background image

www.lanpro.com

Wireless - Equipment - 2.4 GHz - LP-1521 User Manual High Speed Long Range Wireless Broad Band Router, with PoE

37

What is BSSID? 

A six-byte address that distinguishes a particular a particular access point from others. Also know as just SSID. Serves as 

a network ID or name. 

 

What is ESSID? 

The Extended Service Set ID (ESSID) is the name of the network you want to access. It is used to identify different wireless 

networks. 

What are potential factors that may causes interference?

 

Factors of interference: 

 • Obstacles: walls, ceilings, furniture… etc.

 • Building Materials: metal door, aluminum studs.

 • Electrical devices: microwaves, monitors and electrical motors.

Solutions to overcome the interferences: 

 • Minimizing the number of walls and ceilings.

 • Position the WLAN antenna for best reception.

 • Keep WLAN devices away from other electrical devices, eg: microwaves, monitors, electric motors, … etc.

 • Add additional WLAN Access Points if necessary.

What are the Open System and Shared Key authentications?

 

IEEE 802.11 supports two subtypes of network authentication services: open system and shared key. Under open system 

authentication, any wireless station can request authentication. The station that needs to authenticate with another wireless 

station sends an authentication management frame that contains the identity of the sending station. The receiving station 

then  returns  a  frame  that  indicates  whether  it  recognizes  the  sending  station.  Under  shared  key  authentication,  each 

wireless station is assumed to have received a secret shared key over a secure channel that is independent from the 802.11 

wireless network communications channel.

What is WEP? 

An optional IEEE 802.11 function that offers frame transmission privacy similar to a wired network. The Wired Equivalent 

Privacy generates secret shared encryption keys that both source and destination stations can use to alert frame bits to 

avoid disclosure to eavesdroppers. 

WEP relies on a secret key that is shared between a mobile station (e.g. a laptop with a wireless Ethernet card) and an 

access point (i.e. a base station). The secret key is used to encrypt packets before they are transmitted, and an integrity 

check is used to ensure that packets are not modified in transit.

What is Fragment Threshold? 

The proposed protocol uses the frame fragmentation mechanism defined in IEEE 802.11 to achieve parallel transmissions. 

A large data frame is fragmented into several fragments each of size equal to fragment threshold. By tuning the fragment 

threshold value, we can get varying fragment sizes. The determination of an efficient fragment threshold is an important 

issue in this scheme. If the fragment threshold is small, the overlap part of the master and parallel transmissions is large. 

This means the spatial reuse ratio of parallel transmissions is high. In contrast, with a large fragment threshold, the overlap 

is small and the spatial reuse ratio is low. However high fragment threshold leads to low fragment overhead. Hence there 

is a trade-off between spatial re-use and fragment overhead. 

Fragment threshold is the maximum packet size used for fragmentation. Packets larger than the size programmed in this 

field will be fragmented.

If you find that your corrupted packets or asymmetric packet reception (all send packets, for example). You may want to try 

lowering your fragmentation threshold. This will cause packets to be broken into smaller fragments. These small fragments, 

if corrupted, can be resent faster than a larger fragment. Fragmentation increases overhead, so you’ll want to keep this 

value as close to the maximum value as possible.

Содержание LP-1521

Страница 1: ...802 11b g 54Mbps Wireless BroadBand Router with PoE LP1521_UM_ENB02W LP 1521 User Manual High Speed Long Range 802 11b g 54Mbps Wireless BroadBand Router with PoE 400mW 802 11b 54Mbps 200mW 802 11g 5...

Страница 2: ...nce will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user...

Страница 3: ...sfer Protocol IEEE Institute of Electrical and Electronic Engineers IKE Internet Key Exchange IP Internet Protocol ISM Industrial Scientific and Medical LAN Local Area Network MAC Media Access Control...

Страница 4: ...Chipset Realtek RTL8186 180MHz Memory Information 16MB SDRAM 2MB Flash Modulation Method IEEE 802 11b CCK DQPSK DBPSK IEEE 802 11g BPSK QPSK 16QAM 64QAM DBPSK DQPSK CCK RF Spreading Method Direct Seq...

Страница 5: ...trol Wireless sites survey TCP UDP ICMP ARP protocol stack Dynamic DNS WDS AP Client WDS AP VPN Pass through with multiple sessions Supports firewall security with port filtering IP filtering MAC filt...

Страница 6: ...data is transmitting or receiving on the LAN interface 10 100M On Connection speed is 100Mbps on LAN interface Off Connection speed is 10Mbps on LAN interface RESET WAN 1 2 3 4 PWR Antenna Reset WAN L...

Страница 7: ...AC DC power adapter supplied with the WLAN Broadband Router it may occur damage by using a different type of power adapter The hardware installation finished 1 6 Software Installation There are no so...

Страница 8: ...IP address within 192 168 1 1 to 192 168 1 253 is good to connect the Wireless LAN Access Point IP Subnet Mask 255 255 255 0 Click OK and reboot your PC after completes the IP parameters setting For...

Страница 9: ...on to install the TCP IP protocol it may need the Microsoft Windows CD to complete the installation Close and go back to Network dialog box after the TCP IP installation Select TCP IP and click the pr...

Страница 10: ...P IP configuration Attain IP Protocol It shows type of connection IP Address It shows the IP address of LAN interfaces of WLAN Broadband Router Subnet Mask It shows the IP subnet mask of LAN interface...

Страница 11: ...n mode Screen snapshot Operation Mode Figure 6 II Time Zone Setting This page is used to enable and configure NTP client Screen snapshot Time Zone Settings Figure 7 III LAN Interface Setup This page i...

Страница 12: ...which mode wireless broadband router acts Figure 12 Screen snapshot Operation Mode Item Description Gateway Traditional gateway configuration It always connects internet via ADSL Cable Modem LAN inter...

Страница 13: ...int or IBSS is found you could choose to connect it manually when client mode is enabled Refer to 3 3 9 Site Survey SSID It is the wireless network name The SSID can be 32 bytes long Channel Number Se...

Страница 14: ...RTS Threshold value can be written between 0 and 2347 bytes Refer to 4 11 What is RTS Request To Send Threshold Beacon Interval Set the Beacon Interval value can be written between 20 and 1024 ms Refe...

Страница 15: ...EP Click the check box to enable IEEE 802 1x authentication function Refer to 4 16 What is 802 1x Authentication WPA Authentication Mode While Encryption is selected to be WPA Click to select the WPA...

Страница 16: ...Key Set the default secret key for WEP security function Value can be chose between 1 and 4 Encryption Key 1 Secret key 1 of WEP security encryption function Encryption Key 2 Secret key 2 of WEP secu...

Страница 17: ...N Broadband Router access capability Comment Fill in the comment tag for the registered client Apply Changes Click the Apply Changes button to register the client to new configuration setting Reset Cl...

Страница 18: ...ing Set Security Click button to configure wireless security like WEP 64bits WEP 128bits WPA TKIP WPA2 AES or None Show Statistics It shows the TX RX packets rate statistics Delete Selected Click to d...

Страница 19: ...w Site Survey This page is used to view or configure other APs near yours Screen snapshot Wireless Site Survey Figure 21 Item Description SSID It shows the SSID of AP BSSID It shows BSSID of AP Channe...

Страница 20: ...ith their assigned IP address MAC address and time expired information Server mode only DNS Server Manual setup DNS server IP address Domain Name Assign Domain Name and dispatch to DHCP clients It is...

Страница 21: ...S 3 Fill in the IP address of Domain Name Server 3 Clone MAC Address Fill in the MAC address that is the MAC address to be cloned Refer to 4 24 What is Clone MAC Address Enable uPNP Click the checkbox...

Страница 22: ...P support DNS 1 Fill in the IP address of Domain Name Server 1 DNS 2 Fill in the IP address of Domain Name Server 2 DNS 3 Fill in the IP address of Domain Name Server 3 Clone MAC Address Fill in the M...

Страница 23: ...s to setup the connection through the PPPoE protocol by clicking the Connect button manually and clicking the Disconnect button manually Idle Time If you select the PPPoE and Connect on Demand connect...

Страница 24: ...TU Size The default value is 1400 Refer to 4 23 What is Maximum Trans mission Unit MTU Size Request MPPE Encryption Click the checkbox to enable request MPPE encryption Attain DNS Automatically Click...

Страница 25: ...ck to delete all the registered entries from the port filtering list Reset Click the Reset button to abort change and recover the previous configuration setting Firewall IP Filtering Entries in this t...

Страница 26: ...tries in this table allow you to automatically redirect common network services to a specific machine behind the NAT firewall These settings are only necessary if you wish to host some sort of server...

Страница 27: ...Click to delete all the registered entries from the URL Filtering list Reset Click the Reset button to abort change and recover the previous configuration setting Firewall DMZ A Demilitarized Zone is...

Страница 28: ...nable NAT Traversal Click to enable NAT Traversal function Generate RSA Key Click to generate RSA key Show RSA Public Key Click to show RSA public key that we generate Apply Changes Click the Apply Ch...

Страница 29: ...or E mail as local exchange type Fill in local ID except IP selected Click to select IP DNS or E mail as remote exchange type Fill in remote ID except IP selected Screen snapshot VPN Setup Edit 2 Fig...

Страница 30: ...lick to select DH1 modp768 DH2 modp1024 or DH5 modp1536 key group Default value is DH2 Key Life Time Fill in the key life time value by seconds Phase 2 Active Protocol ESP Encryption Algorithm Click t...

Страница 31: ...s on the Ethernet LAN interface Ethernet WAN Sent Packets It shows the statistic count of sent packets on the Ethernet WAN interface Ethernet WAN Received Packets It shows the statistic count of recei...

Страница 32: ...pply Changes button to save and enable NTP client service Reset Click the Reset button to abort change and recover the previous configuration setting Refresh Click the refresh the current time shown o...

Страница 33: ...remote log IP address Apply Changes Click the Apply Changes button to save above settings Refresh Click the refresh the log shown on the screen Clear Clear log display screen Management Upgrade Firmw...

Страница 34: ...nd Router Reset Settings to Default Click the Reset button to reset the configuration parameter to factory defaults Management Password Setup This page is used to set the account to access the web ser...

Страница 35: ...tion Apply Change Click the Apply Change button Then click OK button to logout Screen snapshot Watch Dog settings Figure 44 Figure 45 Figure 46 Item Description Enable Watchdog Enable Watchdog functio...

Страница 36: ...Internet without the need for any wired connections to the user s machine What are ISM bands ISM stands for Industrial Scientific and Medical radio frequency bands that the Federal Communications Com...

Страница 37: ...nsmission privacy similar to a wired network The Wired Equivalent Privacy generates secret shared encryption keys that both source and destination stations can use to alert frame bits to avoid disclos...

Страница 38: ...specification A long preamble basically gives the decoder more time to process the preamble All 802 11 devices support a long preamble The short preamble is designed to improve efficiency for example...

Страница 39: ...es TCP for inter Access Point communication and UDP for RADIUS request response exchanges It also uses Layer 2 frames to update the forwarding tables of Layer 2 devices What is Wireless Distribution S...

Страница 40: ...ter with PoE 40 What is VPN VPN is the abbreviation of Virtual Private Network It is designed for creating point to point private link via shared or public network What is IPSEC IPSEC is the abbreviat...

Отзывы: