16
Open System network.
Wired Equivalent Privacy (WEP) data encryption is
used when the wireless devices are configured to
operate in Shared Key authentication mode.
If the Access Point is using
Open System
, then the
wireless adapter will need to be set to the same
authentication mode.
Shared Key
is used when both the sender and the
recipient share a secret key.
Select
Auto
for the network adapter to select the
Authentication mode automatically depending on the
Access Point Authentication mode.
Fragment Threshold
Fragmentation mechanism is used for improving
the efficiency when high traffic flows along in the
wireless network. If your 802.11g Wireless LAN
PC Card often transmit large files in wireless
network, you can enter new Fragment Threshold
value to split the packet. The value can be set
from 256 to 2346. The default value is
2346
.
RTS Threshold
RTS Threshold is a mechanism implemented to
prevent the “
Hidden Node
” problem. “Hidden Node”
is a situation in which two stations are within range of
the same Access Point, but are not within range of
each other. Therefore, they are hidden nodes for
each other. When a station starts data transmission
with the Access Point, it might not notice that the
other station is already using the wireless medium.
When these two stations send data at the same time,
they might collide when arriving simultaneously at
the Access Point. The collision will most certainly
result in a loss of messages for both stations.
Thus, the RTS Threshold mechanism provides a
solution to prevent data collisions. When you enable
RTS Threshold on a suspect “hidden station”, this
station and its Access Point will use a Request to
Send (RTS). The station will send an RTS to the
Access Point, informing that it is going to transmit the