Page 116 / 150 Scroll up to view Page 111 - 115
Chapter 7 Wireless
VMG4381-B10A User’s Guide
116
Figure 41
WDS: Scan
The following table describes the labels in this screen.
7.8
The Others Screen
Use this screen to configure advanced wireless settings. Click
Network Setting > Wireless >
Others
. The screen appears as shown.
See
Section 7.10.2 on page 120
for detailed definitions of the terms listed in this screen.
Figure 42
Network Setting > Wireless > Others
Table 27
WDS: Scan
LABEL
DESCRIPTION
Wireless Bridge Scan Setup
Refresh
Click
Refresh
to update the table.
#
This is the index number of the entry.
SSID
This shows the SSID of the available wireless device within range.
BSSID
This shows the MAC address of the available wireless device within range.
Apply
Click
Apply
to save your changes.
Cancel
Click
Cancel
to restore your previously saved settings.
Page 117 / 150
Chapter 7 Wireless
VMG4381-B10A User’s Guide
117
The following table describes the labels in this screen.
Table 28
Network Setting > Wireless > Others
LABEL
DESCRIPTION
RTS/CTS
Threshold
Data with its frame size larger than this value will perform the RTS (Request To Send)/CTS
(Clear To Send) handshake.
Enter a value between 0 and 2347.
Fragmentation
Threshold
This is the maximum data fragment size that can be sent. Enter a value between 256 and
2346.
Auto Channel
Timer
If you set the channel to
Auto
in the
Network Setting > Wireless > General
screen,
specify the interval in minutes for how often the Device scans for the best channel. Enter 0
to disable the periodical scan.
Output Power
Set the output power of the Device. If there is a high density of APs in an area, decrease
the output power to reduce interference with other APs. Select one of the following:
20%
,
40%
,
60%
,
80%
or
100%
.
Beacon Interval
When a wirelessly networked device sends a beacon, it includes with it a beacon interval.
This specifies the time period before the device sends the beacon again.
The interval tells receiving devices on the network how long they can wait in low power
mode before waking up to handle the beacon. This value can be set from20ms to 1000ms.
A high value helps save current consumption of the access point.
DTIM Interval
Delivery Traffic Indication Message (DTIM) is the time period after which broadcast and
multicast packets are transmitted to mobile clients in the Power Saving mode. A high DTIM
value can cause clients to lose connectivity with the network. This value can be set from 1
to 100.
802.11 Mode
Select
802.11b Only
to allow only IEEE 802.11b compliant WLAN devices to associate with
the Device.
Select
802.11g Only
to allow only IEEE 802.11g compliant WLAN devices to associate with
the Device.
Select
802.11n
Only
to allow only IEEE 802.11n compliant WLAN devices to associate with
the Device.
Select
802.11b/g Mixed
to allow either IEEE 802.11b or IEEE 802.11g compliant WLAN
devices to associate with the Device. The transmission rate of your Device might be
reduced.
Select
802.11b/g/n Mixed
to allow IEEE 802.11b, IEEE 802.11g or IEEE802.11n
compliant WLAN devices to associate with the Device. The transmission rate of your Device
might be reduced.
802.11
Protection
Enabling this feature can help prevent collisions in mixed-mode networks (networks with
both IEEE 802.11b and IEEE 802.11g traffic).
Select
Auto
to have the wireless devices transmit data after a RTS/CTS handshake. This
helps improve IEEE 802.11g performance.
Select
Off
to disable 802.11 protection. The transmission rate of your Device might be
reduced in a mixed-mode network.
This field displays
Off
and is not configurable when you set
802.11 Mode
to
802.11b
Only
.
Preamble
Select a preamble type from the drop-down list box. Choices are
Long
or
Short
. See
Section 7.10.7 on page 124
for more information.
This field is configurable only when you set 802.11 Mode to
802.11b
.
Apply
Click
Apply
to save your changes.
Cancel
Click
Cancel
to restore your previously saved settings.
Page 118 / 150
Chapter 7 Wireless
VMG4381-B10A User’s Guide
118
7.9
The Channel Status Screen
Use the
Channel Status
screen to scan wireless LAN channel noises and view the results. Click
Network Setting > Wireless > Channel Status
. The screen appears as shown. Click
Scan
to
scan the wireless LAN channels. You can view the results in the
Channel Scan Result
section.
Figure 43
Network Setting > Wireless > Channel Status
7.10
Technical Reference
This section discusses wireless LANs in depth. For more information, see
Appendix D on page 331
.
7.10.1
Wireless Network Overview
Wireless networks consist of wireless clients, access points and bridges.
A wireless client is a radio connected to a user’s computer.
An access point is a radio with a wired connection to a network, which can connect with
numerous wireless clients and let them access the network.
A bridge is a radio that relays communications between access points and wireless clients,
extending a network’s range.
Traditionally, a wireless network operates in one of two ways.
Page 119 / 150
Chapter 7 Wireless
VMG4381-B10A User’s Guide
119
An “infrastructure” type of network has one or more access points and one or more wireless
clients. The wireless clients connect to the access points.
An “ad-hoc” type of network is one in which there is no access point. Wireless clients connect to
one another in order to exchange information.
The following figure provides an example of a wireless network.
Figure 44
Example of a Wireless Network
The wireless network is the part in the blue circle. In this wireless network, devices
A
and
B
use the
access point (
AP
) to interact with the other devices (such as the printer) or with the Internet. Your
Device is the AP.
Every wireless network must follow these basic guidelines.
Every device in the same wireless network must use the same SSID.
The SSID is the name of the wireless network. It stands for Service Set IDentifier.
If two wireless networks overlap, they should use a different channel.
Like radio stations or television channels, each wireless network uses a specific channel, or
frequency, to send and receive information.
Every device in the same wireless network must use security compatible with the AP.
Security stops unauthorized devices from using the wireless network. It can also protect the
information that is sent in the wireless network.
Radio Channels
In the radio spectrum, there are certain frequency bands allocated for unlicensed, civilian use. For
the purposes of wireless networking, these bands are divided into numerous channels. This allows a
Page 120 / 150
Chapter 7 Wireless
VMG4381-B10A User’s Guide
120
variety of networks to exist in the same place without interfering with one another. When you
create a network, you must select a channel to use.
Since the available unlicensed spectrum varies from one country to another, the number of
available channels also varies.
7.10.2
Additional Wireless Terms
The following table describes some wireless network terms and acronyms used in the Device’s Web
Configurator.
7.10.3
Wireless Security Overview
By their nature, radio communications are simple to intercept. For wireless data networks, this
means that anyone within range of a wireless network without security can not only read the data
passing over the airwaves, but also join the network. Once an unauthorized person has access to
the network, he or she can steal information or introduce malware (malicious software) intended to
compromise the network. For these reasons, a variety of security systems have been developed to
ensure that only authorized people can use a wireless data network, or understand the data carried
on it.
These security standards do two things. First, they authenticate. This means that only people
presenting the right credentials (often a username and password, or a “key” phrase) can access the
network. Second, they encrypt. This means that the information sent over the air is encoded. Only
people with the code key can understand the information, and only people who have been
authenticated are given the code key.
These security standards vary in effectiveness. Some can be broken, such as the old Wired
Equivalent Protocol (WEP). Using WEP is better than using no security at all, but it will not keep a
determined attacker out. Other security standards are secure in themselves but can be broken if a
user does not use them properly. For example, the WPA-PSK security standard is very secure if you
use a long key which is difficult for an attacker’s software to guess - for example, a twenty-letter
long string of apparently random numbers and letters - but it is not very secure if you use a short
key which is very easy to guess - for example, a three-letter word from the dictionary.
Table 29
Additional Wireless Terms
TERM
DESCRIPTION
RTS/CTS Threshold
In a wireless network which covers a large area, wireless devices are sometimes not
aware of each other’s presence. This may cause them to send information to the AP
at the same time and result in information colliding and not getting through.
By setting this value lower than the default value, the wireless devices must
sometimes get permission to send information to the Device. The lower the value, the
more often the devices must get permission.
If this value is greater than the fragmentation threshold value (see below), then
wireless devices never have to get permission to send information to the Device.
Preamble
A preamble affects the timing in your wireless network. There are two preamble
modes: long and short. If a device uses a different preamble mode than the Device
does, it cannot communicate with the Device.
Authentication
The process of verifying whether a wireless device is allowed to use the wireless
network.
Fragmentation
Threshold
A small fragmentation threshold is recommended for busy networks, while a larger
threshold provides faster performance if the network is not very busy.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top