Page 86 / 128 Scroll up to view Page 81 - 85
Reference Manual for the NETGEAR ProSafe Wireless Access Point 802.11g WG302
6-4
Troubleshooting
July 2005 v3.0
Using the Reset Button to Restore Factory Default Settings
The Reset button (see
“WG302 rear panel” on page 2-7
) has two functions:
Reboot.
When pressed and released quickly, the WG302 will reboot (restart).
Reset to Factory Defaults.
This button can also be used to clear ALL data and restore ALL
settings to the factory default values.
To clear all data and restore the factory default values:
1.
Power off the WG302 and power it back on.
2.
Use something with a small point, such as a pen, to press the Reset button in and hold it in for
at least 5 seconds.
3.
Release the Reset button.
The factory default configuration has now been restored, and the WG302 is ready for use.
Page 87 / 128
Reference Manual for the NETGEAR ProSafe Wireless Access Point 802.11g WG302
Specifications
A-1
July 2005 v3.0
Appendix A
Specifications
This appendix provides technical specifications for the NETGEAR ProSafe Wireless Access Point
802.11g WG302.
Specifications for the WG302
Parameter
NETGEAR ProSafe Wireless Access Point 802.11g WG302
802.11g Data Rates
1, 2, 5.5, 11, 12, 18, 24, 36, 38, 54, & 108 Mbps (Auto-rate capable)
802.11g
Operating Frequencies
2.412 ~ 2.462 GHz (US)
2.457 ~ 2.462 GHz (Spain)
2.412 ~ 2.484 GHz (Japan)
2.457 ~ 2.472 GHz (France)
2.412 ~ 2.472 GHz (Europe ETSI)
802.11g Encryption
40-bits (also called 64-bits), 128- and 152-bits WEP data encryption
Network Management
Web-based configuration and status monitoring
Maximum Clients
Limited by the amount of wireless network traffic generated by each node;
typically 15 to 20 nodes.
Status LEDs
Power/Ethernet LAN/Wireless LAN/Test
Power Adapter
12V DC, 1.2 A
Electromagnetic
Compliance
FCC Part 15 Class B and Class E
Environmental
Specifications
Operating temperature: 0 to 50° C
Operating humidity: 5-95%, non-condensing
Page 88 / 128
Reference Manual for the NETGEAR ProSafe Wireless Access Point 802.11g WG302
A-2
Specifications
July 2005 v3.0
Page 89 / 128
Wireless Networking Basics
B-1
July 2005 v3.0
Appendix B
Wireless Networking Basics
This chapter provides an overview of Wireless networking.
Wireless Networking Overview
The WG302 Access Point conforms to the Institute of Electrical and Electronics Engineers (IEEE)
802.11b and 802.11g standards for wireless LANs (WLANs). On an 802.11b or g wireless link,
data is encoded using direct-sequence spread-spectrum (DSSS) technology and is transmitted in
the unlicensed radio spectrum at 2.5GHz. The maximum data rate for the 802.11b wireless link is
11 Mbps, but it will automatically back down from 11 Mbps to 5.5, 2, and 1 Mbps when the radio
signal is weak or when interference is detected. The 802.11g auto rate sensing rates are 1, 2, 5.5, 6,
9, 12, 18, 24, 36, 48, and 54 Mbps.
The 802.11 standard is also called Wireless Ethernet or Wi-Fi by the Wireless Ethernet
Compatibility Alliance (WECA, see
), an industry standard group promoting
interoperability among 802.11 devices. The 802.11 standard offers two methods for configuring a
wireless network - ad hoc and infrastructure.
Infrastructure Mode
With a wireless Access Point, you can operate the wireless LAN in the infrastructure mode. This
mode provides wireless connectivity to multiple wireless network devices within a fixed range or
area of coverage, interacting with wireless nodes via an antenna.
In the infrastructure mode, the wireless access point converts airwave data into wired Ethernet
data, acting as a bridge between the wired LAN and wireless clients. Connecting multiple Access
Points via a wired Ethernet backbone can further extend the wireless network coverage. As a
mobile computing device moves out of the range of one access point, it moves into the range of
another. As a result, wireless clients can freely roam from one Access Point domain to another and
still maintain seamless network connection.
Page 90 / 128
Reference Manual for the NETGEAR ProSafe Wireless Access Point 802.11g WG302
B-2
Wireless Networking Basics
July 2005 v3.0
Ad Hoc Mode (Peer-to-Peer Workgroup)
In an ad hoc network, computers are brought together as needed; thus, there is no structure or fixed
points to the network - each node can generally communicate with any other node. There is no
Access Point involved in this configuration. This mode enables you to quickly set up a small
wireless workgroup and allows workgroup members to exchange data or share printers as
supported by Microsoft networking in the various Windows operating systems. Some vendors also
refer to ad hoc networking as peer-to-peer group networking.
In this configuration, network packets are directly sent and received by the intended transmitting
and receiving stations. As long as the stations are within range of one another, this is the easiest
and least expensive way to set up a wireless network.
Network Name: Extended Service Set Identification (ESSID)
The Extended Service Set Identification (ESSID) is one of two types of Service Set Identification
(SSID). In an ad hoc wireless network with no access points, the Basic Service Set Identification
(BSSID) is used. In an infrastructure wireless network that includes an access point, the ESSID is
used, but may still be referred to as SSID.
An SSID is a thirty-two character (maximum) alphanumeric key identifying the name of the
wireless local area network. Some vendors refer to the SSID as network name. For the wireless
devices in a network to communicate with each other, all devices must be configured with the
same SSID.
The ESSID is usually broadcast in the air from an access point. The wireless station sometimes can
be configured with the ESSID
ANY.
This means the wireless station will try to associate with
whichever access point has the stronger radio frequency (RF) signal, providing that both the access
point and wireless station use Open System authentication.
Authentication and WEP Data Encryption
The absence of a physical connection between nodes makes the wireless links vulnerable to
eavesdropping and information theft. To provide a certain level of security, the IEEE 802.11
standard has defined these two types of authentication methods:
Open System
. With Open System authentication, a wireless computer can join any network
and receive any messages that are not encrypted.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top