GRE GINA User Manual Download Page 9

GRE Wireless LAN

GINA Access Point/Bridge User Guide

Page 

6

 

Eth_ SubMask:

 The Ethernet Station and the Wireless Point must be on the same subnet.

The IP address for the Wireless Bridge must correspond to the Subnet Mask. Subnet Mask
consists of four sets of three digits that divide a network into subnetworks.

 

Wirel_ ESSID:

 The ESSID (up to 32 printable ASCII characters) of the unit is a string used to

identify a WLAN. The ID prevents the unintentional merging of two co-located
WLANs.

 

ESSID Length:

 The length of the ESSID (number of characters).

 

AutoRateFallBack:

 Select Enable or Disable. When this is enabled the transmission rate is

defined by the past transmission status.

 

Wirel_ Channel:

 Select the channel to be used. The channels differ from country to country.

 

WEP key:

 The WEP key if the WEP option is enabled in order to activate WEP encryption for

transmissions between the stations and the Wireless Point

 

WEP type:

 The Wired Equivalent Privacy Algorithm (64 or 128 bits)..

 

Wire less Fragmentation Threshold:

 The size at which packets will be fragmented. Choose

a setting within a range of 256 to 2346 bytes. This is the option for the Fragmentation
Threshold activation.

 

Wireless RTS Threshold:

 Minimum packet size to require an RTS (Request To Send). For

packets smaller than this threshold, an RTS is not sent and the packet is transmitted directly
to the WLAN. This is the option for the RTS Threshold activation.

 

WEP Keys #1 -#4:

 The default key that will be used. May be edited only if WEP type is 64

bits.

 

Preamble Type:

 Select Short or Long Preamble Type. Preamble is the first subfield of PDU,

which is the appropriate frame format for transmission to PHY (Physical layer). There are two
options, Short Preamble and Long Preamble. The Short Preamble option improves
throughput performance.

 

Authentication Type:

 Select Open System or Shared Key Authentication Type.

a. 

Open System:

 With this setting any station in the WLAN can associate with an   Wireless

Bridge and receive and transmit data (null authentication).

b. 

Shared Key:

 With this setting only stations using a shared key encryption identified by

the Wireless Bridge are allowed to associate with it.

c. 

Both:

 With this setting stations communicate with or without data encryption.

 

Access Point Name:

 Type the Wireless Bridge's name.

 

Operational Rate Set:

 By default the unit adaptively selects the highest possible rate for

transmission. In case of obstacles or interference, the system will step down. Select the basic
rates to be used among the following options: 1 -2 (Mpbs), 1 -2 -5.5 – 11 (Mbps). Select the
Operational Rate set among the following options, 82 84 8B 96 (1 – 2 -5.5 -11 Mbps) or 82 84
0B 16 (1 -2 Mbps).

 

Beacon Period:

 Set the Beacon Period parameter, which specifies the duration between

beacon packets (milliseconds). The range for the beacon period is between the range 20-
1000 with a typical value of 100.

Summary of Contents for GINA

Page 1: ...GRE AMERICA INC Wireless LAN Access Point Bridge...

Page 2: ...software for Windows 98 2 4 2 Installing the Driver Software for Windows Millennium 3 4 3 Installing the Driver Software for Windows 2000 3 Chapter 5 Wireless Bridge Point Utility 3 5 1 Install AP Uti...

Page 3: ...on The radio should not be powered on with any of its covers removed INFORMATION TO USERS Any changes or modifications not expressly approved by the party responsible for compliance could void the us...

Page 4: ...ronments 1 1 Package Contents The Wireless Bridge includes the following items a Wireless Bridge b USB Cable c The CD including 1 Wireless bridge Utility Driver software 2 User s Manual this document...

Page 5: ...er Adapter to the Wireless Bridge s Power Socket Only use the power adapter supplied with the Wireless bridge Use of a different adapter may result in product damage 5 The Hardware Installation is com...

Page 6: ...ver where D specifies your CD ROM Then click the Next button 4 Windows will now search for the driver After Windows has acknowledged finding the driver click the Next button 5 Windows will now install...

Page 7: ...ontinue click the Next button 4 The next screen will show the Program Folder that the utility will use If you want to put the utility in another Program Folder click an Existing Folder or if you don t...

Page 8: ...idge The Modify button in order to set new values to the pre selected parameters The Set button to download any changes to the Wireless Bridge The Exit button to exit this utility B Configuration Sett...

Page 9: ...t is transmitted directly to the WLAN This is the option for the RTS Threshold activation WEP Keys 1 4 The default key that will be used May be edited only if WEP type is 64 bits Preamble Type Select...

Page 10: ...Indicates the manufacturer s access rights Gateway IP Address Network Gateway IP Filtering Enable Disable the possibility to allow only IP protocol packets to pass through the WLAN and any other proto...

Page 11: ...ed to check if the station IP address and the Subnet mask are configured properly and are within the same Range of the Wireless AP Bridge unit Also the IP address for Wireless AP Bridge must correspon...

Page 12: ...wing its IP Address Choose this submenu in order to find the Wireless Bridge available for connection Select one of the available Wireless AP Bridge and press Connect Then Connect to Access Point dial...

Page 13: ...n with the Wireless AP Bridge Download Changes When all the desired values of the parameters have been set you are able to download the changes save the changes to the Wireless AP Bridge by selecting...

Page 14: ...he Subnet Mask Subnet Mask consists of four sets of three digits that divide a network into subnetworks DHCP Enable DHCP client is enabled the IP Address field displays the IP Address that was dynamic...

Page 15: ...ivalent Privacy option in order to activate WEP encryption for transmissions between the stations and the Wireless Bridge WEP is an authentication algorithm which protects authorized Wireless LAN user...

Page 16: ...which is the appropriate frame format for transmission to PHY Physical layer There are two options Short Preamble and Long Preamble Rate By default the unit adaptively selects the highest possible rat...

Page 17: ...unicate with any Wireless Bridge whose MAC Address exists in the Authorization Table If changes are made you need to Download Changes under the File menu in order to save them c Authorization Mac Addr...

Page 18: ...messages View Record You can see additional information for every Trap Message Network Menu Provides information about the Network Under this menu there is only the Associated Station submenu Associat...

Page 19: ...7 Application and Note All USB device can not connect to the Wireless Bridge via wireless media The Wireless Bridge can communicate with other Wireless Bridge available in the same channel and ESSID...

Page 20: ...D An Infrastructure configuration could also support roaming capability for mobile workers More than one BSS can be configured as an Extended Service Set ESS Users within an ESS could Roam freely betw...

Page 21: ...ovided below Overtime premiums and or expedited handling and shipping costs must be paid by the owner Warranty Limitations This warranty does not apply to equipment or parts that have been subject to...

Page 22: ...1400 Toll Free 1 800 233 5973 Fax 650 591 2001 Email Sales Dept sales greamerica com Support wlan greamerica com Copyrights 2002 GRE America Inc All rights reserved This material is the property of GR...

Page 23: ...to factory GRE America Inc 425 Harbor Blvd Belmont CA 94002 Ph 650 591 1400 Fax 650 591 2001 Toll Free 800 233 5973 Email sales greamerica com 2002 GRE America Inc TM Power Consumption Tx OUTPUT POWER...

Reviews: