16
Open System network.
Wired Equivalent Privacy (WEP) data encryption is
used when the wireless devices are configured to
operate in Shared Key authentication mode.
If the Access Point is using Open System
, then the
wireless adapter will need to be set to the same
authentication mode.
Shared Key is used
when both the sender and the
recipient share a secret key.
Select Auto for the network
adapter to select the
Authentication mode
automatically depending on the
Access Point Authentication mode.
Fragment Threshold Fragmentation mechanism is used f or impr oving
the efficiency when high traffic flows along in the
wireless network. If your 802.11g Wireless LAN
PC Card often transmit large files in wireless
network, you can enter new Fragment Threshold
value to split the packet. The value can b e set
from 256 to 2346. The default value is 2346.
RTS Threshold RTS Threshold is a mechanism
implemented to
prevent the “Hidden Node” problem. “Hidden Node”
is a situation in which two stations are within range of
the same Access Point, but are not within range of
each other. Therefore, they are hidden nodes for
each other. W hen a station starts d
with the Access Point, it might not notice that the
other station is alrea dy using the wireless medium.
When these two stations send data at the same time,
they might collide when arriving simultaneously at
the Access Point. The collision
will most certainly
result in a loss of messages for both stations.
Thus, the RTS Threshold mechanism provides a
solution to prevent data collisions. When you enable
RTS Thr eshold on a suspect “hidden station”
, this
station and its Access Point will use a
Request to
Send ( RTS). T he station will send an RTS to the
Access Point, informing that it is going to transmit the