Parameters | Description |
Fragment Threshold | “Fragment Threshold” specifies the maximum size of packet during the |
| fragmentation of data to be transmitted. If you set this value too low, it will result |
| in bad performance. |
|
|
RTS Threshold | When the packet size is smaller the RTS threshold, the access point will not use |
| the RTS/CTS mechanism to send this packet. |
|
|
Beacon Interval | The interval of time that this access point broadcast a beacon. Beacon is used to |
| synchronize the wireless network. |
|
|
Data Rate | The Data Rate is the rate of data transmission. The |
| highest possible selected transmission rate to transmit the data packets. |
|
|
Preamble Type | Preamble type defines the length of CRC block in the frames during the wireless |
| communication. “Short Preamble” is suitable for high traffic wireless network. |
| “Long Preamble” can provide more reliable communication. |
|
|
Broadcast ESSID | If you enable “Broadcast ESSID”, every wireless station located within the |
| coverage of this access point can discover this |
| building a public wireless network, enabling this feature is recommended. In |
| private network, disabling “Broadcast ESSID” can provide better security. |
|
|
CTS Protection | It is recommended to enable the protection mechanism. This mechanism can |
| decrease the rate of data collision between 802.11b and 802.11g wireless |
| stations. When the protection mode is enabled, the throughput of the AP will be a |
| little lower due to many of frame traffic should be transmitted. |
|
|
TX Power | Users can adjust the |
| and 10%. In default, |
|
|
Turbo Mode | Enable/Disable Turbo mode. When the connect client has support Turbo mode |
| also, they can work with better performance. |
|
|
WMM | Enable/Disable WMM function. |
|
|
After configuration complete, please click “Apply” button to save the configuration. Then you will see a screen to prompt you the settings are save successfully. You may press “Continue” for configure other settings or “Apply” to restart
5.4.3Security
- 35 -