58
www.cooperbussmann.com/wirelessresources
Cooper Bussmann 245U-E Wireless Ethernet Modem & Device Server User Manual
Rev Version 2.19
Figure 57 Site B WDS Configuration
Figure 58 Site A and D WDS Configuration
Encryption levels and key above are shows as being different, but they can be the same as in some of the earlier
examples. One reason why the encryption level and key would be different is that the access point may have
clients that communicate using a different encryption method (such as 128-bit WEP) and may not support the same
encryption method.
Example 4: WDS Routed Network
Figure 59 is an example of using WDS router interfaces to achieve a similar physical topology to the WDS bridge
example provided earlier. In both examples, there are four WDS access points each with the possibility of having
their own associated client and stations. In both examples, Sites A, B, C, and D can all exchange data with each
other. The bridged example has the advantage of redundancy, but at the expense of extra overhead. The routed
example below cannot provide the redundancy of the bridged example, and requires more configuration effort, but
does not have the overhead of using the bridge Spanning Tree Protocol, and therefore is suited to fixed installations
that do not require redundancy.
Figure 59 WDS Routed