242
C
HAPTER
10: C
ONFIGURING
MAP A
CCESS
P
OINTS
Changing the DTIM Interval
The DTIM interval specifies the number
of times after every beacon that a radio sends a delivery traffic indication
map (DTIM). A MAP sends the multicast and broadcast frames stored in
its buffers to clients who request them in response to the DTIM. The
DTIM interval applies to both the beaconed SSID and the unbeaconed
SSID.
The DTIM interval does not apply to unicast frames. A MAP also stores
unicast frames in buffer memory, but the MAP includes information
about the buffered unicast frames in each beacon frame. When a user
station receives a beacon frame that advertises unicast frames destined
for the station, the station sends a request for the frames and the MAP
transmits the requested frames to the user station.
To change the DTIM interval, use the following command:
set radio-profile
name
dtim-interval
interval
The interval can be a value from 1 through 31. The default is 1.
To change the DTIM interval for radio profile
rp1
to 2, type the following
command:
WX1200#
set radio-profile rp1 dtim-interval 2
success: change accepted.
Changing the RTS Threshold
The RTS threshold specifies the
maximum length a frame can be before a radio uses the
Request-to-Send/Clear-to-Send (RTS/CTS) method to send the frame. The
RTS/CTS method clears the air of other traffic to avoid corruption of the
frame due to a collision with another frame.
When a frame is long enough for the RTS/CTS method to be applicable,
the radio sends a Request-To-Send (RTS) message addressed to the
intended receiver for the frame. The receiver replies with a Clear-To-Send
(CTS) message. When the radio receives the CTS message, the radio
transmits the frame and waits for an acknowledgment from the receiver.
The radio does not transmit additional frames until receiving the
acknowledgment.
Any other user station that overhears the RTS or CTS message stops
transmitting until the station overhears the acknowledgment message.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...