Rosewill RNX-N400LX What is Fragment Threshold?, What is RTS Request to Send Threshold?

Page 56

Wireless RouterRNX-N400LX

User Manual

 

 

 

 

 

 

encryption keys that both source and destination stations can use to alert frame bits to avoid disclosure to eavesdroppers. WEP relies on a secret key that is shared between a mobile station (e.g. a laptop with a wireless Ethernet card) and an access point (i.e. a base station). The secret key is used to encrypt packets before they are transmitted, and an integrity check is used to ensure that packets are not modified in transit.

10. What is Fragment Threshold?

The proposed protocol uses the frame fragmentation mechanism defined in IEEE 802.11 to achieve parallel transmissions. A large data frame is fragmented into several fragments each of size equal to fragment threshold. By tuning the fragment threshold value, we can get varying fragment sizes. The determination of an efficient fragment threshold is an important issue in this scheme. If the fragment threshold is small, the overlap part of the master and parallel transmissions is large. This means the spatial reuse ratio of parallel transmissions is high. In contrast, with a large fragment threshold, the overlap is small and the spatial reuse ratio is low. However high fragment threshold leads to low fragment overhead. Hence there is a trade-off between spatial re-use and fragment overhead. Fragment threshold is the maximum packet size used for fragmentation. Packets larger than the size programmed in this field will be fragmented. If you find that your corrupted packets or asymmetric packet reception (all send packets, for example). You may want to try lowering your fragmentation threshold. This will cause packets to be broken into smaller fragments. These small fragments, if corrupted, can be resent faster than a larger fragment. Fragmentation increases overhead, so you'll want to keep this value as close to the maximum value as possible.

11. What is RTS (Request to Send) Threshold?

The RTS threshold is the packet size at which packet transmission is governed by the RTS/CTS transaction. The IEEE 802.11-1997 standard allows for short packets to be transmitted without RTS/ CTS transactions. Each station can have a different RTS threshold. RTS/CTS is used when the data packet size exceeds the defined RTS threshold. With the CSMA/CA transmission mechanism, the transmitting station sends out an RTS packet to the receiving station, and waits for the receiving station to send back a CTS (Clear to Send) packet before sending the actual packet data. This setting is useful for networks with many clients. With many clients, and a high network load, there will be

56

Image 56
Contents User Manual Default IP Address Default Login Name admin Default Password guestWireless Router RNX-N400LX Safety Warning Table of Contents Wireless RouterRNX-N400LXUser Manual3.53 Firewall - MAC Filtering Before We Begin 1.2 Key Features 1 Introduction1.1 Overview Advantages1.3 Package Contents 1.4 Product Layout and LED SignalStatus DescriptionPort/Connector/Button SMA Antenna ConnectorReset WPS Button1.5 Network + System Requirements 1.6 RNX-N400LX Placement1.7 Hardware Setup RNX-N400LX and Modem Rear View 2.11 For OS of Microsoft Windows 2 Setup2.1 Prepare your PC for RNX-N400LX’s configuration Wireless RouterRNX-N400LX 2.12 For OS of Microsoft Windows Vista 2.13 For OS of Microsoft Windows 2000/ XP 2.14 For OS of Microsoft Windows 95/ 98/ Me 2.15 For OS of Microsoft Windows NT2.2 Connecting to RNX-N400LX’s Web Management 2.21 Connecting using Web Browser3 RNX-N400LX Web Management page 3.1 Setup Wizard3.11 Welcome to Setup Wizard 3.12 Operation Mode 3.13 Time Zone Setting3.14 LAN Interface Setup 3.15 WAN Interface Setup 3.16 Wireless Basic Setting3.17 Wireless Security Setup 3.2 Operation ModeDescription Gateway3.3 Wireless 3.31 Wireless Basic Settings3.32 Wireless - Advanced Setting SSIDChannel Width SidebandShort GI 3.33 Wireless - Security Setup EncryptionFormat Hex 64 characters. WPA, PersonalPre-Shared Key only3.34 Wireless - Access Control Click the Disabled, Allow Listed or Deny Listed of drop downThis page is used to configure the wireless security between APs 3.35 Wireless - WDS SettingsRequirement Set Wireless-Basic Settings-Mode-AP+WDS 3.36 Wireless - Site Survey This section will show you the WDS Statistics3.37 Wireless - WPS SignalShow WPS status is Configured or Un-Configured Encrypt3.4 TCP/IP Settings 3.38 Wireless - Schedule3.41 LAN Interface ConfigurationServer mode only 3.411 Static DHCP Setupmenu. Server mode only 3.42 WAN Interface Setup 3.421 WAN Interface Setup - Static IPDescription 3.422 WAN Interface Setup - DHCP client Manually 3.423 WAN Interface Setup - PPPoEAutomatically Password Service NamePPPoE User Name3.424 WAN Interface Setup - PPTP Enable Dynamic PPTP3.5 Firewall 3.51 Firewall - Port Filtering3.52 Firewall - IP Filtering 3.53 Firewall - MAC Filtering 3.54 Firewall - Port Forwarding 3.55 Firewall - URL Filtering Forwarding3.56 Firewall - DMZ 3.6 QoS 3.7 Management 3.71 Management - StatusFirmware Wireless configurationSystem 3.72 Management - Statistics 3.73 Management - DDNSDefault Gateway Subnet Mask3.74 Management - Time Zone Setting 3.75 Management - Denial-of-Service 3.77 Management - Upgrade Firmware 3.76 Management - LogEmpty user name and password will disable the protection 3.78 Management - Save/Reload Settings3.79 Management - Password Appendix A - FREQUENTLY ASKED QUESTIONS FAQ 1. What is and how to find my Computer’s IP and MAC address?3. What are ISM bands? 2. What is Wireless LAN?4. How does wireless networking work? Example 2 wireless Ad Hoc Mode 5. What is BSSID?Example 1 wireless Infrastructure Mode 6. What is ESSID? 8. What are the Open System and Shared Key authentications?9. What is WEP? 7. What are potential factors that may causes interference?10. What is Fragment Threshold? 11. What is RTS Request to Send Threshold?12. What is Beacon Interval? 13. What is Preamble Type?14. What is SSID Broadcast? 15. What is Wi-Fi Protected Access WPA?16. What is WPA2? 17. What is 802.1x Authentication? Protocol TKIP?18. What is Temporal Key Integrity Protocol TKIP? 19. What is Advanced Encryption Standard AES?20. What is Inter-Access Point Protocol IAPP? 21. What is Wireless Distribution System WDS?22. What is Universal Plug and Play UPnP? 23. What is Maximum Transmission Unit MTU Size?25. What is DDNS? 26. What is NTP Client?27. What is VPN? 28. What is IPSEC?31. What is WLAN ACK TIMEOUT? 32. What is Modulation Coding Scheme MCS?33. What is Frame Aggregation? 34. What is Guard Intervals GI?Wireless Router RNX-N400LX Hardware Feature Dimensions L W x HAppendix B IMPORTANT NOTE FCC Radiation Exposure Statement Appendix C - FCC Interference StatementFederal Communication Commission Interference Statement Italian Appendix D - IC Interference Statement Industry Canada statement