ZyAIR G-220 User’s Guide

The following figure depicts a roaming example. When wireless station B moves to position X, the ZyAIR in wireless station B automatically switches the channel to the one used by access point 2 in order to stay connected to the network.

Figure 2-5 Roaming Example

2.2Wireless LAN Security

Wireless LAN security is vital to your network to protect wireless communications.

Configure the wireless LAN security using the More Setting… screen. If you do not enable any wireless security on your ZyAIR, the ZyAIR’s wireless communications are accessible to any wireless networking device that is in the coverage area.

2.2.1 Data Encryption with WEP

WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between the ZyAIR and the AP or other wireless stations to keep network communications private. Both the wireless stations and the access points must use the same WEP key for data encryption and decryption.

Your ZyAIR allows you to configure up to four 64-bit, 128-bit or 256-bit WEP keys but only one key can be used at any one time.

2.3Fragmentation Threshold

A Fragmentation Threshold is the maximum data fragment size (between 256 and 2432 bytes) that can be sent in the wireless network before the ZyAIR will fragment the packet into smaller data frames.

2-4

Wireless Station Mode Configuration