WI-FI Routers to the Rescue

Posted by Winnie Melda on November 15th, 2018

            Having purchased the equipment, we will proceed to implementation and installation of the equipment so that the Wi-Fi routers can start the function they were intended immediately. Therefore, we will have to replace the old and traditional routers with the modern Wi-Fi routers which have better and higher performance than the cabled routers.


            A few years ago, most people considered Wi-Fi (wireless) routers as relatively dumb devices that only beamed the Web into the users’ homes or office and could not offer anything else. However, that has changed, and the Wi-Fi routers offer the users everything they require such as support for multiple wireless frequencies and mobile management tools among many others. The above are the reasons why I will be implementing and installing Wi-Fi routers. However, before implementation and installation, there is a need for a plan on how the process will get down successfully.

            Among the plans is scheduling the day on which we shall implement and install the Wi-Fi routers. On the day the implementation and installation are scheduled, I will do everything I can to start early and on time. Before beginning installing the Wi-Fi router, I will check the package content. I will become familiar with front and back panels of the router specifically the LEDs and all the important information about installation on the router label. Furthermore, just to ensure there are no hindrances, I will confirm that everything the process requires is available. Additionally, I will have to determine where I will place the equipment, but I will seek advice where necessary about positioning the Wi-Fi router device to optimize the Wi-Fi signals throughout the area of application (Talla et al., 2015).

            Being the specialist, I will do all the work. I will run fiber from an outside equipment box directly in the place of installation as well as install the equipment. I will also set up wired and Wi-Fi networks as well as demonstrating key features of the devices and the system to the users. Having done the above, the next thing will be creating a Wi-Fi zone before completing the implementation and installation process.


            On the day I was to implement and install the Wi-Fi routers, I ensured I had everything I would need in the process to ensure there were no delays. I unpacked the new Wi-Fi router and ensured that it contained the items below (Panitzek et al., 2012).

  • The Wi-Fi router
  • AC power adapter
  • Yellow Ethernet cable
  • Installation guide
  • The resource CD

In the preparation for the installation and implementation, I carefully peeled off the protective film on the router that covered all the sides of the router. Having done that, I went to set the Wi-Fi router where I inserted it into the stand that had been supplied with the router. Before installation and engaging in the other activities in the process, I determined the suitable area where I was going to install it near AC power outlet and which could easily be accessible to the Ethernet cables for the cabled computers and other devices.

            I confirmed the availability of AC power outlet which was not there. Therefore, I did the cabling of the outlet and also the cabling of the computers that did required cables. The next big thing on the list was positioning the Wi-Fi router in a suitable place from where I could access the network from virtually anywhere within the operating range of the installation of the router which I did perfectly by following the recommendations in the installation manual. I placed the Wi-Fi router near the central area where computers and other devices were operating and within the line of sight to the Wi-Fi devices.  Furthermore, I placed it away from some electrical devices such as home security systems, microwaves, and ceiling fans which could potentially cause interferences (Rouveyrol, Raveneau, & Cunche, 2015).

            I also ensured that the installation area could optimize the signals within the access area. I realized that I could not demonstrate the key features of the Wi-Fi routers without having to configure it first. Therefore, the activity on the plan would have to wait until the next activity of configuring the Wi-Fi router. However, I created the Wi-Fi area which is an area where a user could easily access the Wi-Fi services through the router easily (Thota et al., 2013).


            Implementation and installation of the Wi-Fi routers are not a hard nut to crack according to the observation I made. However, it is an involving activity whereby, without suitable and proper preparation it can be impossible. Therefore, implementation and installation of Wi-Fi routers require thorough and comprehensive preparation and knowledge of all the equipment and devices required in the process. The process is not a one-off activity or a program. As mentioned earlier, it is a process because it involves several activities which are interconnected from the first one to the last one.

            The fact that implementation and installation is an involving process is an indication that it requires care. This is because the process deals largely with understanding finer details which may affect the whole network if not done in the best way possible. That is why it should be done by following instructions highlighted in the installation manual and the CD. Additionally, it involves consulting where the installer is not sure or where the installation manual is silent. The care with which the installation requires starts from the first activity where the installer opens the box in which the router is contained. This involves ensuring all the equipment required there, and they fit the description in the manual.

            I observed that positioning and placing of the Wi-Fi router matters and determine the functionality of the whole network. A router placed and positioned badly will affect the strength of signals in the network. Additionally, a Wi-Fi router placed near such equipment as home security systems and microwaves will not function properly due to the interference of the signals. Therefore, it is up to the installer to have prior knowledge of the area of installation before engaging in any of the activities. However, the installer may seek guidance where it becomes hard to understand or crack what is required. In my case, I did not require to do extensive consultation since I had encountered similar activities in my career previously and what I needed to do was rescuing the network from the wired routers.


            The fact that I am experienced in installing and implementing network devices such as the Wi-Fi routers is not disputable in any way. However, the fact that I completed this particular activity perfectly made a difference. I did not have a thought or any imagination that I would complete the process without requiring extensive consultation with anyone. The significant success is attributed to the planning I did before starting. The planning encompassed everything that I would be doing and left room for anything that would crop up during the process. Therefore, it is not surprising that I succeeded without any notable hindrance along the way. Additionally, I did not succeed because of the planning alone, but also because of the determination and the hunger to succeed.

            On the same note, I would not have achieved all these without a careful and comprehensive following of instructions in the installation guide. Although I had prior experience in the implementation and installation of the Wi-Fi routers, I realized that it would count for nothing if I had decided to ignore the instructions and conduct the process according to what I knew. It was wise to understand that I was dealing one of the most sophisticated technologies which would have changed overnight from what I had known all along.

            Although I feel overwhelmed by success, I also have a feeling that the process would have been better if I had consulted another expert. We would have probably shared resourceful knowledge on Wi-Fi routers even though it would not have been applicable in that particular process. I would have gained knowledge and concepts on the installation process which would have probably served me better in the future where I was looking forward to engaging in more complicated and larger Wi-Fi routers implementation and installation projects. However, I feel that I learned almost everything I needed for that particular project.

Iteration 3: Configuration of the network and equipment

            I will configure the new installed and implemented Wi-Fi routers to suit the needs of the network and users. Additionally, the configuration will involve installation of other applications such as firewall and other security-based equipment to the network after which the network will be ready for use.


            Before configuring the network and the equipment in the network, there is a need for having a comprehensive planning to guide throughout the process. Anyone who has been in the business of buying a new computer knows that setting it up involves more than just removing it from the box and turning it on. The same can be said to a Wi-Fi router or a new network. It is not a trivial piece of work to put up the network and expect it to work perfectly without configuring it first together with the equipment on the network or which are connected to that particular Wi-Fi router.

            With comprehensive planning, the process of configuration of the network and equipment will not be a hard task because hardware manufacturers have made it easier for inexperienced and non-technical users to configure the network. One of the planning activities will be ensuring that the routers and other equipment have clearly labeled ports. Where the need is, I will ensure the ports are color coded making it simple for me to connect everything according to the instructions. Additionally, I will find out whether the Wi-Fi router has basic configuration preset before so that I will know where I will pick from.

            Despite the easiness with which I will have configured the network and other equipment such as the Wi-Fi routers, I will not be fooled. I already know that just because I will have plugged everything according to the instructions and guidelines and it seems to be working will not have meant that the performance and security of the network will be as good as they will be. I will be made to follow some basic instructions and steps to ensure that I have properly configured the network Wi-Fi router.  The basic steps and instructions may not be readily available, and therefore, I will be required to do Internet searches to find them.


            I went straight into the process of configuration of the network and the pieces of equipment in the network. One of the basic things I was supposed to ensure was that all the pieces of equipment and more so the routers had well-labeled ports. Fortunately, all the routers, as well as other equipment, had well-labeled ports which also happened to be color coded. Therefore, I was well set where I started immediately following a set of instructions having got them from the Internet search I did before embarking on the process. According to the Internet searches, I was supposed to follow the instructions below (Rouveyrol, Raveneau, & Cunche, 2015):

  • Getting online: Now that I had the router readily set, I connected it online. It was pretty simple because the service provider gave me the modem upon activating the Internet service. I followed other basic instructions according to the search.
  • Accessing the Management Console: I customized the router’s configuration with the router and the computer connected. I accessed the management console easily by launching the Web browser and entering the IP address into the address bar of the browser and pressed Enter. The router’s login screen appeared and prompted me to enter username and password which I did (Rouveyrol, Raveneau, & Cunche, 2015).
  • Changing the password and upgrading the firmware: I changed the router’s default password to improve the security of the entire network. Additionally, I ensured the router was running the latest firmware
  • Management of IP addresses using DHCP: This made me get focused on the routers LAN configuration using the DHCP. I achieved this by assigning a range of IP addresses for use by the DHCP server. I also assigned IP addresses to devices in the network manually.
  • Activating the Wi-Fi: Having configured the network properly, I moved on to set up the wireless network. It was very simple, and it took me few minutes. I activated the Wi-Fi by using a computer already connected to the network through an Ethernet cable so that I would lose the management console connection. Although it may sound simple, it also followed a set of steps (Rouveyrol, Raveneau, & Cunche, 2015).
  • Security Configuration: The router supported Wi-Fi Protected Setup (WPS) which is a network security standard that has the capability to s ensure a network is secured through pressing a button. I disabled the button as well as the SSID from broadcasting. My network could, therefore, not easily be discovered by wireless devices randomly looking for available wireless networks.
  • Sharing the data: Being a small network, I could not use a server to share network resources. Therefore, I installed the Network Attached Storage (NAS) device which is cost effective and easier to use in this network environment.

Having done all the above, the next big was ensuring the network is well maintained and that it continued performing the tasks it was meant to perform without any hindrance. I tested the network, and it was perfectly set sharing the network resources according to the expectations.


            There is no process as involving as network and equipment configuration. However, I also observed that it takes the design with which it is conducted and how the installer feels about it. The process of configuring the network and the pieces of equipment within the network should also not be treated as a program. The person engaging in the process may miss the mark altogether in case he takes some activities to think that he has completed configuration of the network. 

            According to what I observed, the process involves finer details that should be carefully considered and failure to which the network may be prone to security risks and vulnerabilities. I also observed that the main reason for engaging in the configuration is identifying some security vulnerabilities and risks which may delay quality of service delivered by the network and its equipment. Therefore, this configuration should always ensure that the process identifies such vulnerabilities. 

            Among other observations is that configuration plays a critical role in determining how the network and its components will serve for the rest of life. Therefore, the process should be conducted with utmost care and in a way that any detail will be noted. Although the process is involving, it can be done through and by referring the wealth of information available on the Internet. The Internet is full of information that can serve the same purpose as configuration instructions. I also observed that before embarking on the process, there should be a list of all the equipment required in the process to ensure it goes to completion smoothly and that it serves the intended purpose.


            Looking back, I have no reservations about what I did and how I did it. I do not think there is a better way I would have conducted the process through. The plan was perfect, and it is no wonder I achieved most of the things just like how I would have wanted to achieve. I met the targets of the process not because I was skilled or expert in executing the activities leading to the success but because I planned them well in advance. Additionally, I achieved the target because I remained visionary and determined till the end. I also followed instructions and executed everything according to those instructions bearing in mind that I needed them for success.

            I do not think there was a better way to achieve such an immense achievement without having being determined and focused. Therefore, my success can be attributed to the previous activities I had been involved in where what matters most is the planning and the resources required to achieve them. When I look at what I did, someone can easily discredit it but looking carefully, it is the outcomes of planning well in advance and in a way that it is designed to achieve the exact outcomes.

            The above highlights how I achieved my success in the iteration. However, there are some instances where I also feel I would have achieved even better outcomes if I had tried other ways of configuring the network. Additionally, I would have learned and gained valuable knowledge on how to do network configuration using other ways other than what I used. I have no regrets over using that particular way since it brought the desired outcomes while helping me acquire new knowledge and concepts on network and equipment configuration.

Iteration 4: Network and equipment maintenance

            The last step towards rescuing the network is the maintenance of the equipment and the network. However, this is not a one-day activity, but it will start immediately after configuration of the equipment and the network


            It is an expensive task to implement, install, and configure a network. Therefore, such an expensive undertaking should always be maintained to prevent it from wasting away. Network maintenance should be planned using simple solutions regardless of the size of the network. However, this process is seldom simple and headaches begin on what devices to do maintenance or what specifically to maintain. The simple solution to the headaches has a plan that offers an efficient and affordable way of streamlining the setup and maintenance of a wireless network and ensures that it runs at peak performance.

            The best way to ensure that the maintenance will be successful is by having goals and objectives on which I will be referring. Additionally, I will come up with a checklist against which I will check whether a certain goal has been achieved. Before engaging in the maintenance process of the network and the equipment, I will assess the current status of the network on equipment, bandwidth, and near-term obstacles. Additionally, I will have in mind that the maintenance program must focus on preventing network equipment and system from failing before they occur. After having it that way, I will develop a routine maintenance program capable of preventing future occurrences of failures.

            Besides the immediate maintenance of the network and equipment, I will also engage in the round-the-clock monitoring of the network. This I will do installing a broadband wireless network router that will be provided by the connectivity. This connectivity will help to set the Distributed Antenna Systems (DAS) and router configuration by sending both major and minor SNMP traps.  I will also enable remote diagnostics where I will be evaluating the levels of faults and attempt to fix them remotely. Additionally, I will engage in the repair and replacement of the faulty pieces of equipment in the network as a part of the maintenance program. 


            I did not engage in the maintenance of the network immediately. One of the first things I did was assessing the current state of the network from where I knew how and where to start. The network was in various stages of development, and the network’s equipment was performing according to the expectations. They were few days since the installation, implementation, and configuration of the network and so there was nothing much I assessed. On bandwidth, the network had been upgraded where the speed of the communication increased throughout the network and put the network in a good standing for the future. I gave the assessment of the equipment and the bandwidth a clean bill of health. Having ensured that, I moved on to the next big thing.

            The network’s obstacles during the time it had been in use reflected the challenges of other networks I had come across which were growth and increased traffic. However, this particular network’s were unique because their high rate of growth was presenting other equipment with the problems at a high pace. On this, I defined three objectives which were my points of reference:

1)      Increasing the traffic on the network

2)      Increasing the rate at which the wireless network was being used

3)      Increase the use of the Internet

            I conducted the above three activities thereby ensuring that the network met them as a way of maintenance. On the same note, I fixed all the problems I encountered during the evaluation with all the standard network hardware and software. Where needed to be, I upgraded and repaired all the network pieces of equipment and hired a technician where I was unable. To achieve the three goals, we tested the Wi-Fi network and tested it to ensure it was going to meet the requirements of coverage detailed in the implementation plan (Mahmoudi et al., 2015).

            The team also helped me to install comprehensive and an in-building Wi-Fi maintenance program that helped in:

1)      Preventive network maintenance

2)      Round-the-clock system monitoring

3)      Remote Access Diagnostics (RAD) and network problem troubleshooting

4)      Service level network response and repair

We did not complete the maintenance in the day we had set. However, it continued in the following day since there some fine details we needed to consider and which needed care and time to have felt that we had conducted a substantial maintenance. We gave the network another two days to see how it would react. Having done that, we conducted the final touches on the network maintenance. We also set data on which we shall be conducting the routine maintenance and closed the process (Meurisch et al., 2016).


            According to what I observed, network and equipment maintenance is very different from information system maintenance. Network maintenance is more involving than information system maintenance. Since network maintenance is involving, it also requires and demands more time and more resources. The length of time put in the maintenance of the network and equipment should reflect the demanding nature of work. Therefore, it should be in a way that it will capture all the details required in the maintenance and ensure the network continues to serve the intended parties in the best way.

            I also observed that as much as network and equipment maintenance is involving, it also requires a team of professionals and experts other than the person who implemented or configured the network. There are many items involved in the maintenance of the network, and each should be looked in a certain way lest some are missed. The maintenance involves taking care of the finer details without which the process may miss the intended purpose.

            I observed that there is no better way to conduct network maintenance than hiring a team that is not familiar with the network. Such a team can unearth some things that the owner of the network might ignore thinking that they are irrelevant. On the same note, maintenance should be treated as a continuous process. Network maintenance does not stop because threats, risks, and vulnerabilities keep on evolving every day and without proper knowledge regarding them the network may easily become obsolete. Maintenance of a network or an information system is the most important thing to an organization or a company because it identifies all the possible risks, threats, and vulnerabilities that the network or the information system is likely to face. Therefore, it should be treated with utmost good care.


            I do not count myself as successful as I would have wanted. Most of the things did not go according to the plan until when I asked for help from the maintenance team. However, looking it in the context of the maintenance team, the process of maintaining the network and equipment was successful. I was not sure of what I was supposed to do before the team arrived. However, upon their arrival, I figured what it was all about network maintenance and how the process should be conducted. I reckon I would have failed miserably and end up risking the network due to lack of knowledge.

            When I assess what the team did, I count it as one of the most successful activities. The maintenance team was able to overhaul everything and did it afresh. There is no any other reason or way of explaining why they succeeded. The main reason here is an experience between the team and me. My maintenance of the network would also have been biased since I had implemented, installed, and configured the network. It would have been hard and probably impossible to point out my mistake in the setting up of the network. However, now the team had come in, I had no worry, and I was happy with what they did.

            Besides the exemplary performance of the maintenance team, the planning worked for the betterment of the process. I cannot figure how we would have completed the process successfully without a comprehensive plan which served as a guide and which enabled us to improve on each activity we engaged in. The network maintenance team served a valuable lesson on how to conduct such a meaningful and mission-critical exercise. Additionally, it prepared me for what I should do and how I should do it while engaging in network maintenance.

Reflective Summary

            Rescuing the network using Wi-Fi routers was an involving task. As much as it was involving, there was no better way of conducting the process than practical replacement of the wired routers with the Wi-Fi routers. Additionally, when I look feel back, I feel that I we did everything we were required to do to make it a success and if there were no any other way, it would probably not have been as good as this one. However, the method of achievement was not a success in itself. It was a culmination of determination, personal sacrifice, and giving oneself to the course. The method does not come without side effects and disadvantages on the side of the learner.

            One of the notable achievements is the Wi-Fi knowledge and concepts I accumulated during the process. I cannot deny the fact that I knew very little about the Wi-Fi routers since it is a new technology. However, I was surprised by the wealth of knowledge and concepts about Wi-Fi in the Internet and other literary materials such as books and journals. Additionally, the fact that I learned so much is attributed to the methods of learning and rescuing the network through the Wi-Fi routers that I employed. I would probably not have been successful if I had decided to do everything on my terms and in my ways. Extensive consultation with the involved parties also was helpful, and I cannot measure the value it brought to the process of rescuing the network using the Wi-Fi routers.

             I familiarized myself how things were done at each level of action research. The decision to use action research was the icing on the cake. It brought the difference it has between it and other contemporary kinds of research. Through the action research steps of planning, action, observation, and reflection, I emerged the winner. Action research helped me to plan all the activities I wanted to do and all the resources I needed to complete the activities successfully. Having planned, I would move on to conduct the activities according to the plans which also served as the guide on which I referred. Having acted on the plan, I observed the activities note anything that required improvement and which I might not have carried out according to the plan. The reflection step to evaluate what went well and according to the plan and what failed to go according to the plan and how each would be improved. The process of rescuing the network using Wi-Fi routers was a big success on big stage and which served the intended purpose.


Mahmoudi, R., Mortazavi, S. M. J., Safari, S., Nikseresht, M., Mozdarani, H., Jafari, M., &           Soleimani, A. (2015). Effects of microwave electromagnetic radiations emitted from common Wi-Fi routers on rats’ sperm count and motility. International Journal of Radiation Research13(4), 363-368.

Meurisch, C., Yakkundimath, A., Schmidt, B., & Mühlhäuser, M. (2016, February). Upgrading    Wireless Home Routers as Emergency Cloudlet: A Runtime Measurement. In Mobile          Computing, Applications, and Services: 7th International Conference, MobiCASE 2015,        Berlin, Germany, November 12-13, 2015, Revised Selected Papers (Vol. 162, p. 338).      Springer.

Panitzek, K., Schweizer, I., Schulz, A., Bönning, T., Seipel, G., & Mühlhäuser, M. (2012). Can     we use your router, please?: benefits and implications of an emergency switch for          wireless routers. International Journal of Information Systems for Crisis Response and             Management (IJISCRAM)4(4), 59-70.

Rouveyrol, P., Raveneau, P., & Cunche, M. (2015, May). Large Scale Wi-Fi tracking using a        Botnet of Wireless Routers. In Workshop on Surveillance & Technology.   

Talla, V., Kellogg, B., Ransford, B., Naderiparizi, S., Gollakota, S., & Smith, J. R. (2015).            Powering the next billion devices with wi-fi. arXiv preprint arXiv:1505.06815.

Thota, S., Bhaumik, P., Chowdhury, P., Mukherjee, B., & Sarkar, S. (2013). Exploiting wireless   connectivity for robustness in WOBAN. Network, IEEE, 27(4), 72-79.

 Sherry Roberts is the author of this paper. A senior editor at MeldaResearch.Com in research paper services if you need a similar paper you can place your order for professional research proposal writing services.

Like it? Share it!

Winnie Melda

About the Author

Winnie Melda
Joined: December 7th, 2017
Articles Posted: 364

More by this author