Question about Linksys WRT610N Wireless Router

1 Answer

I have defined 2 networks, one for the G and the other for the N channel, only the one for the G gets connected

Posted by on

Ad

1 Answer

  • Level 3:

    An expert who has achieved level 3 by getting 1000 points

    All-Star:

    An expert that got 10 achievements.

    MVP:

    An expert that got 5 achievements.

    Vice President:

    An expert whose answer got voted for 100 times.

  • Master
  • 550 Answers

You have WRT610N dual band router . it works on both 2.4 GHz and 5 Ghx bands at the same time.
Both the bands are N bands.
2.4 GHz and 5 GHz band are capable of working on N signals.
Now on your computer you are able to see only the 2.4 GHz signals but not the 5 GHz signals.
To see the wireless signal on the computer , your computer should have 5 GHz compatible wireless adapter.
If you have 2.4 GHZ adapter on your computer then you won't be able to connect to the 5 Ghz signal.
Open the Device manager and under network adapters you will see the wireless adapter. Check if it is dual band wireless adapter.

Click here for more information

Posted on Aug 04, 2010

Ad

1 Suggested Answer

6ya6ya
  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

Hi,
a 6ya expert can help you resolve that issue over the phone in a minute or two.
best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of (from cars to computers, handyman, and even drones).
click here to download the app (for users in the US for now) and get all the help you need.
goodluck!

Posted on Jan 02, 2017

Ad

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

1 Answer

Roku tv Tcl wifi tv can't program cable channels


f your channels are not working, stuck , sending you back to the Home screen or you are facing an error.
1.check your network connection:
2.Connect to your wireless network again
3.Restart the Roku player and your wireless network
if facing same problem contact roku com link team. www roku com link code roku com link help 1800 922 2038

Jun 28, 2016 | Roku Televison & Video

Tip

How to divide bandwidth in squid


What is Bandwidth throttling :

Consider we are having 512Kbps Internet connection line. And the system administrator wants to divide the whole bandwidth into two sections. Read More One for the normal users and the other for special users who need high speed internet connection. So that all the normal users can use 256 Kbps and the special users can use the remaining 256 Kbps. So in this case you have to make a bandwidth throttling to differentiate the whole single pipe line into two sections. This can be achieved using squid proxy server.

Squid main configuration file ----- /etc/squid/squid.conf
Squid log file ----- /var/log/squid/access.log
Cache log file ----- /var/log/squid/cache.log

Bandwidth throttling in squid is done using Delay Pools. Delay pools uses bucketing system.

Throttle Calculations
512Kbps(Kilo bits per second) -----> 64Kbytes -----> 64000bytes
256Kbps -----> 32Kbytes -----> 32000bytes
128Kbps -----> 16Kbytes -----> 16000bytes
64Kbps -----> 8Kbytes -----> 8000bytes

Points to remember in Delay Pools:
There are basically three things to note, they are - delay pools, delay class, delay parameters.

Delay pool --- Defines how many pools we want to use
Delay Class ---- Defines type of the pool you are going to use.
Delay Parameter � allots the restrictions and fill rate/maximum bucket size.

As I have said previously in this documentation delay pools uses bucketing system.
Now there are three types of buckets

Class 1 pool: A single aggregate bucket, shared by all users
Class 2 pool: One aggregate bucket, 256 individual buckets
Class 3 pool: One aggregate bucket, 256 network buckets, 65,536 individual buckets

If you still have any problem in the above syntax (ie) aggregate, network and individual buckets to understand, then here is a simple syntax/example for all these

For Class 1 delay pool
delay_parameters 1 32000/32000

For Class 2 delay pool
delay_parameters 1 48000/48000 48000/48000

For Class 3 delay pool
delay_parameters 2 32000/32000 8000/8000 16384/16384

Example Setup:
One 512Kbps pipe line. We want to distribute the whole pipe line into 2. One for normal users and other for special users as follows
Normal users --- 128 Kbps
Special Users --- 384 Kbps

Configuration Setup File /etc/squid/squid.conf:
Before getting into the delay pools setup first create the acl(Access Control List). Through acl you can define rules according to your requirements. Find the Access Control section in the squid.conf file.
Here is an example:

acl superusers src 192.168.1.1 192.168.1.2 192.168.1.3
acl mynetwork src 192.168.1.0/255.255.255.0

Here in the above example only three users are special users who need 256Kbps bandwidth which are listed in the specialusers label and the whole network including he special users are labeled as mynetwork.

After creating the users you have to allow them to access the internet. Below line specifies for allowing the mentioned labeled users.

http_access allow superusers
http_access allow mynetwork

Now comes the funny part Delay Pools. Here We will deal with a basic example for delay pools.

The example is as follows: We are having 512Kbps pipe line connection. We want to divide it into segments one for the special users, web servers and the other for the normal users in the organization. The special users and the web servers are given 384Kbps speed and the remaining 128Kbps for the normal users.

Delay Pools for super users:
Check for the delay pools section in the squid.conf file.
Start the configuration for delay pools as follows
==================================
########## Delay Pools############
==================================

delay_pools 2

As described above we have to create 2 delay pools, one for each delay class.
====================================================
######### Defining Delay pool 1 in class 2 #########
====================================================

delay_class 1 2
delay_parameters 1 48000/48000 48000/48000
delay_access 1 allow superusers

The first line specifies Delay Class which defines delay pool 1 for the delay class 2.

Why we are using delay class 2 here?

The first part on the second line ie �1� defines the pool One(1)

The second part on second line defines the aggregate 48000/48000(restore/max). where restore is the number of bytes (not bits - modem and network speeds are usually quoted in bits) per second placed into the bucket, and maximum is the maximum number of bytes which can be in the bucket at any time.

The third part on second line is individual buckets again 48000/48000(restore/max). All the special users and the web servers should obtain the same speed of 384 Kbps.

The third line allows the super users to fall in that bucket.

=====================================================
######### Defining Delay pool 2 in class 3 #########
=====================================================

Delay Pools for normal users:

delay_class 2 3
delay_parameters 2 32000/32000 8000/8000 16384/16384
delay_access 2 allow !superusers

The first line specifies Delay Class which defines delay pool 2 for the delay class 3.

The first part on the second line ie �2� defines the pool Two(2) of class three(3)

The second part on second line defines the aggregate 32000/32000(restore/max) as aggregate (ie for whole).
Note : - If you use -1/-1. �-1� indicates �unlimited�.

The third part on second line is network bucket. We have defined here 8000/8000 .

The fourth part on second line is for individual.

The third line specifies to throttle all the users except the super users.

How to check:
First set proxy settings in your browser as follows:
Go to any client machine and open an IE(Internet Explorer). Select "Tools" menu then select "Internet Options" then select "Connections" tab. After that select the "LAN Settings" button, you will get a new pop-up window there you select "Use proxy server for your LAN" check box and finally give your squid proxy servers ip address and the port on which the squid proxy server is configured. Now press "OK" and again press "OK". Cloase the window and now open a new window.
Second Check by downloading any large file

Start to download any lage file not less than 10MB size. Because when ever you download any small file it used to download it quickly. When you start downloading large file at first if you note some starting bytes of the file gets downloaded quickly and later it gets slowed down.

Keep a note on the download pop-up box which shows the speed limits in "kbps". When we start downloading note on the pop-up box the speed limits in kbps shows high value and then slowly gets decreased. This means when you start downloading the bucket gets filled and slowly it decreases and becomes stable to the specified limit in Kbps according to the configuration. Remember again as i told restore value is used to set the download speed, and the max value lets you set the size at which the files are to be slowed down from.

on Apr 24, 2010 | fedora Linux Operating System

1 Answer

Trying to connect with a wireless router. getting error code 51330.


This is a General Troubleshooting error code and does not have any one specific cause. You'll need to try the following steps to try to solve the problem.

1. Your wireless router sends out an internet signal using a specific "channel" (much like a radio broadcasts over the airwaves). You can change the "channel" that your wireless router uses to broadcast the internet signal manually. Nintendo suggests setting your wireless router to either channel 1 or 11, as these are supposed to be the fastest channels for download speed

This website has a guide that shows you how to change the channel on your wireless router - http://www.nintendo.com/consumer/wfc/en_na/routers/index.jsp

2. In addition to the broadcasting channel, there is also a broadcast setting. This can be set to either "G", "B", or "Mixed." Nintendo suggests that the "Mixed" setting gives the best network connection, but you might need to try all three settings to get the best network connection.

3. Home appliances and other devices that are near to your console, like microwaves and cordless phones, might cause interference with your wireless network connection, so try turning these off. Other wireless devices like keyboards and computer mice can also interfere with your network connection.

May 01, 2011 | Nintendo Video Game Consoles & Games

1 Answer

How do I secure?


WIRELESS To configure the Router as a wireless access point for wireless clients (either stationary or roaming), all you need to do is define the radio channel, the Service Set identifier (SSID), and security options.ADVANCED SETUP 47 Channel and SSID You must specify a common radio channel and SSID (Service Set ID) to be used by the Router and all of your wireless clients. Be sure you configure all of your clients to the same values. SSID: The Service Set ID. This should be set to the same value as the other wireless devices in your network. SSID Broadcast: Broadcasting the SSID on the wireless network for easy connection with client PCs. For security reasons, you should disable SSID broadcast. (Default: Enable) Note: The SSID is case sensitive and can consist of up to 32 alphanumeric characters. Wireless Mode: Set the communication mode for the Router. Default: Mixed (11b+11g)Configuring the Wireless Barricade g Router 48 Transmission Rate: Set the rate of data transmitted from the Router. The lower the data rate, the longer the transmission distance. (Default: Fully Automatic.) Channel: The radio channel through which the Router communicates with PCs in its BSS. (Default: 6) Note: The available channel settings are limited by local regulations. g Nitro: In a crowded 2.4 MHz frequency, the connection speed is much lower than the promised 54 Mbps. The g Nitro implemented by Intersil's Prism Nitro technology dramatically enhances your wireless network speeds. It provides up to 50% more throughput in 11g only environment, and improves network throughput by 3 times in mixed mode.ADVANCED SETUP 49 Security If you are transmitting sensitive data across radio channels, you should enable wireless security. Configuring the Wireless Barricade g Router 50 WEP Wired Equivalent Privacy (WEP) encryption requires you to use the same set of encryption/decryption keys for the Router and all of your wireless clients. WEP mode: You can choose disabled, 64-bit or 128-bit encryption. Key Provisioning: Select a key type of static key or dynamic key. Static WEP Key Setting You may manually enter the keys or automatically generate encryption keys. To manually configure the keys, enter 10 digits for each 64-bit key, or enter 26 digits for the single 128-bit key. (A hexadecimal digit is a number or letter in the range 0-9 or A-F.) For automatic 64-bit security, check the box of Passphrase, enter a passphrase and click SAVE SETTINGS. ADVANCED SETUP 51 Four keys will be generated. Choose a key ID (1-4) from the drop-down list or accept the default key. If you use encryption, configure the same keys used for the Router on each of your wireless clients. Note that Wired Equivalent Privacy (WEP) protects data transmitted between wireless nodes, but does not protect any transmissions over your wired network or over the Internet. WPA Wi-Fi Protected Access (WPA) combines Temporal Key Integrity Protocol (TKIP) and 802.1x mechanisms. It provides dynamic key encryption and 802.1x authentication service. With TKIP, WPA uses 48-bit initialization vectors, calculates an 8-byte message integrity code, and generates an encryption key periodically. For authentication, it allows you to use 802.1x authentication for an environment with a RADIUS server installed on your network. Selecting the Pre-shared Key enables WPA to use the pre-shared key in a SOHO network.Configuring the Wireless Barricade g Router 52 Field Default Parameter Description Cypher suite TKIP One of the security mechanism used by WPA for frame body and CRC frame encryption Authentication 802.1X Select the authentication mode. • 802.1X: It is for an enterprise network with a RADIUS server installed. • Pre-shared Key: It is for a SOHO network without any authentication server installed. Pre-shared key type Passphrase (8~63 characters) Select the key type as in pass-phrase or in 64-Hex characters Pre-shared Key none Specify in pass-phrase style or in 64-Hex characters. Group Key Re_Keying Disable The period of renewing broadcast/ multicast keyADVANCED SETUP 53 802.1X Management access will be checked against the authentication database stored on the Router. If an authentication RADIUS server is used, you must specify the secret key of the Message-Authenticator attribute, i.e., Message Digest-5 (MD5), and the corresponding parameters in the RADIUS Server Parameters field for the remote authentication protocol.Configuring the Wireless Barricade g Router 54 • General Parameters • RADIUS Server Parameters Field Default Parameter Description Enable 802.1X Yes Starts using 802.1x security control. Session Idle Timeout 300 seconds Defines a maximum period of time for which the connection is maintained during inactivity. Re-Authentication Period 3600 seconds Defines a maximum period of time for which the RADIUS server will dynamically re-assign a session key to a connected client station. Quiet Period 60 seconds Defines a maximum period of time for which the Router will wait between failed authentications. Server Type RADIUS Selects the authentication server type. Field Defaults Description Server IP 192.168.1.1 The IP address of the RADIUS server. Server Port 1812 UDP port is used for RADIUS authentication messages. Secret Key none Defines a text string on both the RADIUS client and server to secure RADIUS traffic. The RADIUS server requires MD5 Message-Authenticator attribute for all access request messages. The 802.1x authentication scheme is supported by using the Extensible Authentication Protocol (EAP) over the RADIUS server. NAS-ID none Defines the request identifier of the Network Access Server
Source: http://www.smc.com/files/AK/2804WBRP-G_MN.pdf
Please leave feedback for this answer, thanks.

Mar 10, 2011 | SMC Barricade g SMC2804WBRP-G Wireless...

2 Answers

Hi, the following started to happen: 1. Our wireless Internet recently started to develop problems. The signal drops and using the "View wireless network', our secured home network will not show...


It sounds like you have a problem with a conflicting Wireless signal in your area.

This is caused by another wireless network close by that is on the same channel (or within 5 channels higher or lower) than yours that is causing interference.

You can check this by performing the following:
1. check your wireless network at the moment and see if you can see what the channel number is that is being used at the moment, make a note of this.
2. switch your router off (making sure that any settings that you may have changed on the router have been saved first!).
3. browse for any wireless networks that are in the area, and make a note of the channel numbers that these wireless networks are on. You should find that there is another network on the same, or close to the same, channel number that your wireless network is on.
4. power on your wireless router.
5. whilst the router is coming back on, take a look at the networks that you have found and see if there is a channel that is available that is 5 different from everyone else (ie, if there is a network on channel 1, you will be looking to use channel 6, if there is one on 7 use channel 2, etc). If there is no completely clear channel you may need to try and just look at the strongest signals for a 'free' channel.
6. once your wireless router is back up, log on to the configuration page (may be best to use a wired connection if possible, to avoid disconnections mid-configuration)
7. find the wireless configuration page, and set the channel number to the one worked out in step 5
8. retry the wireless network and see if you get better performance and a more stable connection

Wireless networks are a bit picky when it comes to interference, and they ideally need 5 channels of separation, otherwise the carrier signals can interfere with each other. But with not being able to control your neighbours networks, it can be difficult to get a completely clear channel :)

The other thing to check for is if you have had a change around in the house, and perhaps bought a new appliance (such as baby monitor or cordless phones or a fish tank), as some items can throw out interference to conflict with wireless networks.

Hope that this information is of some assistance to you!

Nov 08, 2010 | D-Link RangeBooster G WBR-2310 Wireless...

1 Answer

Can not complet setup for Linksys wireless G


You must be using the cable type of isp i guess like comcast,cox or cable vision, Try this Take power cable out from modem and router-

Now PLUG OUT THE CABLE OF POWER TO YOUR MODEM WAIT FOR 2 MINTS. DONT DO ANY THING B4 2MINTS. NOW connect the power cable of router - Hope it may get work- Else try open IE page - type 192.168.1.1 - Press enter - admin is password

leave username blank

Click Mac address clone- Enable- Clone my pc's mac-save settings. Click Wireless - W/l n/w mode mixed - network name - user defined - Channel 6 SSID broadcast - Enabled- Save setings, Click on wireless security on the top under sub tabs of wireless select the wpa security type - make security of your own.

Now do

PLUG OUT THE CABLE OF POWER TO YOUR MODEM WAIT FOR 2 MINTS. DONT DO ANY THING B4 2MINTS. NOW connect the power cable of router.

Mar 30, 2010 | Linksys Wireless-G WRT54G Router

1 Answer

My printers that are on my wireless network won't print


Did you define the printers and printer ports to the laptops?


On the XP laptop go to network connections in the control panel and use the network setup wizard.

Jan 01, 2010 | NetGear WGR614 Wireless Router

1 Answer

Connecting copier machine wireless


Configuration using a wireless computer.
  1. If your computer has wireless capability, you will need to change the wireless settings of your computer to Ad-hoc mode so you can directly connect and configure the printer.
  2. Wireless network terms and concepts
    When you configure the wireless network printer, you must ensure that your wireless network printer is
    configured to match the settings of the existing wireless network. This section provides some of the main
    terms and concepts of these settings, which may be helpful when you configure the wireless network printer.
    SSID (Service Set Identifier) and channels
    You need to configure the SSID and a channel to specify the wireless network you want to connect to.
    SSID
    Each wireless network has its own unique network name and it is technically referred to as SSID or ESSID
    (Extended Service Set Identifier). The SSID is a 32-byte or less value and is assigned to the access point.
    The wireless network devices you want to associate to the wireless network should match the access point.
    The access point and wireless network devices regularly send wireless packets (referred to as a beacon)
    which has the SSID information. When your wireless network device receives a beacon, you can identify the
    wireless network that is close enough for the radio waves to reach your device.
    Channels
    Wireless networks use channels. Each wireless channel is on a different frequency. There are up to 14 different channels that can be used when using a wireless network. However, in many countries the number of channels available are restricted. For further information, see Ethernet wireless network on page 165.
    Authentication and encryption Most wireless networks use some kind of security settings. These security settings define the authentication (how the device identifies itself to the network) and encryption (how the data is encrypted as it is sent on the
    network). If you do not correctly specify these options when you are configuring your Brother wireless device, it will not be able to connect to the wireless network. Therefore care must be taken when configuring these options. Please refer to the information below to see which authentication and encryption methods your Brother wireless device supports.
    Authentication methods
    The Brother printer supports the following methods:
    • Open system
    Wireless devices are allowed access the network without any authentication.
    • Shared key
    A secret pre-determined key is shared by all devices that will access the wireless network.
    The Brother printer uses the WEP keys as the pre-determined key.
  3. I will advise you download this network manual and follow the instructions on chapters 3 and 4.
  4. Network Users Manual - English

Apr 15, 2009 | Brother HL-4070CDW Printer

1 Answer

Having problems getting Ghost 9.0 set up again.


>delete the backup job that you have already defined...
>try to define a new backup
>while defining the new backup maybe you can get the option to set new password

Jan 08, 2009 | Symantec Norton Ghost 9.0 for PC

1 Answer

Connection


If you want to connect it on a secured connection then do this.... open internet explorer...put in the address bar as : 192.168.1.254 press enter then it will take you to the thomson page on thomson page on left side click on the last tab home network....then on the right side under home network click on  wlan it will take you to the new screen on that click on the tab at the top right corner configure on the new page chek that the first option interface enabled is checked... then 3 options under that you'll find an option of network name ssid clear that box and put in a new name for wireless network it could be anything but not any previous name that you have already used for your wireless network... three options under that there is another one that is channel selection that is to be on automatic and 2 options under that channel should on 6 if not go back to channel selection and change it to manual then change channel to 6... 2 options under that  there is an option of security under that select third one use wpa psk encryption 2 options under that it ask you to put wpa psk key put in a key anything more than 8 characters and apply it... then open control panel on your comp  there you will find an option of network connections or network and sharing center then double click wireless net connections select your net and get connected... if any issues revert back...

Mar 22, 2008 | Computers & Internet

Not finding what you are looking for?
Linksys WRT610N Wireless Router Logo

Related Topics:

254 people viewed this question

Ask a Question

Usually answered in minutes!

Top Linksys Computers & Internet Experts

Prashant M
Prashant M

Level 3 Expert

2260 Answers

Doctor PC
Doctor PC

Level 3 Expert

7733 Answers

Les Dickinson
Les Dickinson

Level 3 Expert

18394 Answers

Are you a Linksys Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...