SmartBridges sB3010 manual Wpa

Page 75

i n t e l l i g e n t

w i r e l e s s

p l a t f o r m

According to the IEEE 802.11 standard, Wired Equivalent Privacy (WEP) is intended to provide “confidentiality that is subjectively equivalent to the confidentiality of a wired local area network medium and that does not employ cryptographic techniques to enhance privacy.”

WEP relies on a secret key that is shared between a mobile station and an access point. WEP uses the RC4 stream cipher invented by RSA Data Security. RC4 is a symmetric stream cipher that uses the same variable length key for encryption and decryption. With WEP enabled, the sender encrypts the data frame payload and replaces the original payload with the encrypted payload. The sender then forwards the encrypted frame to its destination. The encrypted data frames are sent with the MAC header WEP bit set. Thus, the receiver knows to use the shared WEP key to decrypt the payload and recover the original frame. The new frame, with an unencrypted payload can then be passed to an upper layer protocol.

WEP keys can be either statically configured or dynamically generated. In either case, WEP has been found to be easily broken.

WPA

Wi-Fi Protected Access (WPA) is a replacement security standard for WEP. It is a subset of the IEEE 802.11i standard being developed. WPA makes use of TKIP to deliver security superior to WEP. 802.1X access control is still employed. The Authentication Server provides the mechanism for creating the keys.

Packet Concatenation

Packet concatenation will increase the throughput of the equipment by simply buffering the packets at the transmitter and convert them into superframe for the transmission over the wireless interface.

Packet Bursting

Packet bursting is for increasing the throughput by increasing the window size and reducing the time for acknowledgement.

Packet Compression

LZO compression is being used to achieve more throughputs.

COFDM

COFDM involves modulating the data onto a large number of carriers using the FDM technique. The Key features which makes it work, in a manner is so well suited to terrestrial channels, includes:

Orthogonality (the “O” of COFDM);

The addition of Guard interval;

The use of error coding (the “C” of COFDM), interleaving and channel-state information

COFDM is resistant to multipath effects because it uses multiple carriers to transmit the same signal.

Spanning Tree Protocol (STP)

STP is a Layer 2 link management protocol that provides path redundancy while preventing loops in the network. For a Layer 2 Ethernet network to function properly, only one active path can exist between any two redundant links. Spanning-tree operation is transparent to end stations, which cannot detect whether they are connected to a single LAN segment or to a LAN of multiple segments.

RIP

The most popular of the TCP/IP interior routing protocols is the Routing Information Protocol (RIP). RIP is used to dynamically exchange routing information. RIP routers broadcast their routing tables every 30 seconds by default. Other RIP equipments will listen for these RIP broadcasts and update their own route tables.

airHaul™ Nexus User Guide

Page 75 of 80

 

Image 75
Contents Version AirHaul Nexus SB3010Table of Contents T e l l i g e n t w i r e l e s s A t f o r m Overview of User Guide About This DocumentTechnical Support Center Related PublicationsAirHaul Nexus Configuration Features IntroductionSystem Requirements Pre-Installation Checklist for airHaul ChecklistsSignature of Engineer Name Date Parameters Units Site a Site BPTP Post-Installation Checklist for airHaulChecklist Parameters Units Site a Site B User Login and License Agreement AirHaul Nexus ConfigurationAdministrator Login License Agreement Web GUI Administrator Password Change Administrator password change Using the Configuration PagesRadio Navigation Menu BarMenu Functions Menu Item Menu Sub-items Description Home NetworkingTools Menu Item Menu Sub-items DescriptionMenu Item Menu Sub-items Description Tools Help Radio Operational Mode Settings Device Mode ConfigurationRoot Bridge to Remote Router Root Bridge to Remote BridgeChanging Root Bridge to Remote Router Remote Bridge to Root Bridge10 Changing Remote Bridge to Root Bridge Remote Router to Root Bridge11 Changing Remote Router to Root Bridge Remote Router to Remote Bridge12 Changing Remote Router to Remote Bridge Remote Bridge to Remote Router13 Changing Remote Bridge to Remote Router Ethernet Configurations Root Bridge Configuration15 Root Bridge Wireless Settings Wireless ConfigurationsItems Descriptions Wireless SettingsDial a Power Authorization16 Root Bridge Association List Bridge Configuration18 Bridge Configuration Information Configuring Spanning Tree Protocol STPSTP Settings Configuration Radio port Radio a Setting Default Value Range Purpose19 Bridge Configuration Ethernet Configuration Remote Bridge Configuration21 Remote Bridge Wireless Settings Wireless Configuration22 Remote Bridge Association with Root Bridge 23 Remote Router Ethernet Configurations Remote Router Configuration24 Remote Router Wireless IP Configuration 25 Remote Router Wireless Association Settings Dhcp Configurations 27 Dhcp Server Configurations 29 Dhcp Relay Agent Configurations Dhcp Relay Configurations30 Routing Table Routing Table31 Adding Static Route Wireless Settings Management Wireless SettingsData Encryption 32 Data Encryption Configuration Performance Parameters and Bandwidth Controller Link Performance Parameters and FeaturesOptimizer Choose the desired Radio Operating modeRadio Operating ThroughputBandwidth Controller Enter Maximum Wireless ThroughputSite Survey showing associated devices Site SurveyAntenna Alignment Antenna Alignment Ethernet Traffic Statistics Traffic StatisticsEthernet Traffic Statistics Received Multicast Packets Received ErrorsWireless Traffic Statistics Transmit Success Rate Received Frame FCS Error CountTools System ConfigurationReset To Factory ResetDelayed Reset Version Edit ConfigurationSnmp Security Check the ‘SNMP Access Filters’ Enable boxDelayed Reset Settings Reset OptionsProfile Manager NTP Time Server SetupFunction Descriptions Profile ManagerSave Profile Load Operating ProfileProfile calendar Scheduling a Profile Ping Test Result Link TestClick on the ‘Radio Receive’ or ‘Radio Transmit’ button Throughput TestThroughput Test Result Click the ’Compute Distance’ button Link Budget Planning12 Link Budget Planning Calculator Link Budget AirHaul Nexus Firmware Upgrade Firmware UpgradeAirHaul Nexus Firmware Upgrade Firmware transferred Radio Mode of OperationsAppendix a Points to Remember AntennaRange Throughput OptimizerPerformance FragmentationMultiple watchdog timer Firmware upgradeAcronyms and Abbreviations Appendix B Useful terms and definitionsWPA Dhcp Appendix C Sample airHaul Bridge to Router Setup Appendix D Snmp Trap ValueAirPoint AirClient Appendix E Snmp MIB Appendix F License