Page 66 / 172 Scroll up to view Page 61 - 65
64
C
HAPTER
5: C
ONFIGURING
THE
R
OUTER
Connection Control
This feature is used to filter the clients based on their MAC addresses.
Using this function, you can limit the access right of the wireless clients to
this Router.
Check the
Enable MAC Address Filtering
checkbox, the Connection
Control screen will appear.
Figure 47
Connection Control Screen
There are two options available in the
Access rule for registered MAC
address
field:
if you click
Allow
, this means only the MAC addresses registered here
in the list will be allowed to access the Router via wireless link.
if you click
Deny
, this means the registered MAC addresses will not be
able to access the Router via wireless link.
Use the
MAC Address Filtering List
to quickly copy the MAC addresses of
the current wireless clients into the list table. You can define up to 32
MAC addresses to the list.
You can click
Clear
to delete the current entry in the list.
Downloaded from
www.Manualslib.com
manuals search engine
Page 67 / 172
Wireless Settings
65
Client List
You can view the list of all wireless clients that are connected to the
Router.
Figure 48
Client List Screen
Click
Refresh
to update the list.
WMM
Wireless Multimedia (WMM) mode, which supports devices that meet the
801.11e QBSS standard. WMM uses traffic priority based on the four
ACs; Voice, Video, Best Effort, and Background. The higher the AC
priority, the higher the probability that data is transmitted.
Check the
Enable WMM Function
box, the WMM parameters table will
appear.
Figure 49
WMM Screen
Downloaded from
www.Manualslib.com
manuals search engine
Page 68 / 172
66
C
HAPTER
5: C
ONFIGURING
THE
R
OUTER
Access Categories – WMM defines four access categories (ACs): voice,
video, best effort, and background. These categories correspond to traffic
priority levels and are mapped to IEEE 802.1D priority tags. The direct
mapping of the four ACs to 802.1D priorities is specifically intended to
facilitate inter operability with other wired network QoS policies. While
the four ACs are specified for specific types of traffic, WMM allows the
priority levels to be configured to match any network-wide QoS policy.
WMM also specifies a protocol that access points can use to
communicate the configured traffic priority levels to QoS-enabled
wireless clients.
The following table explains the four access categories:
AIFS (Arbitration Inter-Frame Space) – The minimum amount of wait time
before the next data transmission attempt. Specify the AIFS value in the
range 0-15 microseconds.
CWMax (Maximum Contention Window) – The maximum upper limit of
the random backoff wait time before wireless medium access can be
attempted. The contention window is doubled after each detected
collision up to the CWMax value. Specify the CWMax value in the range
0-15 microseconds. Note that the CWMax value must be greater or equal
to the CWMin value.
Access Category
WMM
Designation
Description
802.1D
Tags
AC_BE (AC0)
Best Effort
Normal priority, medium
delay and throughput. Data
only affected by long delays.
Data from applications or
devices that lack QoS
capabilities.
0, 3
AC_BK (AC1)
Background
Lowest priority. Data with no
delay or throughput
requirements, such as bulk
data transfers.
2, 1
AC_VI (AC2)
Video
High priority, minimum
delay. Time-sensitive data
such as streaming video.
5, 4
AC_VO (AC3)
Voice
Highest priority, minimum
delay. Time-sensitive data
such as VoIP (Voice over IP)
calls.
7, 6
Downloaded from
www.Manualslib.com
manuals search engine
Page 69 / 172
Wireless Settings
67
CWMin (Minimum Contention Window) – The initial upper limit of the
random backoff wait time before wireless medium access can be
attempted. The initial wait time is a random value between zero and the
CWMin value. Specify the CWMin value in the range 0-15 microseconds.
Note that the CWMin value must be equal or less than the CWMax value.
TXOP Limit (Transmit Opportunity Limit) – The maximum time an AC
transmit queue has access to the wireless medium. When an AC queue is
granted a transmit opportunity, it can transmit data for a time up to the
TxOpLimit. This data bursting greatly improves the efficiency for high
data-rate traffic. Specify a value in the range 0-65535 microseconds.
ACM – Admission Control Mode, for the access category. When enabled,
clients are blocked from using the access category. (Default: Disabled)
Ack Policy (WMM Acknowledge Policy) – By default, all wireless data
transmissions require the sender to wait for an acknowledgement from
the receiver. WMM allows the acknowledgement wait time to be turned
off for each Access Category (AC). Although this increases data
throughput, it can also result in a high number of errors when traffic
levels are heavy. (Default: Acknowledge)
Downloaded from
www.Manualslib.com
manuals search engine
Page 70 / 172
68
C
HAPTER
5: C
ONFIGURING
THE
R
OUTER
WDS
The Router supports WDS (Wireless Distribution System). WDS enables
one or more Access Points to rebroadcast received signals to extend
range and reach, though this can affect the overall throughput of data.
Note that WDS implementation can vary from product to product. Hence
there is no guarantee that different products will interoperate. In
addition, the security settings for WDS links should be the same as the
one setup for your wireless clients.
Figure 50
Wireless WDS Settings Screen
1
Check the
Enable WDS Function
checkbox.
2
To refresh the list of available access points, click
Rescan Wireless
Networking
. If the MAC address of the desired APs is in the list of
scanned APs, you can simply check those APs to add them to the WDS.
3
Click
Add
to add the MAC address of the AP to the list (up to 4 APs can
be added), the add WDS screen will appear (refer to
Figure 51
).
Downloaded from
www.Manualslib.com
manuals search engine

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top