• Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

Computer Notes

Library
    • Computer Fundamental
    • Computer Memory
    • DBMS Tutorial
    • Operating System
    • Computer Networking
    • C Programming
    • C++ Programming
    • Java Programming
    • C# Programming
    • SQL Tutorial
    • Management Tutorial
    • Computer Graphics
    • Compiler Design
    • Style Sheet
    • JavaScript Tutorial
    • Html Tutorial
    • Wordpress Tutorial
    • Python Tutorial
    • PHP Tutorial
    • JSP Tutorial
    • AngularJS Tutorial
    • Data Structures
    • E Commerce Tutorial
    • Visual Basic
    • Structs2 Tutorial
    • Digital Electronics
    • Internet Terms
    • Servlet Tutorial
    • Software Engineering
    • Interviews Questions
    • Basic Terms
    • Troubleshooting
Menu

Header Right

Home » Networking » Communication » How to Set Up a Wireless Router Installation & Configuration
Next →
← Prev

How to Set Up a Wireless Router Installation & Configuration

By Dinesh Thakur

Setting up and securing a wireless router in your office is something anyone can do. Here, we’ll take you step-by-step through the physical installation and setup of a wireless router.

1) Start by disconnecting the device that is currently connected to your cable or DSL modem. If you don’t already have a network, this is likely a PC. If you’re upgrading a network, this is likely the old router.
2) Power off your cable or DSL modem.

Before connecting the router, turn off your cable or DSL modem.
3) Run an Ethernet cable from the cable or DSL modem to the router’s WAN (wide-area network) port. Note that it’s best to locate a wireless router in the middle of a home or office, if possible, so that the signal will reach all of your devices. To move the router, you may need to move the cable or DSL modem, or locate a stretch of Ethernet cable that’s long enough to reach the spot where you want to place the wireless router.

Run Ethernet cable from the modem to the router’s WAN port.4) Connect one end of an Ethernet cable to the LAN port on the router and connect the other end to a PC with a wired Ethernet connection, because you’ll need a wired connection to access and configure the wireless router.

Connect an Ethernet cable from one of the router’s LAN ports to the wired port on your PC.5) Attach the power adapter to the router, and plug the power adapter into a wall outlet. In some cases, you may also need to switch the router on. Also, you can now power on your cable or DSL modem. Wait a minute or two until both the router and modem have booted up.
6) Turn on the computer that’s connected to the router and open your Web browser. Reference the router’s users manual to find the address you need to enter to make changes to the router’s configuration. Typically, the Web address will be something similar to http://192.168.10.1 Once you open the configuration utility, you’ll need to enter a username and password, the defaults for which are generally “admin.” Note that you can (and should) change the username and password within the router’s settings, so that only you will be able to alter the router’s configuration.

You can configure the router by opening the Web portal listed in the users manual7) You should now have access to the router’s configuration utility. Start by setting up your Internet connection with the information that was provided by your ISP. Many routers offer a setup wizard area; from here you can click through the most common options to quickly configure your router. After you’ve entered the data, you’ll likely need to reboot the router for the settings to take effect.
8) Most routers begin broadcasting a Wi-Fi signal by default, but you’ll want to alter the settings with a network name and password that’s known only to employees and guests. To protect your network, it’s wise to encrypt it. Typically, these settings should be listed under a Wi-Fi or wireless settings area where you’ll change the network name. To change the network name, look for the SSID Service Set Identifier) field. Enter the name of the network you prefer, such as your business’s name or something that will help employees easily figure out what network they should join. As an extra security measure, consider setting the system so that it does not broadcast the SSID, in which case your employees (or family) will have to manually enter the name when they (or you) set up their computers to connect to the wireless network. (See the “Hide Your Network” sidebar.)
9) Next, configure the network’s encryption protocol. There are three common encryption standards: WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access), or WPA2. WPA2 is generally considered the strongest encryption method, and WPAPSK (pre-shared key) allows you to use a memorable password, rather than a long, random string of numbers and letters. To set up Wi-Fi encryption, choose the standard you want to use and enter the password into the available fields. Whatever you choose, come up with a good way to remember the network name and key or write it down (keep it in a secure location if you do so) to make it easy to give it to employees and important clients who need Wi-Fi access.
10) Now, you should be able to see and access the network on your office computers. If service still seems to be spotty or slow, check with your employees about what Web applications they are using during the workday. For example, video conferencing or social networking tools occasionally take up extra bandwidth, although they can be useful for meeting and interacting with clients and customers remotely.

We’ll be covering the following topics in this tutorial:

  • Why WPA2 Encryption
  • Hide Your Network
  • 802.11a/b/g/n

Why WPA2 Encryption

● Placing encryption on your network is important, because otherwise people within the wireless router’s range will be able to connect to your local network, which may lead to access to the shared files and folders on your network. WPA2 (Wi-Fi Protected Access version 2) is the strongest protocol, because it can utilize multiple encryption methods—AES (Advanced Encryption Standard) and TKIP (Temporal Key Integrity Protocol). To set up WPA2, enter your router’s settings and provide the username and password. Next, find and select the wireless network setup area. Under an encryption or security section, select WPA2 and enter the password you wish to use. You may also see options for AES, TKIP, or both. AES is the stronger of the two types, but select both if you’re unsure whether all the devices on your network support AES.

Hide Your Network

● If you want the Wi-Fi network to be harder to find, you should disable the router from broadcasting the SSID name. Those who know the network name will still be able to connect to it, but the network won’t come up when people scan the area for available networks. Note that disabling the SSID isn’t an alternative to wireless encryption, because it’s fairly easy for hackers to find non-broadcast SSIDs. The controls for disabling the SSID broadcast should be under the Wi-Fi or wireless network settings when you log in to the router management portal.

802.11a/b/g/n

● Nearly all new routers utilize the 802.11n Wi-Fi standard. That said, you may have in your office a number of older devices that only work with the older 802.11a/b/g standards. Fortunately, 802.11n is backward-compatible with the 802.11b/g standards, and most routers offer a Mixed Mode that allows the router to deliver Internet access to 802.11b/g/n devices. To support computers with 802.11a wireless adapters, you’ll need a dual-band router, which is one that supports both the 802.11a and 802.11b/g/n standards.

You’ll also like:

  1. Routers – What is Router? Characteristics of Routers. Router Protocols
  2. What is Router | Definition of Router
  3. Wireless Communication – What is Wireless Communication?
  4. IEEE 802.11: WIRELESS LAN
  5. Implementation of LAN Using Wireless Technology
Next →
← Prev
Like/Subscribe us for latest updates     

About Dinesh Thakur
Dinesh ThakurDinesh Thakur holds an B.C.A, MCDBA, MCSD certifications. Dinesh authors the hugely popular Computer Notes blog. Where he writes how-to guides around Computer fundamental , computer software, Computer programming, and web apps.

Dinesh Thakur is a Freelance Writer who helps different clients from all over the globe. Dinesh has written over 500+ blogs, 30+ eBooks, and 10000+ Posts for all types of clients.


For any type of query or something that you think is missing, please feel free to Contact us.


Primary Sidebar

Internet

Internet Terminology

    • Internet - Home
    • Internet - Email
    • Internet - www
    • Internet - Telnet
    • Internet - Architecture
    • Internet - FTP
    • Internet - HTTP
    • Internet - MIME
    • Internet - SMTP
    • Internet - DNS
    • Internet - POP3
    • Internet - Intranet
    • Internet - SNMP
    • Internet - BOOTP
    • Internet - TFTP
    • Internet - URL
    • Internet - NAT
    • Internet - DHCP
    • Internet - Cellular Radio
    • Internet - VSAT
    • Internet - TCP/IP Services
    • Internet - IMAP4
    • Internet - GSM Architecture
    • Internet - VOIP
    • Internet - GSM Features
    • Internet - SSL
    • Internet - Web Server
    • Internet - File Server
    • Internet - NNTP
    • Internet - UUCP
    • Internet - ADSL
    • Internet - FTP
    • Internet - NFS
    • Internet - Videoconferencing
    • Internet - Audio Compression
    • Internet - xDSL
    • Internet - ADSL Protocols
    • Internet - HTTP Cookie
    • Internet - Wireless Principles
    • Internet - X.400
    • Internet - IP Standardization
    • Internet - 4G
    • Internet - CompuServe
    • Internet - Anonymous FTP
    • Internet - File Sharing
    • Internet - WRAN
    • Internet - FQDN
    • Internet - CNAME
    • Internet - Buffering
    • Internet - Cluster Computing
    • Internet - WiMAX
    • Internet - Client/Server
    • Internet - ATM
    • Internet - DSL
    • Internet - GPRS
    • Internet - Transfer rate
    • Network - Cable Modem

Network Server Technique

    • Server - Home
    • Server - Proxy
    • Server - BBS
    • Server - B Channel
    • Server - Process
    • Server - AAL
    • Server - ISDN Features
    • Server - Multicasting
    • Server - Client/Server Benefits
    • Server - Client process
    • Server - Ad-Hoc
    • Server - ISDN Interfaces
    • Server - Guided Transmission
    • Server - SONET
    • Server - ISDN Standards
    • Server - WAP
    • Server - Broadband ISDN

Networking Encryption System

    • Security - Firewall
    • Security - Cryptography
    • Security - Firewall Architectures
    • Security - Network Security Services
    • Security - VPN
    • Security - Security Threats
    • Security - Encryption
    • Security - SHA-1
    • Security - Requirements
    • Security - Digital Signatures
    • Security - Message Authentication
    • Security - MD5
    • Security - Tunneling (VPN)
    • Security - Remote Access Security

Some Other Tutorials

  • Tutorials - QOS
  • Tutorials - CTS
  • Tutorials - LTE
  • Tutorials - CDDI
  • Tutorials - AppleTalk
  • Tutorials - EtherTalk
  • Tutorials - Flooding
  • Tutorials - Tunneling
  • Ethernet - Frame
  • Ethernet - Expansion
  • Ethernet - 10 Mbit/s
  • Ethernet - Local Loop
  • Broadband vs Baseband
  • Wi-Fi vs. Mobile Broadband
  • Optical Source
  • Implementation Wireless Technology
  • Applications of Wifi
  • Wireless Router Installation
  • Networking Your Devices
  • Type of Wi-Fi equipment
  • Multi-point Architectures
  • Frame-level Architecture
  • Circuits, Channels and Multichanneling
  • Single Bit Error Vs Burst Error

Other Links

  • Internet Terminology - PDF Version

Footer

Basic Course

  • Computer Fundamental
  • Computer Networking
  • Operating System
  • Database System
  • Computer Graphics
  • Management System
  • Software Engineering
  • Digital Electronics
  • Electronic Commerce
  • Compiler Design
  • Troubleshooting

Programming

  • Java Programming
  • Structured Query (SQL)
  • C Programming
  • C++ Programming
  • Visual Basic
  • Data Structures
  • Struts 2
  • Java Servlet
  • C# Programming
  • Basic Terms
  • Interviews

World Wide Web

  • Internet
  • Java Script
  • HTML Language
  • Cascading Style Sheet
  • Java Server Pages
  • Wordpress
  • PHP
  • Python Tutorial
  • AngularJS
  • Troubleshooting

 About Us |  Contact Us |  FAQ

Dinesh Thakur is a Technology Columinist and founder of Computer Notes.

Copyright © 2025. All Rights Reserved.

APPLY FOR ONLINE JOB IN BIGGEST CRYPTO COMPANIES
APPLY NOW