Q
Problem solve Get help with specific problems with your technologies, process and projects.

# Solving wireless signal interference from brick walls

## Does having brick walls between my wireless router and PCI receiver pose any problems with the signal?

Does having brick walls between my wireless router and PCI receiver pose any problems with the signal?

Wi-Fi wireless routers and PCI cards exchange data using radio frequency (RF) transmissions in the 2.4 or 5 GHz bands. All radio waves gradually lose power as they are dispersed through the air; this is known as free-space path loss.

In addition, radio waves that encounter objects lose power as they are attenuated, reflected, refracted, diffracted, and/or scattered by those objects. For example, scattering occurs when a radio wave hits a rough surface (like brick), causing the wave to be reflected in many different directions at once, degrading the RF signal.

Airespace design notes estimate 2.4 GHz (802.11b/g) path loss for drywall at 4 dB, brick wall at 8 dB, and concrete wall at 10-15 dB. Loss is also impacted by how thick the wall is and whether it is dry or wet. Higher frequencies tend to experience higher loss, so 5 GHz (802.11a) path loss would probably be a little larger but still proportional.

So, what does all of this mean? Suppose your 802.11b wireless router and PCI card communicate at 11 Mbps up to 100 feet apart, separated by open space. Stick one sheetrock wall between them and that distance might drop to 50 feet. Stick one brick wall between them and that distance might fall to 30 feet. Data rates will drop from 11 to 5 to 2 to 1 Mbps with increasing distance and path loss, until eventually signal is too weak for useful communication. Your own "mileage" will vary, depending on both your products and physical environment.

This was last published in October 2004

## Content

Find more PRO+ content and other member only offers, here.

#### Have a question for an expert?

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

#### Start the conversation

Send me notifications when other members comment.

## SearchNetworking

• ### Cisco revenue turns positive, as software, security sales up

Cisco revenue grew last quarter for the first time in more than two years, due, in part, to rising software sales. But analysts ...

• ### Making the most of incident detection and response

This week, bloggers look into incident detection strategies, a new anomaly detection tool from ExtraHop and how Ethernet VPN ...

• ### Latest Juniper switches up throughput for cloud applications

The latest Juniper switches target companies that want a network infrastructure with the throughput and management software to ...

## SearchTelecom

• ### Wireless vendors count on 5G equipment sales for rescue

Wireless 5G equipment sales could take off in the next two years, possibly saving wireless vendors. AT&T increases the use of ...

• ### Big content providers influence undersea cable price drops

The undersea cable market has become increasingly competitive, as large content providers build new routes and wavelength prices ...

• ### 5G networks advance in U.S. with expanded trials

Operators' 5G networks move forward with expanded trials; wireless WPA3 standard will help secure public Wi-Fi; and Verizon ...

## SearchUnifiedCommunications

• ### Email collaboration evolves in the modern enterprise

Messaging apps are great for team collaboration, but bridging the gap between internal and external communication remains a ...

• ### Enterprises given clarity on cost of cloud services

Enterprises are gaining greater clarity about the cost of cloud services for UCC, as many IT departments are discovering that ...

• ### The evolution of unified communications technologies

Over the years, unified communications tools have evolved to incorporate different modes of collaboration. Enterprises need to be...

## SearchSecurity

• ### Olympic Destroyer malware more complex than first thought

News roundup: The Olympic Destroyer malware is more sophisticated than researchers first thought. Plus, Microsoft looks to change...

• ### SonicWall spots Meltdown exploits with machine learning tech

SonicWall says its new deep memory inspection technology, which powers the vendor's Capture Cloud sandbox service, can block ...

• ### Intel bug bounty programs widened after Meltdown and Spectre

Intel's bug bounty program expanded its scope and rewards for bugs across all Intel products, and the company added a new program...

Close