
ZyAIR G-220 User’s Guide
2-4
Wireless Station Mode Configuration
The following figure depicts a roaming example. When wireless station
B
moves to position
X
, the ZyAIR
in wireless station
B
automatically switches the channel to the one used by access point
2
in order to stay
connected to the network.
Figure 2-5 Roaming Example
2.2 Wireless
LAN
Security
Wireless LAN security is vital to your network to protect wireless communications.
Configure the wireless LAN security using the
More Setting…
screen. If you do not enable any wireless
security on your ZyAIR, the ZyAIR’s wireless communications are accessible to any wireless networking
device that is in the coverage area.
2.2.1 Data Encryption with WEP
WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between the ZyAIR and
the AP or other wireless stations to keep network communications private. Both the wireless stations and
the access points must use the same WEP key for data encryption and decryption.
Your ZyAIR allows you to configure up to four 64-bit, 128-bit or 256-bit WEP keys but only one key can
be used at any one time.
2.3 Fragmentation
Threshold
A
Fragmentation Threshold
is the maximum data fragment size (between 256 and 2432 bytes) that can be
sent in the wireless network before the ZyAIR will fragment the packet into smaller data frames.