background image

www.lanpro.com

Wireless - Equipment - 2.4 GHz - LP-1522 User Manual 

34

What are potential factors that may causes interference?

Factors of interference:

• Obstacles: walls, ceilings, furniture... etc.

• Building Materials: metal door, aluminum studs.

• Electrical devices: microwaves, monitors and electrical motors.

Solutions to overcome the interferences:

• Minimizing the number of walls and ceilings.

• Position the WLAN antenna for best reception.

• Keep WLAN devices away from other electrical devices, eg: microwaves,monitors, electric motors, ... etc.

• Add additional WLAN Access Points if necessary.

4.7

What are the Open System and Shared Key authentications?

IEEE 802.11 supports two subtypes of network authentication services: open system and shared key. Under open 

system authentication, any wireless station can request authentication. The station that needs to authenticate with 

another wireless station sends an authentication management frame that contains the identity of the sending station. 

The receiving station then returns a frame that indicates whether it recognizes the sending station. Under shared key 

authentication, each wireless station is assumed to have received a secret shared key over a secure channel that is 

independent from the 802.11 wireless network communications channel.

4.8

What is WEP?

An  optional  IEEE  802.11  function  that  offers  frame  transmission  privacy  similar  to  a  wired  network.  The  Wired 

Equivalent Privacy generates secret shared encryption keys that both source and destination stations can use to alert 

frame bits to avoid disclosure to eavesdroppers. WEP relies on a secret key that is shared between a mobile station 

(e.g. a laptop with a wireless Ethernet card) and an access point (i.e. a base station). The secret key is used to encrypt 

packets before they are transmitted, and an integrity check is used to ensure that packets are not modifi ed in transit.

What is Fragment Threshold?

The  proposed  protocol  uses  the  frame  fragmentation  mechanism  defi ned  in  IEEE  802.11  to  achieve  parallel 

transmissions. A large data frame is fragmented into several fragments each of size equal to fragment threshold. By

tuning the fragment threshold value, we can get varying fragment sizes. The determination of an effi cient fragment 

threshold is an important issue in this scheme. If the fragment threshold is small, the overlap part of the master and

parallel transmissions is large. This means the spatial reuse ratio of parallel transmissions is high. In contrast, with 

a large fragment threshold, the overlap is small and the spatial reuse ratio is low. However high fragment threshold 

leads to low fragment overhead. Hence there is a trade-off between spatial re-use and fragment overhead.

Fragment threshold is the maximum packet size used for fragmentation. Packets larger than the size programmed in 

this fi eld will be fragmented. If you fi nd that your corrupted packets or asymmetric packet reception (all send packets, 

for example). You may want to try lowering your fragmentation threshold. This will cause packets to be broken into 

smaller fragments. These small fragments, if corrupted, can be resent faster than a larger fragment. Fragmentation 

increases overhead, so you’ll want to keep this value as close to the maximum value as possible.

What is RTS (Request To Send) Threshold?

The RTS threshold is the packet size at which packet transmission is governed by the RTS/CTS transaction. The IEEE 

802.11-1997 standard allows  for short  packets  to  be  transmitted  without  RTS/CTS  transactions. Each  station  can 

have a different RTS threshold. RTS/CTS is used when the data packet size exceeds the defi ned RTS threshold. With 

the CSMA/CA transmission mechanism, the transmitting station sends out an RTS packet to the receiving station, 

and waits for the receiving station to send back a CTS (Clear to Send) packet before sending the actual packet data.

This setting is useful for networks with many clients. With many clients, and a high network load, there will be many 

more collisions. By lowering the RTS threshold, there may be fewer collisions, and performance should improve.

Basically, with a faster RTS threshold, the system can recover from problems faster. RTS packets consume valuable 

bandwidth, however, so setting this value too low will limit performance.

4.9

4.10

4.11

Summary of Contents for LP-1522

Page 1: ...gh Speed Long Range 802 11b g 54Mbps Wireless Broadband AP and Router High Power 800mW with External Antenna LP1522_UM_ENB02W LP 1522 User Manual High Speed Long Range 802 11b g 54Mbps Wireless Broadb...

Page 2: ...use harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one of the following...

Page 3: ...ons Commission FTP File Transfer Protocol IEEE Institute of Electrical and Electronic Engineers IKE Internet Key Exchange IP Internet Protocol ISM Industrial Scienti c and Medical LAN Local Area Netwo...

Page 4: ...t ready for eld installation The Wireless LAN Broadband LanPro 1522 Router is an affordable IEEE 802 11b g wireless LAN broadband router solution setting SOHO and enterprise standard for high performa...

Page 5: ...2 Installation 1 2 1 3 Package contents The package of the LP 1522 WLAN Broadband Router includes the following items The LP 1522 WLAN Broadband Router The AC to DC power adapter The Documentation CD...

Page 6: ...og box after the TCP IP installation 6 Select TCP IP and click the properties button on the Network dialog box 7 Select Specify an IP address and type in values as following example IP Address 192 168...

Page 7: ...wing example IP Address 192 168 1 1 IP address within the range of 192 168 1 1 to 192 168 1 253 is used to connect the WLAN AP Router IP Subnet Mask 255 255 255 0 7 For Microsoft Windows NT 1 Click th...

Page 8: ...e of WLAN AP Router and haredamong its service area so all device sat tempts to join the samewireless network can identify it Channel Number It shows the wireless channel connected currently Encryptio...

Page 9: ...in IP by PPPoE PPTP connection IP Address It shows the IP address of WAN interface of WLAN AP Router Subnet Mask It shows the IP subnet mask of WAN interface of WLAN AP Router Default Gateway It shows...

Page 10: ...Zone Setting This page is used to enable and con gure NTP client Screen snapshot Time Zone Settings III LAN Interface Setup Screen snapshot LAN Interface Setup 10 IV WAN Interface Setup This page is...

Page 11: ...and Mode Network Type SSID Channel Number Enable Mac Clone Single Ethernet Client Screen snapshot Wireless Basic Settings VI Wireless Security Setup This page is used to con gure wireless security Scr...

Page 12: ...Screen snapshot Wireless Basic Settings Item Description Disable Wireless LAN Interface Click on to disable the wireless LAN data transmission Band Click to select 2 4GHz B 2 4GHz G 2 4GHz B G Mode Cl...

Page 13: ...Interval Data Rate Select the transmission data rate from pull down menu Data rate can be auto select 11M 5 5M 2M or IMbps Preamble Type Click to select the Long Preamble or Short Preamble support on...

Page 14: ...ode with Enterprise RADIUS or Personal Pre Shared Key Refer to 4 15 What is Wi Fi Protected Access WPA Pre Shared Key Format While Encryption is selected to be WPA Select the Pre shared key format fro...

Page 15: ...ant text ASCII and hexadecimal HEX code Default Tx Key Set the default secret key for WEP security function Value can be chose between 1 and 4 Encryption Key 1 Secret key 1 of WEP security encryption...

Page 16: ...bility Comment Fill in the comment tag for the registered client Apply Changes Click the Apply Changes button to register the client to new con guration setting Reset Click the Reset button to abort c...

Page 17: ...ty Click button to con gure wireless security like WEP 64bits WEP 128bits WPA TKIP WPA2 AES or None Show Statistics It shows the TX RX packets rate statistics Delete Selected Click to delete the selec...

Page 18: ...ge is used to view or con gure other APs near yours Screen snapshot Wireless Site Survey Item Description SSID It shows the SSID of AP BSSID It shows BSSID of AP Channel It show the current channel of...

Page 19: ...able window that shows the active clients with their assigned IP address MAC address and time expired information Server mode only 802 Id Spanning Tree Select to enable or disable the IEEE 802 Id Span...

Page 20: ...data packets DNS 1 Fill in the IP address of Domain Name Server 1 DNS 2 Fill in the IP address of Domain Name Server 2 DNS 3 Fill in the IP address of Domain Name Server 3 Clone MAC Address Fill in t...

Page 21: ...f Domain Name Server 2 DNS 3 Fill in the IP address of Domain Name Server 3 Clone MAC Address Fill in the MAC address that is the MAC address to be cloned Refer to 4 24 What is Clone MAC Address Enabl...

Page 22: ...button manually and clicking the Disconnect button manually Idle Time If you select the PPPoE and Connect on Demand connection type ll in the idle time for auto disconnect function Value can be betwe...

Page 23: ...er MTU Size Fill in the mtu size of MTU Size The default value is 1400 Refer to 4 23 What is Maximum Transmission Unit MTU Size Attain DNS Automatically Click to select getting DNS address for PPTP su...

Page 24: ...ck to enable the port ltering security function Port Range Protocol Comments To restrict data transmission from the local network on certain ports ll in the range of start port and end port and the pr...

Page 25: ...also put your comments on it Apply Changes Click the Apply Changes button to register the ports to port ltering list Reset Click the Reset button to abort change and recover the previous con guration...

Page 26: ...d the NAT rewall These settings are only necessary if you wish to host some sort of server like a web server or mail server on the private local network behind your Gateway s NAT rewall Screen snapsho...

Page 27: ...lick the Reset button to abort change and recover the previous con guration setting 3 3 16 Firewall DMZ A Demilitarized Zone is used to provide Internet services without sacri cing unauthorized access...

Page 28: ...nterface Wireless LAN Sent Packets It shows the statistic count of sent packets on the Ethernet WAN interface Wireless LAN Received Packets It shows the statistic count of received packets on the Ethe...

Page 29: ...ve and enable NTP client service Reset Click the Reset button to abort change and recover the previous con guration setting Refresh Click the refresh the current time shown on the screen Management Lo...

Page 30: ...t change and recover the previous con guration setting Management Save Reload Settings This page allows you save current settings to a le or reload the settings from the le that was saved previously B...

Page 31: ...t login control Con rmed Password Because the password input is invisible so please ll in the password again for con rmation purpose Apply Changes Clear the User Name and Password elds to empty means...

Page 32: ...down it to select There are three types of priority level High Medium and Low Note If the total assigned bandwidth of higher priority applications is larger than the maximum bandwidth provided by the...

Page 33: ...mmunications Commission FCC authorized for wireless LANs The ISM bands are located at 915 13 MHz 2450 50 MHz and 5800 75 MHz How does wireless networking work The 802 11 standard de ne two modes infra...

Page 34: ...rame is fragmented into several fragments each of size equal to fragment threshold By tuning the fragment threshold value we can get varying fragment sizes The determination of an ef cient fragment th...

Page 35: ...at is Wi Fi Protected Access WPA Wi Fi s original security mechanism Wired Equivalent Privacy WEP has been viewed as insuf cient for securing con dential business communications A longer term solution...

Page 36: ...programming language and wired wireless connection 4 22 What is Maximum Transmission Unit MTU Size Maximum Transmission Unit MTU indicates the network stack of any packet is larger than this value wi...

Reviews: