X-Micro Tech XWL-11GRTX 8What are the Open System and Shared Key authentications?, 9What is WEP?

Page 64

¾Electrical devices: microwaves, monitors and electrical motors. Solutions to overcome the interferences:

9 Minimizing the number of walls and ceilings.

9 Position the WLAN antenna for best reception.

9 Keep WLAN devices away from other electrical devices, eg: microwaves, monitors, electric motors, … etc.

9 Add additional WLAN Access Points if necessary.

4.8What are the Open System and Shared Key authentications?

IEEE 802.11 supports two subtypes of network authentication services: open system and shared key. Under open system authentication, any wireless station can request authentication. The station that needs to authenticate with another wireless station sends an authentication management frame that contains the identity of the sending station. The receiving station then returns a frame that indicates whether it recognizes the sending station. Under shared key authentication, each wireless station is assumed to have received a secret shared key over a secure channel that is independent from the 802.11 wireless network communications channel.

4.9What is WEP?

An optional IEEE 802.11 function that offers frame transmission privacy similar to a wired network. The Wired Equivalent Privacy generates secret shared encryption keys that both source and destination stations can use to alert frame bits to avoid disclosure to eavesdroppers.

WEP relies on a secret key that is shared between a mobile station (e.g. a laptop with a wireless Ethernet card) and an access point (i.e. a base station). The secret key is used to encrypt packets before they are transmitted, and an integrity check is used to ensure that packets are not modified in transit.

4.10What is Fragment Threshold?

The proposed protocol uses the frame fragmentation mechanism defined in IEEE 802.11 to achieve parallel transmissions. A large data frame is fragmented into several fragments each of size equal to fragment threshold. By tuning the fragment threshold value, we can get varying fragment sizes. The determination of an efficient fragment threshold is an important issue in this scheme. If the fragment threshold is small, the overlap part of the master and parallel transmissions is large. This means the spatial reuse ratio of parallel transmissions is high. In contrast, with a large fragment threshold, the overlap is small and the spatial reuse ratio is low. However high fragment threshold leads

55

Image 64
Contents Wlan 11g Broadband Router MAX. OUT Power Federal Communications Commission FCC Statement Copyright DisclaimerTable of Contents Frequently Asked Questions FAQ What is WMM? What is Wlan ACK TIMOUT? Terminology VPN 1Package contents 2Product SpecificationsProduct Features Generic RouterPanel Description Wlan LEDWAN 1Hardware Installation 2Software InstallationFor OS of Microsoft Windows 95/ 98/ Me For OS of Microsoft Windows 2000, XPConnect to the X-Micro Wlan 11g Broadband Router For OS of Microsoft Windows NTItemDescription Bssid Setup Wizard Operation ModeII Time Zone Setting III LAN Interface SetupIV WAN Interface Setup Wireless Basic SettingsVI Wireless Security Setup DescriptionWireless Basic Settings Wireless Advanced Settings MAC address. Client Mode onlySystem, Shared Key or Auto selection Wireless Security Setup Wlan IC of RealtekCharacters. WPA, PersonalPre-Shared Key OnlyWEP Key Setup Wireless Access Control Click the Disabled , Allow Listed or Deny ListedWDS Settings WDS Security Setup II WDS AP TableWEP64bits, WEP128bits, Wpatkip WPA2AES or NoneSite Survey LAN Interface Setup Information. Server mode only WAN Interface SetupClick to open the Active Dhcp Client Table window Static IP II Dhcp Client Server III PPPoE There are Continuous , Connect on DemandIf you select the PPPoE and Connect on Demand IV Pptp Firewall Port Filtering Firewall IP Filtering Firewall MAC Filtering Firewall Port Forwarding Screen snapshot Firewall Port Forwarding Firewall URL Filtering Firewall DMZVPN Setting Enable DMZ Click to enable the DMZ functionScreen snapshot VPN Setup VPN Setup Edit Tunnel Mode only II Advanced IKE Setup Click to select DH1modp768 , DH2modp1024 orSent Packets Management StatisticsReceived Packets Management Time Zone Setting Management DdnsManagement Denial-of-Service Management Log Management Upgrade Firmware Management Save/ Reload Settings Management Password Setup Management WatchDogManagement Quality of Service Screen snapshot Management Qaulity of Service Logout Bandwidth Control TableRemoved from the Current Bandwidth Control Addresses Current Bandwidth Control Table1What and how to find my PC’s IP and MAC address? 2What is Wireless LAN?4How does wireless networking work? 3What are ISM bands?5What is BSSID? 6What is ESSID?9What is WEP? 8What are the Open System and Shared Key authentications?What is Fragment Threshold? What is RTS Request To Send Threshold? What is Beacon Interval?What is Preamble Type? What is Ssid Broadcast?What is Wi-Fi Protected Access WPA? What is WPA2?What is 802.1x Authentication? What is Temporal Key Integrity Protocol TKIP?What is Advanced Encryption Standard AES? What is Inter-Access Point Protocol IAPP?What is Maximum Transmission Unit MTU Size? What is Clone MAC Address?What is DDNS? What is NTP Client?What is Wlan ACK TIMOUT? Example One PPPoE on the WAN Configure the WAN interface Configure the LAN interfaceConfigure the Wlan interface Example Two Fixed IP on the WAN192.168.2.254 192.168.2.10Configuration Example Two Fixed IP on the WAN Configure the WAN interface Configure the Wlan interface