background image

30

Appendix A: Troubleshooting

Frequently Asked Questions

Wireless-G Ethernet Bridge

Can I run an application from a remote computer over the wireless network?

This will depend on whether or not the application is designed to be used over a network. Consult the 
application’s user guide to determine if it supports operation over a network.

Can I play multiplayer games with other users of the wireless network?

Yes, as long as the game supports multiple players over a LAN. Refer to the game’s user guide for more 
information.

What is ad-hoc mode?

When a wireless network is set to ad-hoc mode, the wireless-equipped computers are configured to 
communicate directly with each other. The ad-hoc wireless network will not communicate with any wired 
network. 

What is infrastructure mode?

When a wireless network is set to infrastructure mode, the wireless network is configured to communicate with 
a wired network through a wireless access point.

What is roaming?

Roaming is the ability of a portable computer user to communicate continuously while moving freely throughout 
an area greater than that covered by a single wireless network access point. Before using the roaming function, 
the workstation must make sure that it is the same channel number as the wireless network access point of the 
dedicated coverage area. 

To achieve true seamless connectivity, the wireless LAN must incorporate a number of different functions. Each 
node and wireless network access point, for example, must always acknowledge receipt of each message. Each 
node must maintain contact with the wireless network even when not actually transmitting data. Achieving these 
functions simultaneously requires a dynamic RF networking technology that links wireless network access points 
and nodes. In such a system, the user’s end node undertakes a search for the best possible access to the system. 
First, it evaluates such factors as signal strength and quality, as well as the message load currently being carried 
by each wireless network access point and the distance of each wireless network access point to the wired 
backbone. Based on that information, the node next selects the right wireless network access point and registers 
its address. Communications between end node and host computer can then be transmitted up and down the 
backbone.

As the user moves on, the end node’s RF transmitter regularly checks the system to determine whether it is in 
touch with the original wireless network access point or whether it should seek a new one. When a node no 
longer receives acknowledgment from its original wireless network access point, it undertakes a new search. 
Upon finding a new wireless network access point, it then re-registers, and the communication process 
continues.

Summary of Contents for WET54G-EU v3

Page 1: ...A Division of Cisco Systems Inc Model No Ethernet Bridge Wireless G WET54G EU v3 User Guide WIRELESS GHz 2 4802 11g...

Page 2: ...In addition to these symbols there are definitions for technical terms that are presented like this Also each figure diagram screenshot or other image is provided with a figure number and description...

Page 3: ...Bridge 9 Chapter 6 Connecting the Wireless G Ethernet Bridge for Network Use 14 Connection to a Network Device 14 Placement Options 14 Chapter 7 Using the Wireless G Ethernet Bridge Web based Utility...

Page 4: ...ranty Information 45 Appendix H Regulatory Information 46 FCC Statement Industry Canada Canada Compliance Information for 2 4 GHz Wireless Products Relevant to the EU and Other Countries Following EU...

Page 5: ...idges 10 Figure 5 4 Password 10 Figure 5 5 Mode Settings 10 Figure 5 6 Wireless Settings 11 Figure 5 7 IP Settings 11 Figure 5 8 Security Settings WEP 12 Figure 5 9 Security Settings WPA PSK 12 Figure...

Page 6: ...igure 7 9 RADIUS TLS 22 Figure 7 10 RADIUS TTLS 23 Figure 7 11 Password Tab 24 Figure 7 12 Advanced Settings Tab 24 Figure 7 13 Status Tab 26 Figure 7 14 Help Tab 27 Figure 7 15 Firmware Upgrade 27 Fi...

Page 7: ...erever you want power and data are both supplied through the Category 5 Ethernet cable You can also use the Wireless G Ethernet Bridge as a kind of cable less cable to connect remote areas together Ma...

Page 8: ...ecting the Wireless G Ethernet Bridge for Network Use This chapter explains how to connect the Bridge to a network device so the device can join your wireless network It also describes placement optio...

Page 9: ...appendix provides the technical specifications for the Bridge Appendix G Warranty Information This appendix supplies the warranty information for the Bridge Appendix H Regulatory Information This app...

Page 10: ...ch can roam within a certain radial range of the access point Multiple access points can be arranged to work in succession to extend the roaming range and can be set up to communicate with your Ethern...

Page 11: ...ork Adapters model numbers WPC11 and WPC54G for your laptop computers Wireless B and Wireless G PCI Adapters model numbers WMP11 and WMP54G for your desktop PCs and Wireless B and Wireless G USB Adapt...

Page 12: ...The LAN port is where you will connect the Ethernet network cable Power The Power port is where you will connect the power adapter Important If you reset the Wireless G Ethernet Bridge you will erase...

Page 13: ...is booting up and performing a self test the Power LED will flash It will stop flashing and remain lit when the self test has ended Ethernet Green The Ethernet LED will be lit steadily when the Bridge...

Page 14: ...45 port of the hub switch or PC you wish to use to configure the Bridge 4 Plug the supplied power cable into the Power port on the back panel of the Bridge shown in Figure 4 2 Then plug the other end...

Page 15: ...up button to proceed with the Setup Wizard User Guide Click the User Guide button to open the PDF file of this User Guide LINKSYS Web Click the LINKSYS Web button to access the Linksys website using a...

Page 16: ...enter admin in the Password field later you can change the password through the Web based Utility Then click the Enter button 6 The screen shown in Figure 5 5 shows a choice of two wireless modes Clic...

Page 17: ...te Network Mode Keep the default setting Mixed if you have Wireless G and Wireless B devices in your network Select G Only if you have only Wireless G devices in your network 8 The IP Settings screen...

Page 18: ...ill be automatically generated The Passphrase is case sensitive and should have 16 or fewer alphanumeric characters It must match the passphrase of your wireless network and is compatible with Linksys...

Page 19: ...own in Figure 5 11 shows that the configuration is complete To configure any other Wireless G Ethernet Bridges on your network run this Setup Wizard again To register the Bridge click the Online Regis...

Page 20: ...st the antenna so that it points straight up in the air The second way is to hang the Bridge on a wall with the Bridge in a vertical position The third way is to stand the Bridge vertically on a surfa...

Page 21: ...at are adjacent to the power port 2 The Bridge includes two triangular stands Insert a stand into an opening Push the stand up to snap it into place 3 Repeat step 2 using the second stand 4 Place the...

Page 22: ...ly recommended 2 The Utility s Setup screen shown in Figure 7 2 will appear The Utility provides a convenient web browser based way to alter the Bridge s settings It offers five main tabs Setup Enable...

Page 23: ...D The SSID is the network name shared among all devices in a wireless network The SSID must be identical for all devices in the wireless network It is case sensitive and must not exceed 32 alphanumeri...

Page 24: ...el The channel setting Signal Strength The percentage of wireless signal strength Mode The type of wireless standard network mode and status of WEP encryption Click the Refresh button to obtain the mo...

Page 25: ...devices are using the same key WEP Encryption In order to use WEP encryption select 64 Bit 10 hex digits or 128 Bit 26 hex digits from the drop down menu Passphrase Instead of manually entering WEP k...

Page 26: ...the Bridge and the server Click the Apply button to save your changes If your page doesn t automatically refresh itself then click the Refresh button of your web browser Click the View Log button to...

Page 27: ...RADIUS WEP encryption is automatically selected If using WPA RADIUS then you must choose the WPA Algorithm TKIP or AES on the RADIUS server Screens shown are for RADIUS Security Mode WPA RADIUS will h...

Page 28: ...ter the user certificate you have installed to authenticate you on your wireless network or click the Browse button to browse for it Click the Upload button to upload the certificate Root Certificate...

Page 29: ...me of your wireless network Enter the Login name of your wireless network in the User ID field Password This is the password used for your wireless network Enter the password in the Password field Roo...

Page 30: ...re 7 12 to customize advanced wireless settings and clone a MAC address onto the Bridge Wireless Transmission Rate The default setting is Auto The range is from 1 to 54Mbps The rate of data transmissi...

Page 31: ...mented into multiple packets If you experience a high packet error rate you may slightly increase the Fragmentation Threshold Setting the Fragmentation Threshold too low may result in poor network per...

Page 32: ...The Bridge s IP Address is displayed here Subnet Mask The Bridge s Subnet Mask is displayed here Gateway The Gateway address for the Bridge is displayed here LAN Statistics Ethernet TX The number of...

Page 33: ...link to download it Adobe Website software for viewing PDF documents If you need to download the Adobe Acrobat Reader to view the User Guide pdf then click the Adobe Website link Firmware Upgrade The...

Page 34: ...cess point 2 I want to play head to head ad hoc gaming with two Xboxes but they won t communicate Perform the following steps Make sure both Bridges are set to the same SSID network mode Ad Hoc channe...

Page 35: ...case s when entering the password If you forget your password you can push the Bridge s Reset button This will reset the password to the default setting however all other Bridge settings will be rese...

Page 36: ...cess point of the dedicated coverage area To achieve true seamless connectivity the wireless LAN must incorporate a number of different functions Each node and wireless network access point for exampl...

Page 37: ...What is FHSS And what are their differences Frequency Hopping Spread Spectrum FHSS uses a narrowband carrier that changes frequency in a pattern that is known to both transmitter and receiver Properly...

Page 38: ...ally For information on implementing these security features refer to Chapter 7 Using the Wireless G Ethernet Bridge Web based Utility Security Threats Facing Wireless Networks Wireless networks are e...

Page 39: ...wireless nodes with certain MAC Addresses This makes it harder for a hacker to access your network with a random MAC Address WEP Encryption Wired Equivalent Privacy WEP is often looked upon as a cure...

Page 40: ...r This should only be used when a RADIUS server is connected to the Router or other device First enter the RADIUS server s IP Address and port number along with a key shared between the device and the...

Page 41: ...ppropriate product category 4 Select the Wireless G Ethernet Bridge 5 Download its firmware upgrade file and extract it on your PC 6 Open the Bridge s Web based Utility and click the Help tab 7 On the...

Page 42: ...or protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help...

Page 43: ...dapter This is a device that adds network functionality to your PC Ad hoc A group of wireless devices communicating directly with each other peer to peer without the use of an access point Backbone Th...

Page 44: ...omain name Default Gateway A device that forwards Internet traffic from your local area network DHCP Dynamic Host Configuration Protocol A protocol that lets one device on a local network known as a D...

Page 45: ...File Transfer Protocol A standard protocol for sending files between computers over a TCP IP network and the Internet Full Duplex The ability of a networking device to receive and transmit data simult...

Page 46: ...omputers or devices connected for the purpose of data sharing storage and or transmission between users NNTP Network News Transfer Protocol The protocol used to connect to Usenet groups on the Interne...

Page 47: ...CTS Clear To Send message before sending data Server Any computer whose function in a network is to provide user access to files printing communications and other services SMTP Simple Mail Transfer P...

Page 48: ...twork protocol for transmitting data that does not require acknowledgement from the recipient of the data that is sent Upgrade To replace existing software or firmware with a newer version Upload To t...

Page 49: ...Cabling Type Category 5 or better LEDs Power Ethernet Wireless G Transmit Power 16 1 dBm 11Mbps CCK 12 1 dBm 54Mbps OFDM Security Feature WEP Encryption WPA WEP Key Bits 64 128 bit Protocols 802 11b...

Page 50: ...44 Appendix F Specifications Wireless G Ethernet Bridge Storage Temp 20 C to 70 C 4 F to 158 F Operating Humidity 10 to 85 Non Condensing Storage Humidity 5 to 90 Non Condensing...

Page 51: ...OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific lega...

Page 52: ...inksys Wireless B and Wireless G products the following CE mark notified body number where applicable and class 2 identifier are added to the equipment Check the CE label on the product to find out wh...

Page 53: ...n allen EU Staaten ohne Einschr nkungen eingesetzt werden sowie in anderen Staaten die der EU Direktive 1999 5 CE folgen mit Au nahme der folgenden aufgef hrten Staaten Belgium The Belgian Institute f...

Page 54: ...per maggiori dettagli Product Usage Restrictions This product is designed for indoor usage only Outdoor usage is not recommended Any modification or alteration to the product shall void the warranty...

Page 55: ...ct Power Output 7 From the pull down menu on the right select the wireless adapter s power output percentage Windows 2000 1 Open the Control Panel 2 Double click Network and Dial Up Connections 3 Sele...

Page 56: ...d used according to the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equipmen...

Page 57: ...upport at linksys com Belgium support be linksys com Denmark support dk linksys com France support fr linksys com Germany support de linksys com Italy support it linksys com Netherlands support nl lin...

Page 58: ...52 Appendix I Contact Information Wireless G Ethernet Bridge Middle East Africa support mea linksys com English only Asia Pacific asiasupport linksys com English only Outside of Europe E mail Address...

Reviews:

Related manuals for WET54G-EU v3