Linksys WAP200RF manual What Ieee 802.11g features are supported?

Page 50

Wireless-G Access Point with Power Over Ethernet and Rangebooster

What IEEE 802.11g features are supported?

The product supports the following IEEE 802.11g functions:

CSMA/CA plus Acknowledge protocol

OFDM protocol

Multi-Channel Roaming

Automatic Rate Selection

RTS/CTS feature

Fragmentation

Power Management

What is Ad-hoc?

An Ad-hoc wireless LAN is a group of computers, each with a WLAN adapter, connected as an independent wireless LAN. An Ad-hoc wireless LAN is applicable at a departmental scale for a branch or SOHO operation.

What is Infrastructure?

An integrated wireless and wired LAN is called an Infrastructure configuration. Infrastructure is applicable to enterprise scale for wireless access to a central database, or wireless application for mobile workers.

What is roaming?

Roaming is the ability of a portable computer user to communicate continuously while moving freely throughout an area greater than that covered by a single Access Point. Before using the roaming function, the workstation must make sure that it is set to the same channel number as the Access Point of the dedicated coverage area.

To achieve true seamless connectivity, the wireless LAN must incorporate a number of different functions. Each node and Access Point, for example, must always acknowledge receipt of each message. Each node must maintain contact with the wireless network even when not actually transmitting data. Achieving these functions simultaneously requires a dynamic RF networking technology that links Access Points and nodes. In such a system, the user’s end node undertakes a search for the best possible access to the system. First, it evaluates such factors as signal strength and quality, as well as the message load currently being carried by each Access Point and the distance of each Access Point to the wired backbone. Based on that information, the node next selects the right Access Point and registers its address. Communications between end node and host computer can then be transmitted up and down the backbone.

As the user moves on, the end node’s RF transmitter regularly checks the system to determine whether it is in touch with the original Access Point or whether it should seek a new one. When a node no longer receives acknowledgment from its original Access Point, it undertakes a new search. Upon finding a new Access Point, it then re-registers, and the communication process continues.

Appendix A: Troubleshooting

44

Frequently Asked Questions

Image 50
Contents User Guide How to Use this User Guide Copyright and TrademarksTable of Contents Frequently Asked Questions Appendix a TroubleshootingAppendix B Wireless Security Example of a Simple Wireless Network List of Figures20 Security Monitor Basic Settings Introduction WelcomeWhat’s in this User Guide? Introduction What’s in this User Guide? Roaming Planning Your Wireless NetworkNetwork Topology Network Layout Example of a simple wireless network Getting to Know the Wireless-G Access Point LEDsAccess Point’s port are located on the back of the device PortsDesktop Placement and Antenna Setup Antennas and PositionsConnection Connecting the Wireless-G Access PointOverview Wall-Mount Option Placement OptionsStand Option Setting Up the Wireless-G Access Point Accessing the UtilityNavigating the Utility SetupWireless Security Monitor AP ModeAdministration Status Basic Setup Configuring the Wireless-G Access PointSetup Basic Setup Tab Network SetupSetup Time Tab TimeWireless Basic Wireless Settings Tab Basic SettingsWireless Wireless Security Tab Wireless SecurityWPA-Personal aka WPA-PSK WPA2-PersonalWPA2-Personal Mixed WPA-EnterpriseWPA2-Enterprise WPA2-Enterprise MixedDisable RadiusWireless Client List Wireless Wireless Connection Control TabWireless Connection Control Connection ControlWireless Advanced Wireless Settings Tab Advanced SettingsWireless Vlan & QoS Tab VlanQoS AP Mode Tab MAC Address18 Wireless Repeater Mode 19 Wireless Bridge Mode Security Monitor Accounts Security Monitor Basic Settings TabWireless Security Monitor Security Monitor Event Log Tab Mail NotificationSyslog Notification Local AP Password Administration Management TabWeb Access ManagementSnmp IdentificationEmail Alert Administration Log TabLog Notification Queue LengthFactory Default Administration Factory Default TabAdministration Firmware Upgrade Tab Firmware UpgradeReboot Administration Reboot TabAdministration Config Management Tab Config ManagementLocal Network Status Local Network TabInformation Status Wireless Tab Wireless Network Status System Performance Tab Wired Wireless System PerformancePage Appendix a Troubleshooting Frequently Asked QuestionsWhat Ieee 802.11g features are supported? What is the ISM band? Does the Access Point function as a firewall? Security Threats Facing Wireless Networks Appendix B Wireless SecuritySecurity Precautions Appendix B Wireless Security Page Appendix C Upgrading Firmware Network Neighborhood/My Network Places Appendix D Windows HelpShared Resources Appendix E Glossary Appendix E Glossary Appendix E Glossary Appendix E Glossary Appendix E Glossary Appendix F Specifications 802.11F Wireless Roaming11.g 54Mbps@ -72dBm, 11.b 11Mbps@ -85dBM Dhcp Client11g 14 dBm SecurityCertification Wireless Security MonitorSuspicious network events Appendix G Warranty Information Limited WarrantyAppendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Information section in this Guide Appendix I Contact InformationNeed to contact Linksys?