ZyXEL Communications AG-200 manual Authentication Type, RTS Threshold

Page 41

ZyXEL AG-200 User’s Guide

Figure 2-8 RTS Threshold

When station A sends data to the AP, it might not know that the station B is already using the channel. If these two stations send data at the same time, collisions may occur when both sets of data arrive at the AP at the same time, resulting in a loss of messages for both stations.

RTS/CTS Threshold is designed to prevent collisions due to hidden nodes. An RTS/CTS Threshold defines the biggest size data frame you can send before an RTS (Request To Send)/CTS (Clear to Send) handshake is invoked.

When a data frame exceeds the RTS/CTS Threshold value you set (between 0 to 2432 bytes), the station that wants to transmit this frame must first send an RTS (Request To Send) message to the AP for permission to send it. The AP then responds with a CTS (Clear to Send) message to all other stations within its range to notify them to defer their transmission. It also reserves and confirms with the requesting station the time frame for the requested transmission.

Stations can send frames smaller than the specified RTS/CTS Threshold directly to the AP without the RTS (Request To Send)/CTS (Clear to Send) handshake.

You should only configure RTS/CTS Threshold if the possibility of hidden nodes exists on your network and the “cost” of resending large frames is more than the extra network overhead involved in the RTS (Request To Send)/CTS (Clear to Send) handshake.

If the RTS/CTS Threshold value is greater than the Fragmentation Threshold value (see next), then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS Threshold size.

Enabling the RTS Threshold causes redundant network overhead that could

negatively affect the throughput performance.

2.5Authentication Type

The IEEE 802.11b standard describes a simple authentication method between the wireless stations and AP. Two authentication modes are defined: Open and Share.

WLAN Networking

2-9

Image 41
Contents ZyXEL AG-200 Trademarks Copyright 2004 by ZyXEL Communications CorporationDisclaimer Online Registration ZyXEL Limited WarrantyFCC Statement Customer Support Table of Contents ZyXEL AG-200 User’s Guide Syntax Conventions About This Users GuideRelated Documentation User Guide FeedbackGraphics Icons Key Page About Your ZyXEL AG-200 ZyXEL AG-200 Hardware and Utility InstallationUsing the ZyXEL Utility to Configure Your Network ZyXEL AG-200 User’s Guide Network Add ProfileZyXEL AG-200 User’s Guide ZyXEL AG-200 User’s Guide ZyXEL AG-200 User’s Guide Properties RemoveApply Each page in Properties is explained below ZyXEL AG-200 User’s Guide ZyXEL AG-200 User’s Guide Security Mode ZyXEL AG-200 User’s Guide ZyXEL AG-200 User’s Guide ZyXEL AG-200 User’s Guide Strong Scan Site SurveyRefresh Detail Info Add to profile ConnectLaunch at windows startup OptionsAuto Dhcp renewal Auto-Profile SelectionZyXEL AG-200 User’s Guide Getting Started Version Page Overview Wireless Network ApplicationSsid ChannelBSS Example Ad-Hoc IbssInfrastructure Network Example RoamingRoaming Example Wireless LAN SecurityData Encryption with WEP EAP AuthenticationIeee 3 WPAEncryption User AuthenticationWPA-PSK Application Example WPA with Radius Application Example WPA-PSK AuthenticationRTS/CTS Threshold Fragmentation ThresholdRTS Threshold Authentication TypeZyXEL AG-200 User’s Guide Version Screen Chapter MaintenanceAbout Uninstalling the ZyXEL UtilityUpgrading the ZyXEL Utility Page Configuring WEP Configuring SecurityZyXEL AG-200 User’s Guide Configuring WPA-PSK Configuring 802.1x EAP-MD5 Configuring WPAConfiguring Configuring 802.1x EAP-PEAP Configuring 802.1x EAP-LEAPZyXEL AG-200 User’s Guide Configuring 802.1x EAP-TLS ZyXEL AG-200 User’s Guide Configuring 802.1x EAP-TTLS ZyXEL AG-200 User’s Guide Problem with the Link Status Problems Starting the ZyXEL Utility ProgramTroubleshooting Starting ZyXEL Utility Program Troubleshooting Link QualityTroubleshooting Communication Problems Problems Communicating With Other ComputersEAP-MD5 Message-Digest Algorithm EAP-TTLS Tunneled Transport Layer ServiceEAP-TLS Transport Layer Security Peap Protected EAPLeap Comparison of EAP Authentication Types
Related manuals
Manual 2 pages 60.26 Kb