Linksys WAP54G manual What Ieee 802.11g features are supported?

Page 65

Wireless-G Access Point

What IEEE 802.11g features are supported?

The product supports the following IEEE 802.11g functions:

CSMA/CA plus Acknowledge protocol

OFDM protocol

Multi-Channel Roaming

Automatic Rate Selection

RTS/CTS feature

Fragmentation

Power Management

What is Ad-hoc?

An Ad-hoc wireless LAN is a group of computers, each with a WLAN adapter, connected as an independent wireless LAN. An Ad-hoc wireless LAN is applicable at a departmental scale for a branch or SOHO operation.

What is Infrastructure?

An integrated wireless and wired LAN is called an Infrastructure configuration. Infrastructure is applicable to enterprise scale for wireless access to a central database, or wireless application for mobile workers.

What is roaming?

Roaming is the ability of a portable computer to communicate continuously while its user is moving freely throughout an area greater than that covered by a single Access Point. Before using the roaming function, the user must make sure that the computer is set to the same channel number as the Access Point of the dedicated coverage area.

To achieve true seamless connectivity, the wireless LAN must incorporate a number of different functions. Each node and Access Point, for example, must always acknowledge receipt of each message. Each node must maintain contact with the wireless network even when not actually transmitting data. Achieving these functions simultaneously requires a dynamic RF networking technology that links Access Points and nodes. In such a system, the user’s end node undertakes a search for the best possible access to the system. First, it evaluates such factors as signal strength and quality, as well as the message load currently being carried by each Access Point and the distance of each Access Point to the wired backbone. Based on that information, the node next selects the right Access Point and registers its address. Communications between end node and host computer can then be transmitted up and down the backbone.

As the user moves on, the end node’s RF transmitter regularly checks the system to determine whether it is in touch with the original Access Point or whether it should seek a new one. When a node no longer receives acknowledgment from its original Access Point, it undertakes a new search. Upon finding a new Access Point, it then re-registers, and the communication process continues.

Appendix A: Troubleshooting

58

Frequently Asked Questions

Image 65
Contents 802 GHz .11g Wireless- G Copyright and Trademarks How to Use this User GuideTable of Contents Frequently Asked Questions Appendix a TroubleshootingAppendix B Wireless Security Back Panel Front Panel25 Congratulations Screen Site Survey Screen Welcome IntroductionWhat’s in this User Guide? Wireless-G Access Point Roaming Planning Your Wireless NetworkNetwork Topology Network Layout Cisco logo Getting to Know the Wireless-G Access PointBack Panel LAN Port Overview Connecting the Wireless-G Access PointConnections for Setup Using the Setup Wizard Setting up the Wireless-G Access PointConnect the Network Cable to the Router or Switch Screen Check the Access Point’s Status Screen Password Screen Basic Settings Screen 10 SecureEasySetup Screen Using the Access Point’s SecureEasySetup Feature15 Confirm New Settings Screen 16 Congratulations Screen Configuring a Non-SecureEasySetup Device17 Configure Wireless Settings Screen Manually Configuring the Access Point’s Wireless SettingsWEP 128-Bit WEP 64-BitWPA2 Personal WPA PersonalWPA Enterprise WPA2 Mixed ModeLinksys Wireless Guard 25 Congratulations Screen 26 Attention Screen Configuring the Linksys Wireless Guard Settings28 Securing Your Access Point Screen 31 Wireless Guard Congratulations Screen Client Software Installation Using the Linksys Wireless Guard ServiceExit Other Applications Destination Location Restart Your Computer Network AccessYour Account Accessing your AccountAdd a Guest 11 Network Administration12 Modify Access Control Member Registration Add a Member16 Subscriber Information 18 Credentials Information To secure an unprotected network Securing or Unprotecting Your Wireless Guard NetworkTo unprotect a network Navigating the Utility Configuring the Wireless-G Access PointSetup Status WirelessAdministration Setup Network Setup Tab Accessing the UtilityNetwork Setup Configuration TypeSetup Static IP Screen LAN MAC Address Setup AP Mode TabAP Mode Configuring the Wireless-G Access Point Setup AP Mode Tab Wireless-G Access Point Basic Wireless Settings Wireless Basic Wireless Settings Tab12 Confirm Reset Wireless Security Wireless Wireless Security TabWPA-Personal WPA2-PersonalWPA-Enterprise WPA2-MixedRadius Access Restriction Wireless Wireless MAC Filter TabWireless MAC Filter Advanced Wireless Wireless Advanced Wireless Settings TabWireless-G Access Point AP’s Password Administration Management TabBackup and Restore ManagementSnmp Community Administration Snmp TabSnmp V1/V2c Log Administration Log TabAdministration Firmware Upgrade Tab Administration Factory Defaults TabFirmware Upgrade Factory DefaultsLocal Network Status Local Network TabAP’s Information Wireless Network Status Wireless Network TabFrequently Asked Questions Appendix a TroubleshootingWhat Ieee 802.11g features are supported? What is the ISM band? Does the Access Point function as a firewall? Security Threats Facing Wireless Networks Appendix B Wireless SecuritySecurity Precautions Security Threats Facing Wireless Networks Wireless-G Access Point Appendix C Upgrading Firmware Figure C-1 Firmware UpgradeNetwork Neighborhood/My Network Places Appendix D Windows HelpShared Resources Appendix E Glossary Wireless-G Access Point Wireless-G Access Point Wireless-G Access Point Wireless-G Access Point Wireless-G Access Point Wireless-G Access Point Appendix F Specifications Operating Humidity Limited Warranty Appendix G Warranty InformationFCC Statement Appendix H Regulatory InformationInformation section in this Guide Appendix I Contact InformationNeed to contact Linksys?
Related manuals
Manual 2 pages 49.81 Kb