Page 31 / 46 Scroll up to view Page 26 - 30
26
Introduction
Wireless-G Exterior Access Point with Power Over Ethernet
Appendix A
To achieve true seamless connectivity, the wireless
LAN must incorporate a number of different functions.
Each node and Access Point, for example, must always
acknowledge receipt of each message. Each node must
maintain contact with the wireless network even when
not actually transmitting data. Achieving these functions
simultaneously
requires
a
dynamic
RF
networking
technology that links Access Points and nodes. In such
a system, the user’s end node undertakes a search for
the best possible access to the system. First, it evaluates
such factors as signal strength and quality, as well as the
message load currently being carried by each Access
Point and the distance of each Access Point to the wired
backbone. Based on that information, the node next
selects the right Access Point and registers its address.
Communications between end node and host computer
can then be transmitted up and down the backbone.
As the user moves on, the end node’s RF transmitter
regularly checks the system to determine whether it
is in touch with the original Access Point or whether
it should seek a new one. When a node no longer
receives acknowledgment from its original Access Point,
it undertakes a new search. Upon finding a new Access
Point, it then re-registers, and the communication process
continues.
What is the ISM band?
The FCC and their counterparts outside of the U.S. have set
aside bandwidth for unlicensed use in the ISM (Industrial,
Scientific and Medical) band. Spectrum in the vicinity of
2.4 GHz, in particular, is being made available worldwide.
This presents a truly revolutionary opportunity to place
convenient high speed wireless capabilities in the hands
of users around the globe.
What is Spread Spectrum?
Spread
Spectrum
technology
is
a
wideband
radio
frequency technique developed by the military for use
in
reliable,
secure,
mission-critical
communications
systems. It is designed to trade off bandwidth efficiency
for reliability, integrity, and security. In other words, more
bandwidth is consumed than in the case of narrowband
transmission, but the trade-off produces a signal that
is, in effect, louder and thus easier to detect, provided
that the receiver knows the parameters of the spread-
spectrum signal being broadcast. If a receiver is not tuned
to the right frequency, a spread-spectrum signal looks
like background noise. There are two main alternatives,
Direct Sequence Spread Spectrum (DSSS) and Frequency
Hopping Spread Spectrum (FHSS).
What is DSSS? What is FHSS? And what are their
differences?
Frequency Hopping Spread Spectrum (FHSS) uses a
narrowband carrier that changes frequency in a pattern
that is known to both transmitter and receiver. Properly
synchronized, the net effect is to maintain a single logical
channel. To an unintended receiver, FHSS appears to be
short-duration impulse noise. Direct Sequence Spread
Spectrum (DSSS) generates a redundant bit pattern for
each bit to be transmitted. This bit pattern is called a
chip (or chipping code). The longer the chip, the greater
the probability that the original data can be recovered.
Even if one or more bits in the chip are damaged during
transmission, statistical techniques embedded in the
radio can recover the original data without the need for
retransmission. To an unintended receiver, DSSS appears
as low power wideband noise and is rejected (ignored) by
most narrowband receivers.
Would the information be intercepted while transmitting
on air?
WLAN features two-fold protection in security. On the
hardware side, as with Direct Sequence Spread Spectrum
technology, it has the inherent security feature of
scrambling. On the software side, the WLAN series offers
a variety of wireless security methods to enhance security
and access control. Users can set it up depending upon
their needs.
Can Linksys wireless products support file and printer
sharing?
Linksys wireless products perform the same function as
LAN products. Therefore, Linksys wireless products can
work with NetWare, Windows NT/2000, or other LAN
operating systems to support printer or file sharing.
What is WEP?
WEP is Wired Equivalent Privacy, a data privacy mechanism
based on a 40-bit shared-key algorithm, as described in
the IEEE 802.11 standard.
What is a MAC Address?
The Media Access Control (MAC) address is a unique
number assigned by the manufacturer to any Ethernet
networking device, such as a network adapter, that allows
the network to identify it at the hardware level. For all
practical purposes, this number is usually permanent.
Unlike IP addresses, which can change every time a
computer logs on to the network, the MAC address of a
device stays the same, making it a valuable identifier for
the network.
Page 32 / 46
27
Introduction
Wireless-G Exterior Access Point with Power Over Ethernet
Appendix A
How do I avoid interference?
Using multiple Access Points on the same channel and in
close proximity to one another will generate interference.
When employing multiple Access Points, make sure to
operate each one on a different channel (frequency).
How do I reset the Access Point?
Press the Reset button on the back of the Access Point for
about ten seconds. This will reset the unit to its default
settings.
How do I resolve issues with signal loss?
There is no way to know the exact range of your wireless
network without testing. Every obstacle placed between
an Access Point and wireless PC will create signal loss.
Leaded glass, metal, concrete floors, water, and walls will
inhibit the signal and reduce range. Start with your Access
Point and your wireless PC in the same room and move
it away in small increments to determine the maximum
range in your environment.
You may also try using different channels, as this may
eliminate interference affecting only one channel. Also,
open the Access Point’s Web-based Utility. Click the
Wireless tab and then the Advanced Wireless tab. Make
sure the Output Power is set to 100%.
Does the Access Point function as a firewall?
No. The Access Point is only a bridge from wired Ethernet
to wireless clients.
I have excellent signal strength, but I cannot see my
network.
Wireless security, such as WEP or WPA, is probably enabled
on the Access Point, but not on your wireless adapter (or
vice versa). Verify that the same wireless security settings
are being used on all devices in your wireless network.
What is the maximum number of users the Access Point
can handle?
No more than 65, but this depends on the volume of data
and may be fewer if many users create a large amount of
network traffic.
WEB:
If your questions are not addressed here,
refer to the Linksys website,
www.linksys.com
Page 33 / 46
28
Wireless Security Checklist
Wireless-G Exterior Access Point with Power Over Ethernet
Appendix B
Appendix B:
Wireless Security Checklist
Wireless networks are convenient and easy to install, so
homes with high-speed Internet access are adopting them
at a rapid pace. Because wireless networking operates by
sending information over radio waves, it can be more
vulnerable to intruders than a traditional wired network.
Like signals from your cellular or cordless phones, signals
from your wireless network can also be intercepted. Since
you cannot physically prevent someone from connecting
to your wireless network, you need to take some additional
steps to keep your network secure.
1. Change the default wireless
network name or SSID
Wireless devices have a default wireless network name
or Service Set Identifier (SSID) set by the factory. This
is the name of your wireless network, and can be up
to 32 characters in length. Linksys wireless products
use
linksys
as the default wireless network name. You
should change the wireless network name to something
unique to distinguish your wireless network from other
wireless networks that may exist around you, but do not
use personal information (such as your Social Security
number) because this information may be available for
anyone to see when browsing for wireless networks.
2. Change the default password
For wireless products such as access points and routers,
you will be asked for a password when you want to change
their settings. These devices have a default password set
by the factory. The Linksys default password is
admin
.
Hackers know these defaults and may try to use them
to access your wireless device and change your network
settings. To thwart any unauthorized changes, customize
the device’s password so it will be hard to guess.
3. Enable MAC address filtering
Linksys routers give you the ability to enable Media Access
Control (MAC) address filtering. The MAC address is a
unique series of numbers and letters assigned to every
networking device. With MAC address filtering enabled,
wireless network access is provided solely for wireless
devices with specific MAC addresses. For example, you can
specify the MAC address of each computer in your home
so that only those computers can access your wireless
network.
4. Enable encryption
Encryption protects data transmitted over a wireless
network. Wi-Fi Protected Access (WPA/WPA2) and Wired
Equivalency Privacy (WEP) offer different levels of security
for wireless communication. Currently, devices that are
Wi-Fi certified are required to support WPA2, but are not
required to support WEP.
A network encrypted with WPA/WPA2 is more secure
than a network encrypted with WEP, because WPA/WPA2
uses dynamic key encryption. To protect the information
as it passes over the airwaves, you should enable the
highest level of encryption supported by your network
equipment.
WEP is an older encryption standard and may be the
only option available on some older devices that do not
support WPA.
General Network Security Guidelines
Wireless network security is useless if the underlying
network is not secure.
Password protect all computers on the network and
individually password protect sensitive files.
Change passwords on a regular basis.
Install
anti-virus
software
and
personal
firewall
software.
Disable file sharing (peer-to-peer). Some applications
may open file sharing without your consent and/or
knowledge.
Additional Security Tips
Keep wireless routers, access points, or gateways away
from exterior walls and windows.
Turn wireless routers, access points, or gateways
off when they are not being used (at night, during
vacations).
Use strong passphrases that are at least eight characters
in length. Combine letters and numbers to avoid using
standard words that can be found in the dictionary.
Page 34 / 46
29
Glossary
Wireless-G Exterior Access Point with Power Over Ethernet
Appendix C
Appendix C:
Glossary
This glossary contains some basic networking terms you
may come across when using this product.
WEB:
For additional terms, please visit the
glossary at
www.linksys.com/glossary
Access Mode
Specifies the method by which user access
is granted to the system.
Access Point
A device that allows wireless-equipped
computers and other devices to communicate with a
wired network. Also used to expand the range of a wireless
network.
Access Profiles
Allows network managers to define
profiles and rules for accessing the device. Access to
management functions can be limited to user groups,
which are defined by the following criteria:
Ingress interfaces
Source IP address and/or Source IP subnets.
ACE
Filters in Access Control Lists (ACL) that determine
which network traffic is forwarded. An ACE is based on the
following criteria:
Protocol
Protocol ID
Source Port
Destination Port
Wildcard Mask
Source IP Address
Destination IP Address
ACL (Access Control List)
Access Control Lists are
used to grant, deny, or limit access devices, features, or
applications.
Auto-negotiation
Allows 10/100 Mbps or 10/100/1000
Mbps Ethernet ports to automatically establish the
optimal duplex mode, flow control, and speed.
Back Pressure
A mechanism used with Half Duplex mode
that enables a port not to receive a message.
Bandwidth
The transmission capacity of a given device
or network.
Bandwidth
Assignments
Indicates
the
amount
of
bandwidth assigned to a specific application, user, and/or
interface.
Baud
Indicates
the
number
of
signaling
elements
transmitted each second.
Best Effort
Indicates that traffic is assigned to the lowest
priority queue, and packet delivery is not guaranteed.
Bit
A binary digit.
Boot
To start a device and cause it to start executing
instructions.
Browser
An application program that provides a way to
look at and interact with all the information on the World
Wide Web.
Bridge
A device that connect two networks. Bridges are
hardware specific, however they are protocol independent.
Bridges operate at Layer 1 and Layer 2 levels.
Broadcast Domain
Devices sets that receive broadcast
frames originating from any device within a designated
set. Routers bind Broadcast domains, because routers do
not forward broadcast frames.
Broadcast Storm
An excessive amount of broadcast
messages simultaneously transmitted across a network
by a single port. Forwarded message responses are
heaped onto the network, overloading network resources
or causing the network to time out.
Burst
A packet transmission at faster than normal rates.
Bursts are limited in time and only occur under specific
conditions.
Burst Size
Indicates the burst size transmitted at a faster
than normal rate.
Byte
A unit of data that is usually eight bits long
Cable Modem
A device that connects a computer to the
cable television network, which in turn connects to the
Internet.
CBS (Committed Burst Size)
Indicates the maximum
number of data bits transmitted within a specific time
interval.
CIR (Committed Information Rate)
The data rate is
averaged over a minimum time increment.
Class Maps
An aspect of Quality of Service system that is
comprised of an IP ACL and/or a MAC ACL. Class maps are
configured to match packet criteria, and are matched to
packets in a first-fit fashion.
Combo Ports
A single logical port with two physical
connections, including an RJ-45 connection and a SFP
connection.
Communities
Specifies a group of users which retain the
same system access rights.
Page 35 / 46
30
Glossary
Wireless-G Exterior Access Point with Power Over Ethernet
Appendix C
CoS (Class of Service)
The 802.1p priority scheme. CoS
provides a method for tagging packets with priority
information. A CoS value between 0-7 is added to the
Layer II header of packets, where zero is the lowest priority
and seven is the highest.
DDNS (Dynamic Domain Name System)
Allows the
hosting of a website, FTP server, or e-mail server with a
fixed domain name (e.g., www.xyz.com) and a dynamic IP
address.
Default Gateway
A device that forwards Internet traffic
from your local area network.
DHCP
(Dynamic
Host
Configuration
Protocol)
A
networking protocol that allows administrators to assign
temporary IP addresses to network computers by “leasing”
an IP address to a user for a limited amount of time, instead
of assigning permanent IP addresses.
DHCP Clients
An Internet host using DHCP to obtain
configuration parameters, such as a network address.
DHCP Server
An Internet host that returns configuration
parameters to DHCP clients.
DNS (Domain Name Server)
The IP address of your ISP’s
server, which translates the names of websites into IP
addresses.
Domain
A specific name for a network of computers.
Download
To receive a file transmitted over a network.
DSL (Digital Subscriber Line)
An always-on broadband
connection over traditional phone lines.
DSCP (DiffServ Code Point)
Provides a method of
tagging IP packets with QoS priority information.
Dynamic IP Address
A temporary IP address assigned by
a DHCP server.
EIGRP
(Enhanced
Interior
Gateway
Routing
Protocol)
Provides
fast
convergence,
support
for
variable-length subnet mask, and supports multiple
network layer protocols.
Encryption
Encoding data transmitted in a network.
Ethernet
IEEE standard network protocol that specifies
how data is placed on and retrieved from a common
transmission medium.
Firmware
The programming code that runs a networking
device.
Flow
Control
Enables
lower
speed
devices
to
communicate
with
higher
speed
devices.
This
is
implemented by the higher speed device refraining from
sending packets.
FTP (File Transfer Protocol)
A protocol used to transfer
files over a TCP/IP network.
Full Duplex
The ability of a networking device to receive
and transmit data simultaneously.
GARP (General Attributes Registration Protocol)
Registers client stations into a multicast domain.
Gateway
A device that interconnects networks with
different, incompatible communications protocols.
GBIC (GigaBit Interface Converter)
A hardware module
used to attach network devices to fiber-based transmission
systems. GBIC converts the serial electrical signals to serial
optical signals and vice versa.
GVRP (GARP VLAN Registration Protocol)
Registers
client stations into a VLANs.
Half Duplex
Data transmission that can occur in two
directions over a single line, but only one direction at a
time.
HTTP
(HyperText
Transport
Protocol)
The
communications protocol used to connect to servers on
the World Wide Web.
HTTPS
(HyperText Transport
Protocol
Secure)
An
extension to the standard HTTP protocol that provides
confidentiality by encrypting the traffic from the website.
By default this protocol uses TCP port 443.
ICMP (Internet Control Message Protocol)
Allows the
gateway or destination host to communicate with the
source host. For example, to report a processing error.
IGMP (Internet Group Management Protocol)
Allows
hosts to notify their local switch or router that they want
to receive transmissions assigned to a specific multicast
group.
IP (Internet Protocol)
A protocol used to send data over
a network.
IP Address
The address used to identify a computer or
device on a network.
IPCONFIG
A Windows 2000 and XP utility that displays
the IP address for a particular networking device.
IPSec (Internet Protocol Security)
A VPN protocol used
to implement secure exchange of packets at the IP layer.
ISP (Internet Service Provider)
A company that provides
access to the Internet.
Jumbo Frames
Enable transporting identical data in
fewer frames. Jumbo Frames reduce overhead, lower
processing time, and ensure fewer interrupts.
LAG (Link Aggregated Group)
Aggregates ports or
VLANs into a single virtual port or VLAN.
LAN
The computers and networking products that make
up your local network.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top