background image

Dual-Band Wireless A/G Broadband Router 

79

78

What is roaming?

Roaming is the ability of a portable computer user to communicate continu-
ously while moving freely throughout an area greater than that covered by a sin-
gle access point. Before using the roaming function, the workstation must make
sure that it is the same channel number with the access point of dedicated cov-
erage area. 

To achieve true seamless connectivity, the wireless LAN must incorporate a
number of different functions. Each node and access point, for example, must
always acknowledge receipt of each message. Each node must maintain contact
with the wireless network even when not actually transmitting data. Achieving
these functions simultaneously requires a dynamic RF networking technology
that links access points and nodes. In such a system, the user’s end node under-
takes a search for the best possible access to the system. First, it evaluates such
factors as signal strength and quality, as well as the message load currently
being carried by each access point and the distance of each access point to the
wired backbone. Based on that information, the node next selects the right
access point and registers its address. Communications between end node and
host computer can then be transmitted up and down the backbone.

As the user moves on, the end node’s RF transmitter regularly checks the sys-
tem to determine whether it is in touch with the original access point or whether
it should seek a new one. When a node no longer receives acknowledgment 
from its original access point, it undertakes a new search. Upon finding a new
access point, it then re-registers, and the communication process continues.

What is ISM band?

The FCC and their counterparts outside of the U.S. have set aside bandwidth
for unlicensed use in the ISM (Industrial, Scientific and Medical) band.
Spectrum in the vicinity of 2.4 GHz, in particular, is being made available
worldwide. This presents a truly revolutionary opportunity to place convenient
high-speed wireless capabilities in the hands of users around the globe. 

What is Spread Spectrum?

Spread Spectrum technology is a wideband radio frequency technique devel-
oped by the military for use in reliable, secure, mission-critical communica-
tions systems. It is designed to trade off bandwidth efficiency for reliability,
integrity, and security. In other words, more bandwidth is consumed than in the
case of narrowband transmission, but the trade-off produces a signal that is, in
effect, louder and thus easier to detect, provided that the receiver knows the
parameters of the spread-spectrum signal being broadcast. If a receiver is not 

How can I check whether I have static or DHCP IP Addresses?

Consult your ISP to obtain this information.  

How do I get mIRC to work with the Router?

Under the 

Port Forwarding

tab, set port forwarding to 113 for the PC on which

you are using mIRC.

Can the Router act as my DHCP server?

Yes. The Router has DHCP server software built-in.

Can I run an application from a remote computer over the wireless network?

This will depend on whether or not the application is designed to be used over
a network. Consult the application’s documentation to determine if it supports
operation over a network.

What is the IEEE 802.11g standard?

It is one of the IEEE standards for wireless networks. The 802.11g standard
allows wireless networking hardware from different manufacturers to commu-
nicate, provided that the hardware complies with the 802.11g standard. The
802.11g standard states a maximum data transfer rate of 54Mbps and an oper-
ating frequency of 2.4GHz.

What is the IEEE 802.11b standard?

It is one of the IEEE standards for wireless networks. The 802.11b standard
allows wireless networking hardware from different manufacturers to commu-
nicate, provided that the hardware complies with the 802.11b standard. The
802.11b standard states a maximum data transfer rate of 11Mbps and an oper-
ating frequency of 2.4GHz.

What IEEE 802.11b features are supported?

The product supports the following IEEE 802.11b functions: 

CSMA/CA plus Acknowledge protocol 

Multi-Channel Roaming 

Automatic Rate Selection 

RTS/CTS feature 

Fragmentation 

Power Management 

What is ad-hoc mode?

When a wireless network is set to ad-hoc mode, the wireless-equipped com-
puters are configured to communicate directly with each other. The ad-hoc

Содержание WRT54AG

Страница 1: ...Dual Band Wireless A G Broadband Router Use this guide to install WRT54AG User Guide...

Страница 2: ...ration All other trademarks and brand names are the property of their respective proprietors LIMITED WARRANTY Linksys guarantees that every Dual Band Wireless A G Broadband Router will be free from ph...

Страница 3: ...n enregistrement n est n cessaire pour une distance de moins de 300m Pour une distance sup rieure 300m un enreg istrement aupr s de l IBPT est requise Pour une utilisation publique l ext rieur de b ti...

Страница 4: ...with bandwidth To protect your data and privacy the Dual Band Wireless A G Broadband Router can encrypt all wireless transmissions The MAC Address filter lets you decide exactly who has access to you...

Страница 5: ...apter 6 The Router s Web based Utility 3 2 Compatibility with 802 11g 2 4GHz and 802 11b 2 4GHz Standards Setup Wizard for Easy Installation Wireless Security with up to 152 bit WEP Encryption Enhance...

Страница 6: ...n it a new dynamic IP address DHCP Dynamic Host Configuration Protocol Servers PCs and other network devices using dynamic IP addressing are assigned a new IP address by a DHCP server The PC or networ...

Страница 7: ...tore the Router s factory defaults and clear all of its settings including a new password or wireless settings If you are experiencing extreme problems with the Router and have tried all other trouble...

Страница 8: ...then your connection speed is 10Mbps Proceed to Chapter 3 Connect the Router 9 8 The WLAN Indicators Link Green When the Link LED is continuously lit the wireless network is available The LAN Indicato...

Страница 9: ...port on the Router Chapter 3 Connect the Router The Router s setup consists of more than simply plugging hardware together You will have to configure your networked PCs to accept the IP addresses tha...

Страница 10: ...ollow the instruc tions to install TCP IP Overview If you want to use a wireless connection to access the Router follow these instructions 1 Before you begin make sure that all of your network s hardw...

Страница 11: ...g D win98 D win9x etc if D is the letter of your CD ROM drive 6 Windows may ask you to restart your PC Click the Yes button If Windows does not ask you to restart restart your computer anyway Go to Ch...

Страница 12: ...lete the PC configuration 5 Restart your computer Go to Chapter 5 Configure the Router s Basic Settings 17 1 Click the Start button Select Settings and click the Control Panel icon Double click the Ne...

Страница 13: ...me you are running Windows XP with the default interface If you are using the Classic interface where the icons and menus look like previous Windows versions please follow the instructions for Windows...

Страница 14: ...ction to the Internet If you are running Internet Explorer 5 x or higher click Tools Settings Control Panel Internet Options Connections and LAN Settings Remove checkmarks from all three boxes Click t...

Страница 15: ...or click the Cancel button to clear the settings and start over When you are finished proceed to step 6 22 PPPoE If your DSL provider says that you are connecting through PPPoE you use a user name and...

Страница 16: ...ge 5GHz Settings button and customize the SSID Channel and Security settings as needed Then click the Apply button to save your changes For more infor mation refer to Chapter 6 The Router s Web based...

Страница 17: ...s firmware will be posted and available for download on the Linksys website at www linksys com Time Zone Select the time zone for your location If your location experiences daylight savings leave the...

Страница 18: ...adio button next to KeepAlive In the Redial Period field you specify how often you want the Router to check the Internet connection The default Redial Period is 30 seconds To save your changes on this...

Страница 19: ...1a The 5GHz 802 11a portion of the Setup screen shown in Figure 6 7 allows you to configure your 5GHz 802 11a wireless network settings PPTP Point to Point Tunneling Protocol PPTP is a service that ap...

Страница 20: ...function correctly If you want the Router to automatically scan for a clear channel then click the checkbox SSID The SSID is the network name shared among all points in a wireless net work The SSID mu...

Страница 21: ...z 802 11g portion of the Setup screen shown in Figure 6 9allows you to configure your 2 4GHz Wireless G wireless network settings MAC Address This shows the Router s wireless MAC address Mode If you h...

Страница 22: ...64 bit or 128 bit encryption select the type of encryption you want from the drop down box To disable WEP Encryption select Disable Passphrase Instead of manually entering WEP keys you can enter a Pa...

Страница 23: ...nable up to four specif ic filtering methods Block Proxy Use of WAN proxy servers may compromise the Router s security Denying Proxy will disable access to any WAN proxy servers To enable proxy filter...

Страница 24: ...the Enter key 4 Write down your adapter s physical address this is the adapter s MAC address Remote Management This feature allows you to manage your Router from a remote location via the Internet To...

Страница 25: ...ternet IP address and 8080 represents the specified port in your web browser s Address field You will be asked for the Router s password After successfully entering the password you will be able to ac...

Страница 26: ...view the list of PCs that are given IP addresses by the Router see Figure 6 17 For each PC the list shows the Client Hostname IP Address MAC Address and and the amount of DHCP client lease time left C...

Страница 27: ...can define two different SNMP communities with the default names being Public and Private SNMPv2 To enable the SNMP support feature select Enable Identification In the Contact field enter contact inf...

Страница 28: ...urrent date and time are displayed here Host Name The Host Name is the name of the Router This entry is necessary for some ISPs Domain Name The Domain Name is the name of the Router s domain This entr...

Страница 29: ...eed to access the basic configuration tabs click the Setup tab 51 The Help screen shown in Figure 6 20 offers links to all of the Router s tech nical support resources and the application that upgrade...

Страница 30: ...e default value is 1 RTS Threshold Should you encounter inconsistent data flow only minor reduc tion of the default value 2346 is recommended If a network packet is smaller than the preset RTS thresho...

Страница 31: ...icy will apply You can even enter ranges of PCs by IP address Click the Apply button to save your settings the Cancel button to undo any changes and the Close button to return to the Filters tab 55 Th...

Страница 32: ...er option 4 You can filter access to various services accessed over the Internet such as FTP or Telnet by selecting a service from the pull down menus next to Services If a service isn t listed you ca...

Страница 33: ...the Port Forwarding screen To save your changes on this page click the Apply button To cancel any unsaved changes on this page click the Cancel button To get more information about the features click...

Страница 34: ...m the Static Routing drop down list select the entry number of the stat ic route 2 Click the Delete This Entry button 3 To cancel a deletion click the Cancel button To save a deletion click the Apply...

Страница 35: ...s that is not used by any other computer on the network connected to the Router You can only use an IP address in the ranges 192 168 1 2 to 192 168 1 99 and 192 168 1 151 to 192 168 1 254 Make sure th...

Страница 36: ...button Repeat this action for all DNS IP addresses given by your ISP H Click the OK button in the TCP IP Protocol Properties window and click the Close button in the Network window I Restart the comp...

Страница 37: ...s to 192 168 2 1 that should solve the problem Change the Router s IP address through the Setup tab B Open a command prompt For Windows 98 and Me please click Start and Run In the Open field type in c...

Страница 38: ...e on the network you need to change its IP address accordingly to 192 168 2 Y Y being any number from 1 to 254 Note that each IP address must be unique within the network Your VPN may require port 500...

Страница 39: ...aving difficulties getting any Internet game server or application to function properly consider exposing one PC to the Internet using DeMilitarized Zone DMZ hosting This option is available when an a...

Страница 40: ...its settings If you cannot connect to it check the LAN and power connections If the Router is configured correctly check your Internet connection DSL cable modem etc to see if it is working correctly...

Страница 41: ...iple IP addresses on the pri vate LAN to one public address that is sent out to the Internet This adds a level of security since the address of a PC connected to the private LAN is never transmitted o...

Страница 42: ...ime even if on the same LAN not a prob lem with 1 0 1 3 As far as hosting games the HL server does not need to be in the DMZ Just forward port 27015 to the local IP address of the server com puter How...

Страница 43: ...What is Spread Spectrum Spread Spectrum technology is a wideband radio frequency technique devel oped by the military for use in reliable secure mission critical communica tions systems It is designed...

Страница 44: ...number assigned by the manufacturer to any Ethernet networking device such as a network adapter that allows the network to identify it at the hardware level For all practical pur poses this number is...

Страница 45: ...pinged Figure B 1 Appendix B How to Ping Your ISP s E mail Web Addresses Virtually all Internet addresses are configured with words or characters e g www linksys com www yahoo com etc In actuality ho...

Страница 46: ...structions Note WEP encryption is an additional data security measure and not essential for router operation however Linksys recommends the use of WEP encryption Step Two Pinging for a Web Address Whi...

Страница 47: ...WEP Settings button 2 You will see the 2 4GHz 54g Wireless G WEP screen Figure C 1 Next to Default Transmit Key select which WEP key 1 4 will be used when the Router sends data Make sure the receiving...

Страница 48: ...ding the MAC Address and IP Address for Your Ethernet Adapter This section describes how to find the MAC address for your Ethernet adapter to do either MAC address filtering or MAC address cloning for...

Страница 49: ...ns used by Linksys specify a maximum data transfer rate of 54Mbps using OFDM modulation an operating frequency of 2 4GHz backward compatibility with IEEE 802 11b devices and WEP encryption for securit...

Страница 50: ...ce or process to operate without being held up by the other In order for a buffer to be effective the size of the buffer and the algorithms for moving data into and out of the buffer need to be consid...

Страница 51: ...e of 10 Mbps Forms the underlying transport vehicle used by several upper level protocols including TCP IP and XNS DDNS Dynamic Domain Name System Allows a network device with a dynamic Internet IP ad...

Страница 52: ...FTP is designed to handle binary files directly and does not add the overhead of encoding and decoding the data 96 Full Duplex The ability of a device or line to transmit data simultaneously in both...

Страница 53: ...ddress In the most widely installed level of the Internet Protocol IP today an IP address is a 32 binary digit number that identifies each sender or receiver of information that is sent in packets acr...

Страница 54: ...left over after ISA devices were given their required IRQs all PCI devices could share it In a PCI only machine there cannot be insufficient IRQs as all can be shared NetBIOS The native networking pro...

Страница 55: ...s sage transfer agent MTA which stores and forwards the mail PCMCIA The PCMCIA Personal Computer Memory Card International Association is an industry group organized in 1989 to promote standards for a...

Страница 56: ...most impor tant of which include edge connections backbone connections and wide area connections 105 104 SNMP Simple Network Management Protocol A widely used network monitoring and control protocol...

Страница 57: ...ver a network In a communications ses sion upload means transmit and download means receive URL Uniform Resource Locator The address that defines the route to a file on the Web or any other Internet f...

Страница 58: ...ensing 109 108 Environmental Appendix F Specifications Model WRT54AG Standards IEEE802 3 IEEE802 3u IEEE802 11a IEEE802 11b IEEE802 11g Channels 802 11a 8 Channels US Canada 802 11b 802 11g 11 Channel...

Страница 59: ...n BE SURE TO HAVE YOUR PROOF OF PURCHASE AND A BARCODE FROM THE PRODUCT S PACKAGING ON HAND WHEN CALLING RETURN REQUESTS CANNOT BE PROCESSED WITHOUT PROOF OF PURCHASE IN NO EVENT SHALL LINKSYS S LIABI...

Страница 60: ...Copyright 2004 Linksys All Rights Reserved www linksys com...

Отзывы: