
Wireless Multi-Client Bridge / Access Point / Repeater
Version 1.2
Page 32 of 32
6.5.2 Advanced
h
Click on the
Advanced
link on the navigation bar. On this page you may
configure the maximum associated stations, thresholds, beacon periods,
DTIM interval, maximum burst time, PSM mode. The image below depicts the
configuration screen of the Advanced option.
h
Fragmentation threshold:
transmitted wireless packets larger than this size
will be fragmented to maintain performance in noisy wireless networks.
h
RTS threshold:
transmitted wireless packets larger than this size will use the
RTS/CTS protocol to (a) maintain performance in noisy wireless networks
and (b) prevent hidden nodes from degrading performance.
h
Beacon period:
Access Point beacons are sent out periodically. This is the
number of milliseconds between each beacon.
h
DTIM interval:
this is the number of beacons per DTIM (Delivery Traffic
Indication Message), e.g. '1' means send a DTIM with each beacon, '2'
means with every 2nd beacon, etc.
h
Maximum burst time:
this is also known as PRISM Nitro (tm) technology.
The technology uses fully standards-compliant methods that eliminate
collisions in mixed-mode networks, while greatly increasing the performance
of both pure 802.11g and mixed 802.11b/g networks. The setting is for the
amount of time the radio will be reserved to send data without requiring an
ACK. This number is in units of microseconds. A typical value would be 1000
microseconds. When this number is zero, bursting is disabled.
h
PSM Mode:
turn this on to enable support for stations in power save mode.
h
Click on the
Save
button to confirm the changes.
6.5.3 WPA
h
Click on the
WPA
link on the navigation bar. On this page you may configure
WPA, an acronym for Wi-Fi Protected Access, which is a security protocol
from the Wi-Fi alliance for 802.11 wireless networks. It uses the Temporal
Key Integrity Protocol (TKIP) to provide stronger encryption than the earlier