Chapter 6 Wireless LAN
PMG5318-B20A User’s Guide
58
Every wireless network must follow these basic guidelines.
• Every device in the same wireless network must use the same SSID.
The SSID is the name of the wireless network. It stands for Service Set IDentifier.
• If two wireless networks overlap, they should use a different channel.
Like radio stations or television channels, each wireless network uses a specific channel, or
frequency, to send and receive information.
• Every device in the same wireless network must use security compatible with the AP.
Security stops unauthorized devices from using the wireless network. It can also protect the
information that is sent in the wireless network.
Radio Channels
In the radio spectrum, there are certain frequency bands allocated for unlicensed, civilian use. For
the purposes of wireless networking, these bands are divided into numerous channels. This allows a
variety of networks to exist in the same place without interfering with one another. When you
create a network, you must select a channel to use.
Since the available unlicensed spectrum varies from one country to another, the number of
available channels also varies.
6.9.2 Additional Wireless Terms
The following table describes some wireless network terms and acronyms used in the GPON
Device’s Web Configurator.
6.9.3 Wireless Security Overview
By their nature, radio communications are simple to intercept. For wireless data networks, this
means that anyone within range of a wireless network without security can not only read the data
passing over the airwaves, but also join the network. Once an unauthorized person has access to
Table 24
Additional Wireless Terms
TERM
DESCRIPTION
RTS/CTS Threshold
In a wireless network which covers a large area, wireless devices are sometimes
not aware of each other’s presence. This may cause them to send information to
the AP at the same time and result in information colliding and not getting through.
By setting this value lower than the default value, the wireless devices must
sometimes get permission to send information to the GPON Device. The lower the
value, the more often the devices must get permission.
If this value is greater than the fragmentation threshold value (see below), then
wireless devices never have to get permission to send information to the GPON
Device.
Preamble
A preamble affects the timing in your wireless network. There are two preamble
modes: long and short.
If a device uses a different preamble mode than the GPON
Device does, it cannot communicate with the GPON Device.
Authentication
The process of verifying whether a wireless device is allowed to use the wireless
network.
Fragmentation
Threshold
A small fragmentation threshold is recommended for busy networks, while a larger
threshold provides faster performance if the network is not very busy.
Summary of Contents for PMG5318-B20A
Page 8: ...Table of Contents PMG5318 B20A User s Guide 8 ...
Page 14: ...Chapter 1 Introduction PMG5318 B20A User s Guide 14 ...
Page 20: ...Chapter 2 The Web Configurator PMG5318 B20A User s Guide 20 ...
Page 44: ...Chapter 5 LAN PMG5318 B20A User s Guide 44 ...
Page 70: ...Chapter 6 Wireless LAN PMG5318 B20A User s Guide 70 ...
Page 80: ...Chapter 8 Quality of Service QoS PMG5318 B20A User s Guide 80 ...
Page 96: ...Chapter 10 Phone Usage PMG5318 B20A User s Guide 96 ...
Page 102: ...Chapter 11 USB Services PMG5318 B20A User s Guide 102 ...
Page 117: ...Chapter 12 Remote Management PMG5318 B20A User s Guide 117 ...
Page 118: ...Chapter 12 Remote Management PMG5318 B20A User s Guide 118 ...
Page 122: ...Chapter 13 Static Route PMG5318 B20A User s Guide 122 ...
Page 126: ...Chapter 14 Dynamic DNS PMG5318 B20A User s Guide 126 ...
Page 144: ...Chapter 17 Logs PMG5318 B20A User s Guide 144 ...
Page 150: ...Chapter 19 Diagnostic PMG5318 B20A User s Guide 150 ...
Page 164: ...Appendix B Legal Information PMG5318 B20A User s Guide 164 ...