Page 36 / 106 Scroll up to view Page 31 - 35
36
DI-624S User’s Manual
D-Link Systems, Inc.
Using the Configuration Menu
Advanced > Performance
Select
Short
or
Long Preamble.
The Preamble defines the length of the CRC
block (Cyclic Redundancy Check is a common technique for detecting data
transmission errors) for communication between the wireless router and the
roaming wireless network adapters.
Note: High network traffic areas should
use the shorter preamble type.
Beacons are packets sent by an Access Point to synchronize a wireless
network. Specify a value. 100 is the default setting and is recommended.
This value should remain at its default setting of 2432. If inconsistent data flow
is a problem, only a minor modification should be made.
The fragmentation threshold, which is specified in bytes, determines whether
packets will be fragmented. Packets exceeding the 2346 byte setting will be
fragmented before transmission. 2346 is the default setting.
(Delivery Traffic Indication Message)
3
is the default setting. A DTIM is a
countdown informing clients of the next window for listening to broadcast and
multicast messages.
Displayed in this window are the Wireless Performance features for the Access
Point portion of the DI-624S.
Choose
Enabled
to broadcast the SSID across the network. All devices on
a network must share the same SSID (Service Set Identifier) to establish
communication. Choose
Disabled
if you do not wish to broadcast the SSID
over the network.
Auto
is the default selection. Select from the drop down menu.
Select
GMode
if your wireless network consists of only 802.11g clients. If your
wireless network includes 802.11b clients, select
Mix Mode
.
Wireless Performance:
Beacon Interval:
RTS Threshold:
Fragmentation:
DTIM interval:
TX Rates:
Mode Setting:
Preamble Type:
SSID Broadcast:
Page 37 / 106
37
DI-624S User’s Manual
D-Link Systems, Inc.
Using the Configuration Menu
Advanced > Performance
(continued)
Super G Mode:
Super G is a group of performance enhancement features that increase end user
application throughput in an 802.11g network. Super G is backwards compatible
to standard 802.11g devices. For top performance, all wirelss devices on the
network should be Super G capable. Select either Disabled, Super G without
Turbo, or Super G with Dynamic Turbo.
Disabled:
Standard 802.11g support, no enhanced capabilities.
Super G
without Turbo:
Capable of Packet Bursting, FastFrames, Compression, and
no Turbo mode.
Super G with
DynamiC Turbo:
Capable of Packet Bursting, FastFrames, Compression, and
Dynamic Turbo. This setting is backwards compatible with
non-Turbo (legacy) devices. Dynamic Turbo mode is only
enabled when all nodes on the wireless network are Super
G with Dynamic Turbo enabled.
Page 38 / 106
38
DI-624S User’s Manual
D-Link Systems, Inc.
Using the Configuration Menu
Advanced > Folder
This page allows you to manage the USB storage devices that are connected to the USB ports on the
back of the DI-624S.
USB 1 Sharing System
Share Whole Disk:
Unplug:
New Folder Name:
Capacity:
Current Folder:
Write:
Share:
Click this button to safely remove the USB storage device that is
connected to USB 1.
Click this button to share the entire contents of the USB storage device
that is connected to USB 1.
This allows you to create new folders on the USB storage device
that is connected to USB 1.
Enter a name and then click the Create
button.
This shows you the total size, amount of used space, amount of free
space, and the percentage of used space on the USB storage device
that is connected to USB 1.
Shows you the current directory you are browsing on the USB storage
device that is connected to USB 1.
Select this checkbox to allow write permission to the corresponding
folder.
Select this checkbox to allow other users on the network to view the
contents of the corresponding folder.
Page 39 / 106
39
DI-624S User’s Manual
D-Link Systems, Inc.
Using the Configuration Menu
USB 2 Sharing System
Share Whole Disk:
Unplug:
New Folder Name:
Capacity:
Current Folder:
Write:
Share:
Advanced > Folder
(continued)
Click this button to safely remove the USB storage device that is
connected to USB 1.
Click this button to share the entire contents of the USB storage device
that is connected to USB 2.
This allows you to create new folders on the USB storage device that is
connected to USB 2.
Enter a name and then click the
Create
button.
This shows you the total size, amount of used space, amount of free
space, and the percentage of used space on the USB storage device
that is connected to USB 2.
Shows you the current directory you are browsing on the USB storage
device that is connected to USB 2.
Select this checkbox to allow write permission to the corresponding
folder.
Select this checkbox to allow other users on the network to view the
contents of the corresponding folder.
Page 40 / 106
40
DI-624S User’s Manual
D-Link Systems, Inc.
Using the Configuration Menu
Tools> Admin
At this page, the DI-624S administrator can change the system password. There are two accounts that
can access the Broadband Router’s Web-Management interface. They are admin and user. Admin has
read/write access while user has read-only access. User can only view the settings but cannot make
any changes.
Administrator:
Password:
User:
Password:
Remote Management:
IP Address:
Port:
Example:
http://x.x.x.x:8080 where x.x.x.x is the WAN IP address of the Broadband Router and 8080
is the port used for the Web-Mangement interface.
IP Address:
admin
is the
Administrator login name.
Enter the password and enter again to confirm.
user
is the
User login name.
Enter the password and enter again to confirm.
Remote management allows the DI-624S to be configured from the Internet
by a web browser. A username and password is still required to access the
Web-Management
interface. In general, only a member of your network can
browse the built-in web pages to perform
Administrator
tasks. This feature
enables you to perform Administrator tasks from the remote (Internet) host.
The Internet IP address of the computer that has access to the Broadband
Router. If you input 0.0.0.0 into this field, then any computer will be able to
access the Router. Putting 0.0.0.0 into this field would present a security risk
and is not recommended.
Input a subnet mask to define the computer or group of computers that are
allowed to access the router.
The port number used to access the Broadband Router.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top