LINKSYS WAP200E Wireless-G Exterior Access Point with POE User Manual WAP200E User Guide

LINKSYS LLC Wireless-G Exterior Access Point with POE WAP200E User Guide

Manual Part 3

Chapter 6 Advanced Configuration23Wireless-G Exterior Access Point with Power Over EthernetSubnet  Mask  This  shows  the  Access  Point’s  Subnet Mask.To  update  the  status  information,  click  the  Refresh button. Help information is available on the right side of the screen.Status > WirelessThe  Wireless  screen  displays  the  Access  Point’s  current status information for the wireless network(s).Status > WirelessWireless NetworkMode  The  Access  Point’s  wireless  network  mode  is displayed here.SSID 1-4 MAC Address  The MAC Addresses of the Access Point’s wireless interfaces are displayed here.SSID  1-4  The  Access  Point’s  SSIDs  that  have  been configured are displayed here.Channel  The Access Point’s Channel setting for the SSID is shown here.VLAN Trunk  The VLAN Trunk Status is displayed here.Priority  Setting  The  priority  setting  status  is  displayed here.To  update  the  status  information,  click  the  Refresh button. Help information is available on the right side of the screen.Status > System PerformanceThe  System  Performance  screen  displays  the  Access Point’s status information for its current settings and data transmissions.Status > System PerformanceSystem PerformanceWiredName  This indicates that the statistics are for the wired network, the LAN.IP Address  The Access Point’s local IP address is displayed here.MAC Address  This shows the MAC Address of the Access Point’s wired interface.Connection  This shows the status  of the Access Point’s connection for the wired network.Packets  Received  This  shows  the  number  of  packets received.Packets Sent  This shows the number of packets sent.Bytes  Received  This  shows  the  number  of  bytes received.Bytes Sent  This shows the number of bytes sent.Error Packets Received  This shows the number of error packets received.Drop  Received  Packets  This  shows  the  number  of packets being dropped after they were received.
Chapter 6 Advanced Configuration24Wireless-G Exterior Access Point with Power Over EthernetWirelessName  This indicates the wireless network/SSID to which the statistics refer.IP Address  The Access Point’s local IP address is displayed here.MAC Address  This shows the MAC Address of the Access Point’s wireless interface.Connection  This shows the status  of the Access Point’s wireless networks.Packets  Received  This  shows  the  number  of  packets received for each wireless network.Packets Sent  This shows the number of packets sent for each wireless network.Bytes Received  This shows the number of bytes received for each wireless network.Bytes Sent  This shows the number of bytes sent for each wireless network.Error Packets Received  This shows the number of error packets received for each wireless network.Drop  Received  Packets  This  shows  the  number  of packets being dropped after they were received.Reset Counter  Press this button to reset packet statistic counters to zeros. To  update  the  status  information,  click  the  Refresh button. Help information is available on the right side of the screen.
25IntroductionWireless-G Exterior Access Point with Power Over EthernetAppendix AAppendix A:  TroubleshootingThis  appendix  provides  solutions  to  problems  that may  occur  during  the  installation  and  operation  of  the Wireless-G Exterior Access Point with Power Over Ethernet. Read the description below to solve your problems. If you can’t  find  an  answer  here,  check  the  Linksys  website  at www.linksys.com.Can the Access Point act as my DHCP Server?No.  The  Access  Point  is  nothing  more  than  a  wireless hub, and as such cannot be configured to handle DHCP capabilities.Can I run an application from a remote computer over the wireless network?This  will  depend  on  whether  or  not  the  application is  designed  to  be  used  over  a  network.  Consult  the application’s  documentation  to  determine  if  it  supports operation over a network.Can  I  play  multiplayer  games  with  other  users  of  the wireless network?Yes,  as  long  as  the  game  supports  multiple  players over  a  LAN  (local  area  network).  Refer  to  the  game’s documentation for more information.What is the IEEE 802.11b standard?It is one of the IEEE standards for wireless networks. The 802.11b  standard  allows  wireless  networking  hardware from different manufacturers to communicate, provided that the hardware complies with the 802.11b standard.The 802.11b standard states a maximum data transfer rate of 11Mbps and an operating frequency of 2.4GHz.What is the IEEE 802.11g standard?It is one of the IEEE standards for wireless networks. The 802.11g  standard  allows  wireless  networking  hardware from different manufacturers to communicate, provided that the hardware complies with the 802.11g standard.The 802.11g standard states a maximum data transfer rate of 54Mbps and an operating frequency of 2.4GHz.What IEEE 802.11b features are supported?The  product  supports  the  following  IEEE  802.11 functions:CSMA/CA plus Acknowledge protocolMulti-Channel RoamingAutomatic Rate SelectionRTS/CTS featureFragmentationPower ManagementWhat IEEE 802.11g features are supported?The  product  supports  the  following  IEEE  802.11g functions:CSMA/CA plus Acknowledge protocolOFDM protocolMulti-Channel RoamingAutomatic Rate SelectionRTS/CTS featureFragmentationPower ManagementWhat is Ad-hoc?An  Ad-hoc  wireless  LAN  is  a  group  of  computers,  each with a WLAN adapter, connected as an independentwireless LAN. An Ad-hoc  wireless LAN is applicable at a departmental scale for a branch or SOHO operation.What is Infrastructure?An  integrated  wireless  and  wired  LAN  is  called  an Infrastructure configuration. Infrastructure is applicable to enterprise scale for wireless access to a central database, or wireless application for mobile workers.What is roaming?Roaming  is  the  ability  of  a  portable  computer  user to  communicate  continuously  while  moving  freely throughout an area greater than that covered by a single Access  Point.  Before  using  the  roaming  function,  the workstation  must  make  sure  that  it  is  set  to  the  same channel  number  as  the  Access  Point  of  the  dedicated coverage area.•••••••••••••
26IntroductionWireless-G Exterior Access Point with Power Over EthernetAppendix ATo  achieve  true  seamless  connectivity,  the  wireless LAN  must  incorporate  a  number  of  different  functions. Each  node  and  Access  Point,  for  example,  must  always acknowledge  receipt of each message.  Each  node  must maintain  contact  with  the  wireless  network  even  when not actually transmitting data. Achieving these functions simultaneously  requires  a  dynamic  RF  networking technology  that  links  Access  Points  and  nodes.  In  such a  system,  the  user’s  end  node  undertakes  a  search  for the best possible access to the system. First, it evaluates such factors as signal strength and quality, as well as the message  load  currently  being  carried  by  each  Access Point and the distance of each Access Point to the wired backbone.  Based  on  that  information,  the  node  next selects  the  right  Access  Point  and  registers  its  address. Communications between end node and host computer can then be transmitted up and down the backbone.As  the  user  moves  on,  the  end  node’s  RF  transmitter regularly  checks  the  system  to  determine  whether  it is  in  touch  with  the  original  Access  Point  or  whether it  should  seek  a  new  one.  When  a  node  no  longer receives acknowledgment from its original Access Point, it undertakes  a  new search. Upon  finding  a  new Access Point, it then re-registers, and the communication process continues.What is the ISM band?The FCC and their counterparts outside of the U.S. have set aside bandwidth for unlicensed use in the ISM (Industrial, Scientific and Medical) band. Spectrum in the vicinity of 2.4 GHz, in particular, is being made available worldwide. This presents a truly revolutionary  opportunity  to  place convenient high speed wireless capabilities in the hands of users around the globe.What is Spread Spectrum?Spread  Spectrum  technology  is  a  wideband  radio frequency  technique  developed  by  the  military  for  use in  reliable,  secure,  mission-critical  communications systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband transmission,  but  the  trade-off  produces  a  signal  that is,  in  effect,  louder  and  thus  easier  to  detect,  provided that  the  receiver  knows  the  parameters  of  the  spread-spectrum signal being broadcast. If a receiver is not tuned to  the  right  frequency,  a  spread-spectrum  signal  looks like  background  noise. There  are  two  main  alternatives, Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS).What  is  DSSS?  What  is  FHSS?  And  what  are  their differences?Frequency  Hopping  Spread  Spectrum  (FHSS)  uses  a narrowband carrier  that changes  frequency in a  pattern that is known to both transmitter and receiver. Properly synchronized, the net effect is to maintain a single logical channel. To an  unintended receiver, FHSS appears to be short-duration  impulse  noise.  Direct  Sequence  Spread Spectrum  (DSSS)  generates  a  redundant  bit  pattern  for each  bit  to  be  transmitted.  This  bit  pattern  is  called  a chip (or chipping code). The longer the chip, the greater the  probability  that  the  original  data  can  be  recovered. Even if one or more bits in the chip are damaged during transmission,  statistical  techniques  embedded  in  the radio can recover the original data without the need for retransmission. To an unintended receiver, DSSS appears as low power wideband noise and is rejected (ignored) by most narrowband receivers.Would the information be intercepted while transmitting on air?WLAN  features  two-fold  protection  in  security.  On  the hardware side, as with Direct Sequence Spread Spectrum technology,  it  has  the  inherent  security  feature  of scrambling. On the software side, the WLAN series offers a variety of wireless security methods to enhance security and access control. Users can set it up  depending upon their needs.Can  Linksys  wireless  products  support  file  and  printer sharing?Linksys wireless products  perform  the  same function  as LAN  products.  Therefore,  Linksys  wireless  products  can work  with  NetWare,  Windows  NT/2000,  or  other  LAN operating systems to support printer or file sharing.What is WEP?WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40-bit shared-key algorithm, as  described in the IEEE 802.11 standard.What is a MAC Address?The  Media  Access  Control  (MAC)  address  is  a  unique number  assigned  by  the  manufacturer  to  any  Ethernet networking device, such as a network adapter, that allows the  network  to  identify  it  at  the  hardware  level.  For  all practical  purposes,  this  number  is  usually  permanent. Unlike  IP  addresses,  which  can  change  every  time  a computer logs on to the network, the MAC address of a device stays the same, making it a valuable identifier for the network.
27IntroductionWireless-G Exterior Access Point with Power Over EthernetAppendix AHow do I avoid interference?Using multiple Access Points on the same channel and in close proximity to one another will generate interference. When  employing  multiple  Access  Points,  make  sure  to operate each one on a different channel (frequency).How do I reset the Access Point?Press the Reset button on the back of the Access Point for about ten seconds. This will reset the  unit  to  its  default settings.How do I resolve issues with signal loss?There is no way to know the exact range of your wireless network without testing. Every obstacle placed between an  Access  Point  and  wireless  PC  will  create  signal  loss. Leaded glass, metal, concrete floors, water, and walls will inhibit the signal and reduce range. Start with your Access Point and your wireless PC in the same room and move it away in small  increments to  determine the maximum range in your environment.You  may  also  try  using  different  channels,  as  this  may eliminate  interference  affecting  only  one  channel.  Also, open  the  Access  Point’s  Web-based  Utility.  Click  the Wireless  tab  and  then the Advanced Wireless tab. Make sure the Output Power is set to 100%.Does the Access Point function as a firewall?No. The Access Point is only a bridge from wired Ethernet to wireless clients.I  have  excellent  signal  strength,  but  I  cannot  see  my network.Wireless security, such as WEP or WPA, is probably enabled on the Access Point, but not on your wireless adapter (or vice versa). Verify that the same wireless security settings are being used on all devices in your wireless network.What is the maximum number of users the Access Point can handle?No more than 65, but this depends on the volume of data and may be fewer if many users create a large amount of network traffic.WEB: If your questions are not addressed here, refer to the Linksys website, www.linksys.com

Navigation menu