www.elpro.com.au
245U-E Wireless Ethernet Modem User Manual
65
Rev Version 2.24
Figure 58 Site A and D WDS Configuration
Encryption levels and key above are shows as being different, but they can be the same as in some of the
earlier examples. One reason why the encryption level and key would be different is that the access point
may have clients that communicate using a different encryption method (such as 128-bit WEP) and may not
support the same encryption method.
Example 4: WDS Routed Network
Figure 59 is an example of using WDS router interfaces to achieve a similar physical topology to the
WDS bridge example provided earlier. In both examples, there are four WDS access points each with the
possibility of having their own associated client and stations. In both examples, Sites A, B, C, and D can all
exchange data with each other. The bridged example has the advantage of redundancy, but at the expense
of extra overhead. The routed example below cannot provide the redundancy of the bridged example,
and requires more configuration effort, but does not have the overhead of using the bridge Spanning Tree
Protocol, and therefore is suited to fixed installations that do not require redundancy.
Figure 59
WDS Routed
Each modem has a different SSID. This is done to limit broadcast traffic and to route data only were it needs
to go. Site B has two virtual client WDS links configured—one to Site A’s access point, and one to Site C’s
access point. Figure 60 shows the WDS connections at Site B.