Weidmuller Wireless Ethernet Modem & Device Server WI-MOD-E-G/A User Manual
Rev.
2.16
www.weidmuller.com
56
that communicate using a different Encryption method e.g. 128 bit WEP and may not support the same Encryption
method.
Example 4 – WDS Routed Network
An example of using WDS router interfaces to achieve a similar physical topology to the WDS bridge example discussed
earlier is illustrated below.
In both examples, there are four WDS Access points each with the possibility of having their own client/stations
associated. In both examples A, B, C, and D can all exchange data with each other. The bridged example has the
advantage of redundancy but at the expense of extra overhead. The routed example below cannot provide the
redundancy of the bridged example, and requires more configuration effort, but does not have the overhead of using the
bridge Spanning Tree Protocol, so is suited to fixed installations that do not require redundancy.
Figure 48 - WDS Routed
Each Modem has a different SSID. This is done to limit broadcast traffic and to route data only were it needs to go.
Site B has two Virtual Client WDS links configured – one to Site A’s Access Point, and one to Site C’s Access Point. The
screenshot below shows the WDS connections at Site B.
Figure 49 - Site B WDS Connections
The first entry configures a virtual WDS Client connection from Site B to the Access Point at Site A. The SSID is
the same as Site A and the Router IP address is 192.168.0.3 which is on the same subnet. It must be noted that
Encryption is not inherited from the main page. Therefore if the Encryption method/key are left blank the WDS link
will be open. This example shows the Encryption method and keys as being different however they can be the
same or take on the same method and key as the main wireless interface.
The second entry configures another virtual WDS Client connection but this time to the Access Point of Site C.
Again the SSID is the same as the AP and the Router IP is on the same subnet as the Access Point.