
56
www.cooperbussmann.com/wirelessresources
Cooper Bussmann 945U-E Wireless Ethernet Modem & Device Server User Manual
Rev Version 2.14
examples. One reason why the encryption level and key would be different is that the access point may have clients
that communicate using a different encryption method (for example, 128-bit WEP) and may not support the same
encryption method.
Example 4: WDS Routed Network
An example of using WDS router interfaces to achieve a similar physical topology to the WDS bridge example
discussed earlier is shown in Figure 53.
In both examples, there are four WDS access points each with the possibility of having their own client or stations
associated. In both examples, Sites A, B, C, and D can all exchange data with each other. The bridged example
has the advantage of redundancy, but at the expense of extra overhead. The routed example below cannot
provide the redundancy of the bridged example, and requires more configuration effort, but does not have the
overhead of using the bridge Spanning Tree Protocol and therefore is suited to fixed installations that do not require
redundancy.
Figure 53 WDS Routed
Each modem has a different SSID. This is done to limit broadcast traffic and to route data only were it needs to go.
Site B has two virtual client WDS links configured—one to Site A’s access point, and one to Site C’s access point.
Figure 54 shows the WDS connections at Site B.
Figure 54 Site B Configuration
• The first entry configures a virtual WDS client connection from Site B to the access point at Site A. The SSID
is the same as Site A and the router IP address is 192.168.0.3, which is on the same subnet. Encryption is not