In the enterprise wireless network office, there are often some problems and failures that are not covered in the user manual. Sometimes it is difficult to deal with and cannot be solved. The following analyzes the typical failures caused by routers in wireless networks and provides solutions.
Connection error Line is not connected
There are many reasons why the network line is down, but the first thing to check is whether there are any errors in the connection configuration.
First check the broadband access terminal after ensuring the power supply of the router is normal. The indicator light on the router can indicate whether the broadband line access terminal is normal. From the manual, you can identify which light is the broadband access terminal and the user terminal. Observe the flashing status of the light. Continuous flashing is normal, and no light or long light without flashing is a fault. We can replace the original line with a broadband rubber wire for connection.
If the problem persists, please check whether the distance between the router and the receiving computer is too far or there is a large obstacle in between. In this case, please reposition the router so that there are not too many obstacles between the wireless router and the receiving computer, and the receiving computer is within the signal transmission range of the wireless router.
Checking the wireless network card is also essential. You can replace the new network card and reinstall the driver for debugging. Click "View available wireless connections" in the network card to refresh the "Network List" and set the network card parameters. Check whether there is data sending and receiving in the "Properties" to troubleshoot.
Of course, hardware failure of the router itself is also a direct cause of line blockage, but this is not within the scope of our ability to solve. You should contact the manufacturer in time for repair or replacement.
Unable to connect due to improper settings
"Settings" can be divided into two aspects: computer settings and router settings. Computer settings are relatively simple. Click to enter the "Network Neighborhood" properties, open "Wireless Network Connection", and then set the "IP address", "Subnet Mask" and "Gateway". Just make sure that the IT address of the computer and the IT address of the wireless router are in the same network segment. The setting of "Gateway" can be referred to in the network card manual. Generally, it is the same as the router IP address.
The settings of the router are relatively professional and complicated. First, enter the wireless router IT address in the system browser, and then enter the router administrator login name and password in the pop-up login interface to enter the settings interface. At this time, you need to check whether the broadband account and password given to you by the network service provider are correct. If not, correct them and try to connect. If the page still cannot be opened after connection, please click to enter the "Security Settings" option in the router to check whether the "Network Firewall", "IP Address Filtering" and "MAC Address Filtering" options are turned on, and make corrections and settings to eliminate the problem of being unable to open the network.
Network attacks cause network abnormalities
ARP attacks and illegal intrusions into unprotected wireless LANs are now typical cases that cause network anomalies. Due to negligence in security settings and insufficient post-security protection, a small number of malicious hackers have caused great harm to the company's important information and confidential data.
ARP attacks can cause network IT conflicts, data loss and overflow, and even worse, network paralysis. These phenomena are a great threat to enterprise networking.
First, enter "Safe Mode with Networking" and change the computer's IT address in the wireless network card properties, and then check whether it can be connected to the Internet. In addition, purchasing and installing professional anti-virus software and network firewalls is one of the quicker methods.
Secondly, enter the router's "Security Settings" option for advanced settings. Most wireless routers now have WEP password encoding function, which uses a maximum of 128-bit password key to encode data. When communicating on a wireless router, the password key length can be selected to be 40 bits or 128 bits. Using MAC addresses and preset network IDs to limit which wireless network cards and access points can access the network can completely ensure network security. It is very difficult for illegal receivers to intercept wireless network signals, which can effectively prevent hacker intrusion and sabotage and malicious network attacks by illegal users.
Finally, please note that it is forbidden to enable the "Remote WEB Management" function option in the router without special needs or professional skills.
Some functions of the router are malfunctioning and cannot be used
This problem mostly exists in some older wireless routers. When we are configuring the advanced function options of the router, after repeatedly confirming that the connection is correct, some functions cannot be enabled and used. At this time, you may first think that there is a hardware failure, but this is not the case.
First, we need to check the version of the router system. After consulting the wireless router manual, we can see whether the function supports this version of the router system. Router systems usually have many versions, and each version supports different functions. If your current software version does not support this function, you should find the corresponding software and upgrade it first.
Click to enter the "System Tools" option of the wireless router, select "Software Upgrade" after entering, and the current software version and hardware version will be displayed in the dialogue interface. Enter the "File Name" (that is, the file name of the system upgrade) and "TFTP Server IP" in the pop-up dialog box and click "Upgrade".
Please note when upgrading: select the software that is consistent with the current hardware version for upgrading. Do not turn off the power of the router during the upgrading process, otherwise the router will be damaged and unusable. The upgrading process is very short if the network is stable, and the whole process will not exceed one minute. If you find that the router restarts after the upgrade, please do not worry, this is normal. Generally, after the upgrade, the router will work more stably and add some new features suitable for this version.
Previous article:A detailed discussion on WSN technology for wireless measurement networks
Next article:No phase distortion, how to choose cables for test systems
- Popular Resources
- Popular amplifiers
- Mission-oriented wireless communications for cooperative sensing in intelligent unmanned systems
- Investigation of occupancy perception in autonomous driving: An information fusion perspective
- Practical Development of Automotive FlexRay Bus System (Written by Wu Baoxin, Guo Yonghong, Cao Yi, Zhao Dongyang, etc.)
- Deep Learning Computer Vision: Neural Network Architectures Using Python and Keras
- High signal-to-noise ratio MEMS microphone drives artificial intelligence interaction
- Advantages of using a differential-to-single-ended RF amplifier in a transmit signal chain design
- ON Semiconductor CEO Appears at Munich Electronica Show and Launches Treo Platform
- ON Semiconductor Launches Industry-Leading Analog and Mixed-Signal Platform
- Analog Devices ADAQ7767-1 μModule DAQ Solution for Rapid Development of Precision Data Acquisition Systems Now Available at Mouser
- Domestic high-precision, high-speed ADC chips are on the rise
- Microcontrollers that combine Hi-Fi, intelligence and USB multi-channel features – ushering in a new era of digital audio
- Using capacitive PGA, Naxin Micro launches high-precision multi-channel 24/16-bit Δ-Σ ADC
- Fully Differential Amplifier Provides High Voltage, Low Noise Signals for Precision Data Acquisition Signal Chain
- Innolux's intelligent steer-by-wire solution makes cars smarter and safer
- 8051 MCU - Parity Check
- How to efficiently balance the sensitivity of tactile sensing interfaces
- What should I do if the servo motor shakes? What causes the servo motor to shake quickly?
- 【Brushless Motor】Analysis of three-phase BLDC motor and sharing of two popular development boards
- Midea Industrial Technology's subsidiaries Clou Electronics and Hekang New Energy jointly appeared at the Munich Battery Energy Storage Exhibition and Solar Energy Exhibition
- Guoxin Sichen | Application of ferroelectric memory PB85RS2MC in power battery management, with a capacity of 2M
- Analysis of common faults of frequency converter
- In a head-on competition with Qualcomm, what kind of cockpit products has Intel come up with?
- Dalian Rongke's all-vanadium liquid flow battery energy storage equipment industrialization project has entered the sprint stage before production
- Allegro MicroSystems Introduces Advanced Magnetic and Inductive Position Sensing Solutions at Electronica 2024
- Car key in the left hand, liveness detection radar in the right hand, UWB is imperative for cars!
- After a decade of rapid development, domestic CIS has entered the market
- Aegis Dagger Battery + Thor EM-i Super Hybrid, Geely New Energy has thrown out two "king bombs"
- A brief discussion on functional safety - fault, error, and failure
- In the smart car 2.0 cycle, these core industry chains are facing major opportunities!
- The United States and Japan are developing new batteries. CATL faces challenges? How should China's new energy battery industry respond?
- Murata launches high-precision 6-axis inertial sensor for automobiles
- Ford patents pre-charge alarm to help save costs and respond to emergencies
- New real-time microcontroller system from Texas Instruments enables smarter processing in automotive and industrial applications
- [STM32WB55 Review] BLE_p2pServer Project Extraction & Compilation
- ST's latest sensor driver
- Why does the electromagnetic flow meter have a lining?
- What to do if the oscilloscope channels are not enough?
- How does a 5V DCDC prevent abnormal input voltage from damaging the circuit due to poor user operation?
- What is the relationship between the public and private keys generated by SSH and the host that generated them? What is the basis for their generation? How can I verify their authenticity?
- Analog Electronics Tong Shibai 223 pages Frequency Response
- EEWORLD University Hall----Live Replay: Infineon BMS solutions protect electric vehicles and energy storage systems!
- Explore TE's PCB Subsystem Solutions
- Things to note when selecting Keithley desktop power supply