile Screen Mirroring Entrepreneur Education Multi-Factor Security Frequently Asked Questions Tech Support Printer Server Hacker Professional Services Cast Worker Commute Cost Management Piracy Computer Fan Lifestyle Tip of the week Shadow IT Applications User Wireless Files Science Tools Productivity Streaming Media Instant Messaging Company Culture Licensing FENG Data Protection Windows 8.1 Update Samsung Windows Server 2008 Wi-Fi Shortcut SharePoint Colocation Twitter Windows 8 Workers Business Intelligence Encryption Bluetooth Crowdfunding Windows 7 Sports eWaste Computing Infrastructure Tablets Botnet Monitor Hosted Solution Data Warehousing Notifications OneNote USB Regulations YouTube Wearable Technology End of Support Travel Print Server Reputation IT Management Windows Media Player Social Servers NarrowBand Work/Life Balance Internet exploMicrosoft Customers Computer Repair IT Plan Best Practice Social Networking Net Neutrality Hiring/Firing Root Cause Analysis Flash Chromecast WIndows 7 Advertising Analyitcs Software as a Service Patch Management Data loss Sync Laptop Managing Stress Settings Distributed Denial of Service Update Scam LinkedIn Software Tips Virus Virtual Desktop Touchscreen Human Resources Telephony Touchpad IT service Hybrid Cloud Virtual Reality Debate Google Docs Relocation Computer Care Uninterrupted Power Supply Computer Accessories Training Start Menu HIPAA Domains Audit IaaS Bloatware Spam Blocking Voice over Internet Protocol Loyalty Conferencing Keyboard Smart Technology Windows 10s Battery Experience Two Factor Authentication Assessment Music Password Television Troubleshooting Electronic Medical Records Techology Comparison Public Computer Employer Employee Relationship Legal Specifications Data Breach Automobile Emails Books Mobile Device CrashOverride IBM Webinar Emergency Worker Users Supercomputer Content IT solutions Rootkit Video Games Knowledge Audiobook Netflix Charger Scalability Politics Transportation How to webinar Benefits PDF