Chapter 7 Wireless
P-873HNU(P)-51B User’s Guide
97
Since the available unlicensed spectrum varies from one country to another, the number of
available channels also varies.
7.7.2 Additional Wireless Terms
The following table describes some wireless network terms and acronyms used in the VDSL Router’s
Web Configurator.
7.7.3 Wireless Security Overview
By their nature, radio communications are simple to intercept. For wireless data networks, this
means that anyone within range of a wireless network without security can not only read the data
passing over the airwaves, but also join the network. Once an unauthorized person has access to
the network, he or she can steal information or introduce malware (malicious software) intended to
compromise the network. For these reasons, a variety of security systems have been developed to
ensure that only authorized people can use a wireless data network, or understand the data carried
on it.
These security standards do two things. First, they authenticate. This means that only people
presenting the right credentials (often a username and password, or a “key” phrase) can access the
network. Second, they encrypt. This means that the information sent over the air is encoded. Only
people with the code key can understand the information, and only people who have been
authenticated are given the code key.
These security standards vary in effectiveness. Some can be broken, such as the old Wired
Equivalent Protocol (WEP). Using WEP is better than using no security at all, but it will not keep a
determined attacker out. Other security standards are secure in themselves but can be broken if a
user does not use them properly. For example, the WPA-PSK security standard is very secure if you
use a long key which is difficult for an attacker’s software to guess - for example, a twenty-letter
long string of apparently random numbers and letters - but it is not very secure if you use a short
key which is very easy to guess - for example, a three-letter word from the dictionary.
Table 21
Additional Wireless Terms
TERM
DESCRIPTION
RTS/CTS Threshold
In a wireless network which covers a large area, wireless devices are
sometimes not aware of each other’s presence. This may cause them to send
information to the AP at the same time and result in information colliding
and not getting through.
By setting this value lower than the default value, the wireless devices must
sometimes get permission to send information to the VDSL Router. The
lower the value, the more often the devices must get permission.
If this value is greater than the fragmentation threshold value (see below),
then wireless devices never have to get permission to send information to
the VDSL Router.
Preamble
A preamble affects the timing in your wireless network. There are two
preamble modes: long and short.
If a device uses a different preamble mode
than the VDSL Router does, it cannot communicate with the VDSL Router.
Authentication
The process of verifying whether a wireless device is allowed to use the
wireless network.
Fragmentation
Threshold
A small fragmentation threshold is recommended for busy networks, while a
larger threshold provides faster performance if the network is not very busy.
Summary of Contents for P-873HNU-51B
Page 4: ...Contents Overview P 873HNU P 51B User s Guide 4...
Page 13: ...Table of Contents P 873HNU P 51B User s Guide 13 Appendix F Legal Information 329 Index 333...
Page 14: ...Table of Contents P 873HNU P 51B User s Guide 14...
Page 15: ...15 PART I User s Guide...
Page 16: ...16...
Page 32: ...Chapter 2 The Web Configurator P 873HNU P 51B User s Guide 32...
Page 57: ...57 PART II Technical Reference...
Page 58: ...58...
Page 64: ...Chapter 5 Network Map and Status Screens P 873HNU P 51B User s Guide 64...
Page 108: ...Chapter 7 Wireless P 873HNU P 51B User s Guide 108...
Page 132: ...Chapter 9 Static Routing P 873HNU P 51B User s Guide 132...
Page 152: ...Chapter 10 Quality of Service QoS P 873HNU P 51B User s Guide 152...
Page 168: ...Chapter 11 Network Address Translation NAT P 873HNU P 51B User s Guide 168...
Page 182: ...Chapter 13 IGMP P 873HNU P 51B User s Guide 182...
Page 188: ...Chapter 14 Interface Group P 873HNU P 51B User s Guide 188...
Page 202: ...Chapter 17 Parental Control P 873HNU P 51B User s Guide 202...
Page 224: ...Chapter 22 Logs P 873HNU P 51B User s Guide 224...
Page 234: ...Chapter 25 xDSL Statistics P 873HNU P 51B User s Guide 234...
Page 238: ...Chapter 26 Users Configuration P 873HNU P 51B User s Guide 238...
Page 244: ...Chapter 27 Remote Management P 873HNU P 51B User s Guide 244...
Page 250: ...Chapter 29 Logs Setting P 873HNU P 51B User s Guide 250...
Page 256: ...Chapter 31 Configuration P 873HNU P 51B User s Guide 256...
Page 262: ...Chapter 32 Diagnostic P 873HNU P 51B User s Guide 262...
Page 274: ...Chapter 34 Product Specifications P 873HNU P 51B User s Guide 274...
Page 310: ...Appendix C Pop up Windows JavaScript and Java Permissions P 873HNU P 51B User s Guide 310...
Page 324: ...Appendix D Wireless LANs P 873HNU P 51B User s Guide 324...