background image

 
 
 

         

        Boost-N Part#:GT-APN User Manual 

 

40 

 

8.

 

What are the Open System and Shared Key authentications? 

IEEE 802.11 supports two subtypes of network authentication services: open system and shared key. 

Under open system authentication, any wireless station can request authentication. The station that 

needs to authenticate with another wireless station sends an authentication management frame that 

contains the identity of the sending station. 

The receiving station then returns a frame that indicates whether it recognizes the sending station. 

Under shared key authentication, each wireless station is assumed to have received a secret shared 

key over a secure channel that is independent from the 802.11 wireless network communications 

channel. 

 

9.

 

What is WEP? 

An optional IEEE 802.11 function that offers frame transmission privacy similar to a wired network. 

The Wired Equivalent Privacy generates secret shared encryption keys that both source and 

destination stations can use to alert frame bits to avoid disclosure to eavesdroppers. 

WEP relies on a secret key that is shared between a mobile station (e.g. a laptop with a wireless 

Ethernet card) and an access point (i.e. a base station). The secret key is used to encrypt packets 

before they are transmitted, and an integrity check is used to ensure that packets are not modified 

in transit. 

 

10.

 

What is Fragment Threshold? 

The proposed protocol uses the frame fragmentation mechanism defined in IEEE 802.11 to achieve 

parallel transmissions. A large data frame is fragmented into several fragments each of size equal to 

fragment threshold. By tuning the fragment threshold value, we can get varying fragment sizes. The 

determination of an efficient fragment threshold is an important issue in this scheme. If the fragment 

threshold is small, the overlap part of the master and parallel transmissions is large. This means the 

spatial reuse ratio of parallel transmissions is high. In contrast, with a large fragment threshold, the 

overlap is small and the spatial reuse ratio is low. However high fragment threshold leads to low 

fragment overhead. Hence there is a trade-off between spatial re-use and fragment overhead. 

Fragment threshold is the maximum packet size used for fragmentation. Packets larger than the size 

programmed in this field will be fragmented. 

If you find that your corrupted packets or asymmetric packet reception (all send packets, for 

example). You may want to try lowering your fragmentation threshold. This will cause packets to be 

broken into smaller fragments. These small fragments, if corrupted, can be resent faster than a larger 

fragment. Fragmentation increases overhead, so you'll want to keep this value as close to the 

maximum value as possible. 

 

Summary of Contents for Boost-N GT-APN

Page 1: ......

Page 2: ...go back to Network dialog box after the TCP IP installation 6 Select TCP IP and click the properties button on the Network dialog box 7 Select Specify an IP address and type in values as following example IPAddress 192 168 1 1 any IP address within 192 168 1 1 to 192 168 1 253 is good to connect the Wireless LAN Access Point IP Subnet Mask 255 255 255 0 8 Click OK and reboot your PC after complete...

Page 3: ...ct TCP IP and click the properties button on the Network dialog box 7 Select Specify an IP address and type in values as following example IPAddress 192 168 1 1 any IP address within 192 168 1 1 to 192 168 1 253 is good to connect the Wireless LAN Access Point IP Subnet Mask 255 255 255 0 8 Click OK to complete the IP parameters setting For OS of Microsoft Windows Vista and Windows 7 1 Click Start...

Page 4: ...cted clients or stations PCs TCP IP configuration Attain IP Protocol It shows type of connection IPAddress It shows the IP address of LAN interfaces of WLAN Broadband Router Subnet Mask It shows the IP subnet mask of LAN interfaces of WLAN Broadband Router Default Gateway It shows the default gateway setting for LAN interfaces outgoing data packets DHCP Server It shows the DHCP server is enabled o...

Page 5: ...ost N Part GT APN User Manual 5 Setup Wizard This page guides you to configure wireless broadband router for first time Operation Mode This page followed by Setup Wizard page to define the operation mode ...

Page 6: ...s of LAN interfaces of this WLAN Access Point SubnetMask Fill in the subnet mask of LAN interfaces of this WLAN Access Point Default Gateway Fill in the default gateway for LAN interfaces out going data packets DHCP Click to select Disabled Client or Server in different operation mode of wireless Access Point DHCP Client Range Fill in the start IP address and end IP address to allocate a range of ...

Page 7: ...tup Static DHCP IP address for specific MAC address Server mode only Domain Name Assign Domain Name and dispatch to DHCP clients It is optional field 802 1d Spanning Tree Select enable or disable the IEEE 802 1d Spanning Tree function from pull down menu Clone MAC Address Fill in the MAC address that is the MAC address to be cloned Apply Changes Click the Apply Changes button to complete the new c...

Page 8: ...eless Basic Settings This page is used to configure basic wireless parameters like Band Mode Network Type SSID Channel Number Enable Mac Clone Single Ethernet Client Wireless Security Setup This page is used to configure wireless security ...

Page 9: ... and Firewall modules are applied to this mode Bridge Each interface LAN WAN and Wireless regards as bridge NAT Firewall and all router s functions are not supported Wireless ISP Switch Wireless interface to WAN port and all Ethernet ports in bridge mode Wireless interface can do all router s functions Apply Changes Click the Apply Changes button to complete the new configuration setting Reset Cli...

Page 10: ...e wireless network name The SSID can be 32 bytes long Channel width Select the operational bandwidth 20MHz or 40MHz 802 11n band only Control Sideband Select the sideband with upper or lower for channel width 40MHz Channel Number Select the wireless communication channel from pull down menu Broadcast SSID Click to enable or disable the SSID broadcast function WMM Click to enable or disable WMM fun...

Page 11: ...ket fragmentation threshold value can be written between 256 and 2346 bytes RTS Threshold Set the RTS Threshold value can be written between 0 and 2347 bytes Beacon Interval Set the Beacon Interval value can be written between 20 and 1024ms Preamble Type Click to select the Long Preamble or Short Preamble support on the wireless data packet transmission IAPP Click to enable or disable the IAPP fun...

Page 12: ...WEP Click the check box to enable IEEE 802 1x authentication function Apply Changes Click the Apply Changes button to complete the new configuration setting Reset Click the Reset button to abort change and recover the previous configuration setting Wireless Access Control If you enable wireless access control only those clients whose wireless MAC addresses are in the access control list will be ab...

Page 13: ... delete all the registered clients from the access allowed list Reset Click the Reset button to abort change and recover the previous configuration setting WDS Settings Wireless Distribution System uses wireless media to communicate with other APs like the Ethernet does To do this you must set these APs in the same channel and set MAC address of other AP that you want to communicate with in the ta...

Page 14: ...the TX RX packets rate statistics Delete Selected Click to delete the selected clients that will be removed from the wireless distribution system Delete All Click to delete all the registered APs from the wireless distribution system allowed list Reset Click the Reset button to abort change and recover the previous configuration setting It shows the registered clients that are allowed to link to t...

Page 15: ...erface Tx Errors It shows the statistic count of error sent packets on the Wireless LAN interface Rx Packets It shows the statistic count of received packets on the wireless LAN interface Tx Rate Mbps It shows the wireless link rate within WDS Refresh Click to refresh the statistic counters on the screen Close Click to close the current window Site Survey This page is used to scan and connect near...

Page 16: ... client automatically synchronize its setting and connect to the Access Point in a minute without any hassle Item Description Disable WPS Click on to disable the Wi Fi Protected Setup function WPS Status Show WPS status is Configured or Unconfigured Self PIN Number Fill in the PIN Number of AP to register the wireless distribution system access capability PushButtonConfiguration The Start PBC butt...

Page 17: ...address and end IP address to allocate a range of IP addresses client with DHCP function set will be assigned an IP address from the range Show Client Click to open Active DHCP Client Table window that shows current active clients with their assigned IP address MAC address and expire time information Server mode only Static DHCP Select to enable or disable Static DHCP from pull down menu Server mo...

Page 18: ...he Static IP Address in the IP Address field MAC Address Enter the MAC address of the corresponding Client in the MAC Address field Comment Take notes of the setting Apply Changes Click the Apply Changes button to complete the change Static DHCP List List mapping of static IP address to corresponding clients IP Address Assigned static IP address MAC address MAC address of corresponding client Comm...

Page 19: ...the default gateway for WAN interface out going data packets MTU Size Fill in the mtu size of MTU Size The default value is 1400 DNS 1 Enter the IP address of Domain Name Server 1 DNS 2 Enter the IP address of Domain Name Server 2 DNS 3 Enter the IP address of Domain Name Server 3 Clone MAC Address Enter the MAC address that is the MAC address to be cloned Enable uPNP Click the checkbox to enable ...

Page 20: ...upport DNS 1 Fill in the IP address of Domain Name Server 1 DNS 2 Fill in the IP address of Domain Name Server 2 DNS 3 Fill in the IP address of Domain Name Server 3 Clone MAC Address Fill in the MAC address that is the MAC address to be cloned Enable uPNP Click the checkbox to enable uPNP function Enable IGMP Proxy Click the checkbox to enable IGMP proxy Enable Ping Access on WAN Click the checkb...

Page 21: ...y Connection Type Select the connection type from pull down menu There are Continuous Connect on Demand and Manual three types to select Continuous connection type means to setup the connection through PPPoE protocol whenever this WLAN Broadband Router is powered on Connect on Demand connection type means to setup the connection through PPPoE protocol whenever you send the data packets out through...

Page 22: ...t is the MAC address to be cloned Enable uPNP Click the checkbox to enable uPNP function Enable IGMP Proxy Click the checkbox to enable IGMP proxy Enable Ping Access on WAN Click the checkbox to enable WAN IGMP response Enable Web server Access on WAN Click the checkbox to enable web configuration from WAN side Enable IPsec pass through on VPN connection Click the checkbox to enable IPSec packet p...

Page 23: ...t on WAN interface fill in the IP address for it Subnet Mask If you select the PPTP support on WAN interface fill in the subnet mask for it Server IPAddress Enter the IP address of the PPTP Server User Name If you select the PPTP support on WAN interface fill in the user name and password to login the PPTP server Password If you select the PPTP support on WAN interface fill in the user name and pa...

Page 24: ...HCP support Please select Set DNS Manually if the DHCP support is selected Set DNS Manually Click to select getting DNS address for DHCP support DNS 1 Fill in the IP address of Domain Name Server 1 DNS 2 Fill in the IP address of Domain Name Server 2 DNS 3 Fill in the IP address of Domain Name Server 3 Clone MAC Address Fill in the MAC address that is the MAC address to be cloned Enable uPNP Click...

Page 25: ...ion type from pull down menu There are Continuous Connect on Demand and Manual three types to select Continuous connection type means to setup the connection through L2TP protocol whenever this WLAN Broadband Router is powered on Connect on Demand connection type means to setup the connection through L2TP protocol whenever you send the data packets out through the WAN interface there are a watchdo...

Page 26: ...k the checkbox to enable IPSec packet pass through Enable PPTP pass through on VPN connection Click the checkbox to enable PPTP packet pass through Enable L2TP pass through on VPN connection Click the checkbox to enable L2TP packet pass through Apply Changes Click the Apply Changes button to complete the new configuration setting Firewall Port Filtering Entries in this table are used to restrict c...

Page 27: ...ur local network Item Description Enable IP Filtering Click to enable the IP filtering security function Local IPAddress Protocol Comments To restrict data transmission from local network on certain IP addresses fill in the IP address and the protocol also put your comments on it The Protocol can be TCP UDP or Both Comments let you know about whys to restrict data from the IP address Apply Changes...

Page 28: ...l network on certain MAC addresses fill in the MAC address and your comments on it Comments let you know about whys to restrict data from the MAC address Apply Changes Click the Apply Changes button to register the MAC address to MAC filtering list Reset Click the Reset button to abort change and recover the previous configuration setting Delete Selected Click to delete the selected MAC address th...

Page 29: ... in local network behind the NAT firewall fill in the IP address protocol port range and your comments The Protocol can be TCP UDP or Both The Port Range for data transmission Comments let you know about whys to allow data packets forward to the IP address and port number Apply Changes Click the Apply Changes button to register the IP address and port number to Port forwarding list Reset Click the...

Page 30: ...onfiguration setting Delete Selected Click to delete the selected URL address that will be removed from the URL Filtering list Delete All Click to delete all the registered entries from the URL Filtering list Reset Click the Reset button to abort change and recover the previous configuration setting Firewall DMZ A Demilitarized Zone is used to provide Internet services without sacrificing unauthor...

Page 31: ...us configuration setting QoS Entries in this table improve your online gaming experience by ensuring that your game traffic is prioritized over other network traffic such as FTP or Web Item Description Enable QoS Click to enable the QoS function Automatic Uplink Speed Click checkbox to enable uplink automatic bandwidth control Manually Uplink Speed Kbps Enter uplink speed in Kbps to constrain maxi...

Page 32: ...stricted maximum bandwidth Uplink Bandwidth List uplink bandwidth Download Bandwidth List Download bandwidth Comment Definition of the setting Select Click to select rule for further action Delete Selected Delete selected rules Delete All Delete all rules listed on table Reset Click the Reset button to abort change and recover the previous configuration setting Management Statistics This page show...

Page 33: ...age is used to configure Dynamic DNS service to have DNS with dynamic IP address Item Description Enable DDNS Click the checkbox to enable DDNS service Service Provider Click the drop down menu to pick up the right provider Domain Name To configure Domain Name User Name Email Configure User Name Email Password Key Configure Password Key Apply Change Click the Apply Changes button to save the enabl...

Page 34: ...to enable NTP client update R NTP Server Click select default or input NTP server IP address Apply Change Click the Apply Changes button to save and enable NTP client service Reset Click the Reset button to abort change and recover the previous configuration setting Refresh Click the refresh the current time shown on the screen Management Denial of Service This page is used to enable and setup pro...

Page 35: ... to enable DoS prevention Whole System Flood Per Source IP Flood Enable and setup prevention in details Select ALL Click the checkbox to enable all prevention items Clear ALL Click the checkbox to disable all prevention items Apply Changes Click the Apply Changes button to save above settings ...

Page 36: ...y Changes Click the Apply Changes button to save above settings Refresh Click the refresh the log shown on the screen Clear Clear log display screen Management Upgrade Firmware This page allows you upgrade the Access Point firmware to new version Please note do not power off the device during the upload because it may crash the system Item Description Select File Click the Browse button to select ...

Page 37: ...Click the Reset button to reset the configuration parameter to factory defaults Management Password Setup This page is used to set the account to access the web server of Access Point Empty user name and password will disable the protection Item Description User Name Fill in the user name for web management login control New Password Fill in the password for web management login control Confirmed ...

Page 38: ...ed connections to the user s machine 3 What are ISM bands ISM stands for Industrial Scientific and Medical radio frequency bands that the Federal Communications Commission FCC authorized for wireless LANs The ISM bands are located at 915 13 MHz 2450 50 MHz and 5800 75 MHz 4 How does wireless networking work The 802 11 standard define two modes infrastructure mode and ad hoc mode In infrastructure ...

Page 39: ...fy different wireless networks 7 What are potential factors that may causes interference Factors of interference Obstacles walls ceilings furniture etc Building Materials metal door aluminum studs Electrical devices microwaves monitors and electrical motors Solutions to overcome the interferences Minimizing the number of walls and ceilings Position the WLAN antenna for best reception Keep WLAN dev...

Page 40: ...d an integrity check is used to ensure that packets are not modified in transit 10 What is Fragment Threshold The proposed protocol uses the frame fragmentation mechanism defined in IEEE 802 11 to achieve parallel transmissions A large data frame is fragmented into several fragments each of size equal to fragment threshold By tuning the fragment threshold value we can get varying fragment sizes Th...

Page 41: ... frames that support data transfer The beacon frame which is a type of management frame provides the heartbeat of a wireless LAN enabling stations to establish and maintain communications in an orderly fashion Beacon Interval represents the amount of time between beacon transmissions Before a station enters power save mode the station needs the beacon interval to know when to wake up to receive th...

Page 42: ... selected EAP authentication protocol will be added to the network 16 What is WPA2 It is the second generation of WPA WPA2 is based on the final IEEE 802 11i amendment to the 802 11 standard 17 What is 802 1x Authentication 802 1x is a framework for authenticated MAC level access control defines Extensible Authentication Protocol EAP over LANs WAPOL The standard encapsulates and leverages much of ...

Page 43: ...s regardless of media operating system programming language and wired wireless connection 23 What is Maximum Transmission Unit MTU Size Maximum Transmission Unit MTU indicates the network stack of any packet is larger than this value will be fragmented before the transmission During the PPP negotiation the peer of the PPP connection will indicate its MRU and will be accepted The actual MTU of the ...

Page 44: ...VPN VPN is the abbreviation of Virtual Private Network It is designed for creating point to point private link via shared or public network 28 What is IPSEC IPSEC is the abbreviation of IP Security It is used to transferring data securely under VPN ...

Reviews: