background image

– 42 –

 

 

 

Chapter

 

4

 

|

  

Wireless

 

Settings

 

Radio

 

Settings

 

 

 

WMM

 

Operation

 

 

WMM

 

uses

 

traffic

 

priority

 

based

 

on

 

the

 

four

 

ACs;

 

Voice,

 

Video,

 

Best

 

Effort,

 

and

 

Background.

 

The

 

higher

 

the

 

AC

 

priority,

 

the

 

higher

 

the

 

probability

 

that

 

data

 

is

 

transmitted.

 

 

When

 

the

 

access

 

point

 

forwards

 

traffic,

 

WMM

 

adds

 

data

 

packets

 

to

 

four

 

independent

 

transmit

 

queues,

 

one

 

for

 

each

 

AC,

 

depending

 

on

 

the

 

802.1D

 

priority

 

tag

 

of

 

the

 

packet.

 

Data

 

packets

 

without

 

a

 

priority

 

tag

 

are

 

always

 

added

 

to

 

the

 

Best

 

Effort

 

AC

 

queue.

 

From

 

the

 

four

 

queues,

 

an

 

internal

 

“virtual”

 

collision

 

resolution

 

mechanism

 

first

 

selects

 

data

 

with

 

the

 

highest

 

priority

 

to

 

be

 

granted

 

a

 

transmit

 

opportunity.

 

Then

 

the

 

same

 

collision

 

resolution

 

mechanism

 

is

 

used

 

externally

 

to

 

determine

 

which

 

device

 

has

 

access

 

to

 

the

 

wireless

 

medium.

 

 

For

 

each

 

AC

 

queue,

 

the

 

collision

 

resolution

 

mechanism

 

is

 

dependent

 

on

 

two

 

timing

 

parameters:

 

 

AIFSN

 

(Arbitration

 

Inter

Frame

 

Space

 

Number),

 

a

 

number

 

used

 

to

 

calculate

 

the

 

minimum

 

time

 

between

 

data

 

frames

 

 

CW

 

(Contention

 

Window),

 

a

 

number

 

used

 

to

 

calculate

 

a

 

random

 

backoff

 

time

 

 

After

 

a

 

collision

 

detection,

 

a

 

backoff

 

wait

 

time

 

is

 

calculated.

 

The

 

total

 

wait

 

time

 

is

 

the

 

sum

 

of

 

a

 

minimum

 

wait

 

time

 

(Arbitration

 

Inter

Frame

 

Space,

 

or

 

AIFS)

 

determined

 

from

 

the

 

AIFSN,

 

and

 

a

 

random

 

backoff

 

time

 

calculated

 

from

 

a

 

value

 

selected

 

from

 

zero

 

to

 

the

 

CW.

 

The

 

CW

 

value

 

varies

 

within

 

a

 

configurable

 

range.

 

It

 

starts

 

at

 

CWMin

 

and

 

doubles

 

after

 

every

 

collision

 

up

 

to

 

a

 

maximum

 

value,

 

CWMax.

 

After

 

a

 

successful

 

transmission,

 

the

 

CW

 

value

 

is

 

reset

 

to

 

its

 

CWMin

 

value.

 

 

Figure

 

30:

 

WMM

 

Backoff

 

Wait

 

Times

 

 

 

 

For

 

high

priority

 

traffic,

 

the

 

AIFSN

 

and

 

CW

 

values

 

are

 

smaller.

 

The

 

smaller

 

values

 

equate

 

to

 

less

 

backoff

 

and

 

wait

 

time,

 

and

 

therefore

 

more

 

transmit

 

opportunities.

 

 
 
 
 
 
 

High Priority

 

 
 
 
 
 
 

Low Priority

 

 

Time

 

CWMin

CWMax

AIFS

Random Backoff

Minimum Wait Time

Random Wait Time

 

 

CWMin

CWMax

AIFS

Random Backoff

 

Minimum Wait Time

Random Wait Time

 

Summary of Contents for AC866

Page 1: ...acket for attaching to a 1 5 to 6 inch pole and they can be powered through their Ethernet cable connection from a power injector module that is installed indoors The Outdoor Stand Alone Access Points...

Page 2: ...overview of the access point and introduces some basic concepts about wireless networking It also describes the basic settings required to access the management interface This section includes these...

Page 3: ...any computer attached to the network The CLI program can be accessed remotely by a Telnet or Secure Shell SSH connection over the network The CLI is used primarily for technical support The AP s manag...

Page 4: ...etwork you can access the AP s management agent from anywhere within the attached network The AP can be managed by any computer using a web browser or from a network computer using SNMP network manage...

Page 5: ...ng to the Web Interface Note It is strongly recommended to change the default user name and password thefirst time youaccessthewebinterface Forinformation on changing user namesandpasswords see UserAc...

Page 6: ...That is setting the country code restricts operation of the AP to the radio channels and transmit power levels permitted for wireless networks in the specified country Figure 2 Select Your Country Ca...

Page 7: ...n Figure 3 Select Setup Method Step 3 Configure Settings Easy Setup Basic wireless network and guest network access parameters Specify the name and password for the wireless network and guest network...

Page 8: ...llowing figure Ethernet Port 0 and Ethernet Port 1 are both attached to the WAN Traffic from these interfaces is directly bridged into the Internet This is also called bridge to Internet Figure 6 Brid...

Page 9: ...d below with links to the relevant section in this guide where the configuration parameters are described in detail Dashboard The dashboard shows basic settings for the AP including Internet status lo...

Page 10: ...new parameters and savesthemtotemporaryRAM memory Alsodisplaysamessageatthetopofthescreentoinformyouthatthe changes havenot yet been saved to Flash memory The running configuration will not be saved u...

Page 11: ...20 Chapter 1 Introduction MainMenu...

Page 12: ...vides details on configuring the access point using the web browser interface This section includes these chapters Status Information on page 22 Network Settings on page 28 Wireless Settings on page 3...

Page 13: ...atus on page 25 Traffic Graphs on page 27 System and Product Information The System and Product Info section shows descriptive information about the AP Figure10 SystemandProduct Information The follow...

Page 14: ...iption IP Address IP address of the Internet connection Gateway IP address of the gateway router used to pass traffic between this device and other network segments DNS The IP address of the Domain Na...

Page 15: ...orks The following items are displayed in this section Name Showsinformationonthename of thelocal network whetherstatic ordynamicconfigurationisused andthenetworkmask DHCP Server Shows if DHCP service...

Page 16: ...Status Shows if the wireless interface is enabled or disabled Op Mode Shows if the unit is configured to operate as an access point manually configured an AP in bridge mode or an AP in router mode Ch...

Page 17: ...not security has been enabled Associated clients Shows detailed information about clients Name Clientname MAC Address The MAC address of the wireless client IP Address The IP address assigned to the w...

Page 18: ...27 Chapter 2 Status Information Traffic Graphs TrafficGraphs The Traffic Graphs section shows the data rate for the Ethernet ports and wireless interfaces Figure 17 Traffic Graphs...

Page 19: ...ttings for the AP such as the source port IP aliases as well as the host name and maximum MTU size Figure 18 Internet Settings The following items aredisplayed on this page Internet Source The Etherne...

Page 20: ...55 0 Default Gateway The IP address of the default gateway which is used if the requested destination address is not on the local subnet If you have management stations DNS RADIUS or other network ser...

Page 21: ...The password specified by the service provider Range 1 32 characters ServiceName Theservice nameassignedforthe PPPoEconnection Theservice name is normallyoptional but may be required by some service p...

Page 22: ...s port Default ON Auto negotiation Enables or disables auto negotiation for a given interface Default ON 1000BASE T does not support forced mode Auto negotiation should always be used to establish a c...

Page 23: ...terfaceiswithinthe LAN routed to the Internet theaccess point can be managed through this interface by a PC whichis configuredwith IP addressinthe same subnet Route to Internet Configures an interface...

Page 24: ...cal area network IP Address Specifies the IP address for the local network or guest network Valid IP addresses consist of four decimal numbers 0 to 255 separated by periods Default 192 168 2 1 Subnet...

Page 25: ...tings Network Settings The following items aredisplayed on this page Network IP Specifies the IP address for the hotspot Valid IP addresses consist of four decimal numbers 0 to 255 separated by period...

Page 26: ...ge Radius Server 1 IP address or host name of the primary RADIUS server Radius Server 2 IP address or host name of the secondary RADIUS server Radius Shared Secret A shared text string used to encrypt...

Page 27: ...spot client to access a welcome web page normally used for authentication before gaining further access to the Internet The welcome page may require authentication and or payment Captive Portal Secret...

Page 28: ...ime The web interface identifies the radio configuration pages as Radio 0 the 5 GHz 802 11a n AC radio interface Radio 1 the 2 4 GHz 802 11b g n radio interface Each radio supports 8 virtual access po...

Page 29: ...but does not provide services to any wireless clients Client WDS The AP provides services to clients as a normal access point and operates as a client station in WDS mode which can connect to other ac...

Page 30: ...a set the channel on neighboring access points at least five channels apart to avoid interference with each other For example for 11g n 20 MHz mode you can deploy up to three access points in the same...

Page 31: ...fault ACN0 where is 0 7 for 5 GHz ACN1 where is 0 7 for 2 4 GHz Range 1 32 characters Broadcast The SSID can be broadcast at regular intervals so that wireless stationssearchingforanetworkconnectionca...

Page 32: ...employs techniques that are a subset of the IEEE 802 11e QoS standard and it enables the access point to inter operate with both WMM enabled clients and other devices that may lack any WMM functionali...

Page 33: ...two timing parameters AIFSN Arbitration Inter Frame Space Number a number used to calculate the minimum time between data frames CW Contention Window a number used to calculate a random backoff time A...

Page 34: ...int provides Wi Fi Protected Access WPA and WPA2 for improved data encryption and user authentication Be sure that the WEP shared keys are the same for each client in the wireless network All clients...

Page 35: ...r to WPA PSK for a description of encryption methods and the key WPA EAP WPA employs a combination of several technologies to provide an enhanced security solution for 802 11 wireless networks A RADIU...

Page 36: ...11i standard WPA2 includes the now ratified 802 11i standard but also offers backward compatibility with WPA Therefore WPA2 includes the same 802 1X and PSK modes of operation and support for TKIP en...

Page 37: ...ort as configured under VLAN Settings onpage50 Range 3 4095 Limit Upload Enables rate limiting of traffic from the VAP interface as it is passed to the wired network You can set a maximum rate in Kbyt...

Page 38: ...tream MCS12 180 Mbps 16 QAM double stream MCS13 240 Mbps 64 QAM double stream MCS14 270 Mbps 64 QAM double stream MCS15 300 Mbps 64 QAM double stream NSS1 MCS0 32 5 Mbps 256 QAM single stream NSS1 MCS...

Page 39: ...at 20MHz and 40MHz for signal reception Options 1 2 Default 1 Tx Power Adjusts the power of the radio signals transmitted from the access point The higher the transmission power the farther the trans...

Page 40: ...sent to a receiving station prior to the sending station starting communications The access point sends RTS frames to a receiving station to negotiate the sending of a data frame After receiving an RT...

Page 41: ...ant VAP virtual access point The access point can employ VLAN tagging to control access to network resources and increase security VLANs separate traffic passing between the access point associated cl...

Page 42: ...to configure the attachednetworkswitch port tosupport taggedVLAN framesforthe VLAN IDs configured on the accesspoint Otherwise connectivity to theaccesspointwillbe lostwhenyouenabletheVLANfeature Figu...

Page 43: ...temSettings This chapter describes maintenance settings on the access point It includes the following sections SystemSettings on page 53 Maintenance on page 54 User Accounts on page 57 Services on pag...

Page 44: ...the AP enabling the device to be uniquely identified on the network Default none Range 0 50 characters Device Latitude The geographic latitude of the access point given in degreesand minutes Range 90...

Page 45: ...ebootingthedevice restoringfactory defaults backing up or restoringconfigurationsettings andupgradingfirmware Figure 33 Maintenance Displaying System Logs The access point saves event and error messag...

Page 46: ...s Note that all user configured information will be lost You will have to re enter the default user name and password to re gain management access to this device Figure 36 Resetting to Defaults Note I...

Page 47: ...ing Firmware You can upgrade new access point software from a local file on the management workstation New software may be provided periodically from your distributor After upgrading new software you...

Page 48: ...emote Management Settings The SSH Telnet Web and SNMP management interfaces are enabled and open to access from the Internet To provide more security specific services can be disabled and management a...

Page 49: ...However note that Telnet is not secure from hostile attacks Figure 41 Telnet Server Settings The following items aredisplayed on this page TelnetServer Enables or disables Telnet access to the access...

Page 50: ...WAN Allows HTTP management access from the WAN HTTPS Port The TCP port to be used by the HTTPS Web browser interface Range 1 65535 Default 443 Allow HTTPS from WAN Allows HTTPS management access from...

Page 51: ...ext server in the sequence To configure additional servers click the button to open a new edit field Time Zone Todisplay a time corresponding to your local time choose one ofthepredefinedtimezonesfrom...

Page 52: ...A community string that acts like a password and permits access to the SNMP protocol Range 1 32 characters case sensitive Default public The default string public provides read only access to the acc...

Page 53: ...61 Appendices This section provides additional information and includes these items Troubleshooting onpage62 Section III...

Page 54: ...work must be configured with the appropriate tag If you cannot connect using Telnet you may have exceeded the maximum number of concurrent Telnet SSH sessions permitted Try connecting again at a later...

Page 55: ...play the log file through the System Maintenance menu and copy the information from the log file 7 Contact your distributor s service engineer and send a detailed description of the problem along with...

Page 56: ...64...

Page 57: ...and check the package contents Outdoor Stand Alone Access Point SkyFire AC866 Pole mounting kit includes two steel band clamps PoE power injector with power cord either US Continental Europe or UK Do...

Page 58: ...cable to the 1000BASE T RJ 45 ETH0 PoE port on the unit Connect outdoor rated Category 5e or better cable to the left side RJ 45 ETH0 PoE port Optional Connect a local LAN switch or computer to the r...

Page 59: ...40 VAC 50 60 Hz Note Connecting the Ethernet cable from the AP to the injector module powers ontheunit 5 VerifyAP Operation Verify basic AP operation by checking the system LEDs The power LED should b...

Page 60: ...the AP s ETH1 RJ 45 port The AP has a default management IP address of 192 168 2 1 and a subnet mask of 255 255 255 0 You must set your PC IP address to be on the same subnet as the AP that is the PC...

Page 61: ...GHz Radio IEEE 802 11b g n 5 GHz Radio IEEE802 11a n ac RadioFrequencies 5745 5825MHz China 5180 5240 MHz NCC 5260 5230 MHz NCC 5745 5825 MHz NCC PowerSupply PoEInputPower 24VDC 1 0A PowerConsumption...

Page 62: ...g measures Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the rece...

Page 63: ...h have been approved by the applicant The non approved antenna s may produce unwanted spurious or excessive RF transmitting power which may lead to the violation of FCC limit and is prohibited 4 Insta...

Reviews: