Page 21 / 41 Scroll up to view Page 16 - 20
17
Chapter 5: Configuring the Wireless-G Range Expander
The Setup Tab
Wireless-G Range Expander
Password
The Password screen allows you to change the Range Expander's password and restore factory defaults.
Changing the sign-on password for the Range Expander is as easy as typing the password into the
Password
field. Then, type it again into the second field to confirm.
To restore the Range Expander's factory default settings, click the
Yes
button beside Restore Factory
Defaults.Then, click the
Save Settings
button.
To back up your Range Expander configuration, click the
Backup
button. A File Download screen will appear and
you can click Save to backup the file to your PC. To
restore the backed-up configuration, click the
Restore
button
and select it from the same location.
Click the
Save Settings
button to apply your changes or
Cancel Changes
to cancel your changes. If you require
online help, click the
Help
button.
IMPORTANT:
Restoring the Range Expander's
factory default settings will erase all of your
Wireless and WEP settings, and replace them with
the factory defaults. Do not reset the Range
Expander if you want to retain these settings.
Figure 6-4: Setup Tab - Password
Figure 6-5: File Download
download:
to receive a file transmitted over a network
Page 22 / 41
18
Chapter 5: Configuring the Wireless-G Range Expander
The Setup Tab
Wireless-G Range Expander
Help
For help on the various tabs in this Web-based Utility, along with upgrading the Range Expander’s firmware and
viewing this User Guide, click the
Help
tab.
The help files for the various tabs in this Web-based Utility are listed by tab name on the left hand side of the
screen.
Click the
Linksys Website
link to connect to the Linksys homepage for Knowledgebase help files and information
about other Linksys products, provided you have an active Internet connection.
For an Online manual in PDF format, click that text link. (You’re viewing it right now!) The User Guide will appear
in Adobe pdf format. If you do not have the Adobe PDF Reader installed on your computer, click the
Adobe
Website
link or go to the Setup Wizard CD-ROM to download this software. (To access the Adobe website, you
will need an active Internet connection.) To download from the CD-ROM, click the
Start
button and select
Run
.
Type
D:\Acrobat
(if “D” is the letter of your CD-ROM drive).
New firmware versions are posted at www.linksys.com and can be downloaded for free. If the Range Expander is
not experiencing difficulties, then there is no need to download a more recent firmware version, unless that
version has a new feature that you want to use. Loading new firmware does not always enhance the speed or
quality of your Internet connection.
To upgrade the Range Expander’s firmware:
1.
Download the firmware upgrade file from the Linksys website.
2.
Extract the firmware upgrade file.
3.
Click the
Upgrade Firmware
button on the Help screen.
4.
Enter the location of the firmware upgrade file in the File Path field, or click the
Browse
button to find the
firmware upgrade file.
5.
Double-click the firmware upgrade file.
Click the
Upgrade
button, and follow the on-screen instructions.
Figure 6-6: Setup Tab - Help
Figure 6-7: Firmware Upgrade
upgrade:
to replace existing software or
firmware with a newer version.
Page 23 / 41
19
Appendix A: Troubleshooting
Common Problems and Solutions
Wireless-G Range Expander
Appendix A: Troubleshooting
This appendix consists of two parts: “Common Problems and Solutions” and “Frequently Asked Questions.” This
appendix provides solutions to problems that may occur during the installation and operation of the Wireless-G
Range Expander. Read the description below to solve your problems. If you can't find an answer here, check the
Linksys website at
www.linksys.com
.
Common Problems and Solutions
1.
The Wireless-G Range Expander will not connect to my Wireless-G network.
Go through this checklist:
Verify that your PC can communicate with your wireless network.
Press the Range Expander’s reset button (with a pin or a pen) for five seconds. This should reset the
Range Expander’s settings back to their default.
Disconnect the Range Expander’s power for 30 seconds. Then, connect the power again.
Press the Auto configuration button on the side of the Range Expander. As long as it is within range of an
access point or wireless router that has disabled WEP, it should communicate with it.
2.
The Setup Wizard does not detect the Range Expander.
Go through this checklist:
Press the Range Expander’s reset button (with a pin or a pen) for five seconds. This should reset the
Range Expander’s settings back to their default.
Disconnect the Range Expander’s power for 30 seconds. Then, connect the power again.
Frequently Asked Questions
Can I run an application from a remote computer over the wireless network?
This will depend on whether or not the application is designed to be used over a network. Consult the
application’s user guide to determine if it supports operation over a network.
Can I play multiplayer games with other users of the wireless network?
Yes, as long as the game supports multiple players over a network. Refer to the game’s user guide for more
information.
What IEEE 802.11b features are supported?
The product supports the following IEEE 802.11 functions:
•CSMA/CA plus Acknowledge protocol
Page 24 / 41
20
Appendix A: Troubleshooting
Frequently Asked Questions
Wireless-G Range Expander
•Multi-Channel Roaming
•Automatic Rate Selection
•RTS/CTS feature
•Fragmentation
•Power Management
What is Ad-hoc?
An Ad-hoc wireless network is a group of computers, each with a wireless adapter, connected as an
independent wireless network. An Ad-hoc wireless network is applicable at a departmental scale for a branch
or SOHO operation.
What is Infrastructure?
An integrated wireless and wired network is called an Infrastructure configuration. Infrastructure is
applicable to enterprise scale for wireless access to a central database, or wireless application for mobile
workers.
What is Roaming?
Roaming is the ability of a portable computer user to communicate continuously while moving freely
throughout an area greater than that covered by a single access point. Before using the roaming function, the
workstation must make sure that it is the same channel number as the network within the coverage area.
To achieve true seamless connectivity, the wireless network must incorporate a number of different functions.
Each node, for example, must always acknowledge receipt of each message. Each node must maintain
contact with the wireless network even when not actually transmitting data. Achieving these functions
simultaneously requires a dynamic RF networking technology that links nodes. In such a system, the user’s
end node undertakes a search for the best possible access to the system. First, it evaluates such factors as
signal strength and quality, as well as the message load currently being carried in the network. Based on that
information, the node next selects the right access point and registers its address. Communications between
end node and host computer can then be transmitted up and down the backbone.
As the user moves on, the end node’s RF transmitter regularly checks the system to determine whether it is in
touch with the original access point or whether it should seek a new one. When a node no longer receives
acknowledgment from its original access point, it undertakes a new search. Upon finding a new access point,
it then re-registers, and the communication process continues.
What is ISM band?
The FCC and their counterparts outside of the U.S. have set aside bandwidth for unlicensed use in the ISM
(Industrial, Scientific and Medical) band. Spectrum in the vicinity of 2.4 GHz, in particular, is being made
available worldwide. This presents a truly revolutionary opportunity to place convenient high speed wireless
capabilities in the hands of users around the globe.
Page 25 / 41
21
Appendix A: Troubleshooting
Frequently Asked Questions
Wireless-G Range Expander
What is Spread Spectrum?
Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in
reliable, secure, mission-critical communications systems. It is designed to trade off bandwidth efficiency for
reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband
transmission, but the trade-off produces a signal that is, in effect, louder and thus easier to detect, provided
that the receiver knows the parameters of the spread-spectrum signal being broadcast. If a receiver is not
tuned to the right frequency, a spread-spectrum signal looks like background noise. There are two main
alternatives, Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS).
What is DSSS? What is FHSS? And what are their differences?
Frequency Hopping Spread Spectrum (FHSS) uses a narrowband carrier that changes frequency in a pattern
that is known to both transmitter and receiver. Properly synchronized, the net effect is to maintain a single
logical channel. To an unintended receiver, FHSS appears to be short-duration impulse noise. Direct Sequence
Spread Spectrum (DSSS) generates a redundant bit pattern for each bit to be transmitted. This bit pattern is
called a chip (or chipping code). The longer the chip, the greater the probability that the original data can be
recovered. Even if one or more bits in the chip are damaged during transmission, statistical techniques
embedded in the radio can recover the original data without the need for retransmission. To an unintended
receiver, DSSS appears as low power wideband noise and is rejected (ignored) by most narrowband
receivers.
Would the information be intercepted while transmitting on air?
Wireless networks feature two-fold protection. On the hardware side, as with Direct Sequence Spread
Spectrum technology, it has the inherent security feature of scrambling. On the software side, the wireless
series offers the encryption function (WEP) to enhance security and access control. Users can set it up
depending upon their needs.
Can Linksys Wireless products support file and printer sharing?
Linksys Wireless products can work with Netware, Windows NT/2000, or other operating systems to support
printer or file sharing.
What is WEP?
WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40-bit shared-key algorithm, as
described in the IEEE 802.11 standard.
What is a MAC Address?
The Media Access Control (MAC) address is a unique number assigned by the manufacturer to any networking
device, such as a network adapter, that allows the network to identify it at the hardware level.
For all
practical purposes, this number is usually permanent.
Unlike IP addresses, which can change every time a
computer logs on to the network, the MAC address of a device stays the same, making it a valuable identifier
for the network.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top