LINKSYS WAP200E Wireless-G Exterior Access Point with POE User Manual WAP200E User Guide
LINKSYS LLC Wireless-G Exterior Access Point with POE WAP200E User Guide
LINKSYS >
Contents
- 1. Manual Part 1
- 2. Manual Part 2
- 3. Manual Part 3
- 4. Manual Part 4
Manual Part 3
Advanced Configuration Chapter 6 Subnet Mask This shows the Access Point’s Subnet Mask. To update the status information, click the Refresh button. Help information is available on the right side of the screen. Status > System Performance The System Performance screen displays the Access Point’s status information for its current settings and data transmissions. Status > Wireless The Wireless screen displays the Access Point’s current status information for the wireless network(s). Status > System Performance System Performance Status > Wireless Wireless Network Mode The Access Point’s wireless network mode is displayed here. SSID 1-4 MAC Address The MAC Addresses of the Access Point’s wireless interfaces are displayed here. SSID 1-4 The Access Point’s SSIDs that have been configured are displayed here. Channel The Access Point’s Channel setting for the SSID is shown here. VLAN Trunk The VLAN Trunk Status is displayed here. Priority Setting The priority setting status is displayed here. To update the status information, click the Refresh button. Help information is available on the right side of the screen. Wired Name This indicates that the statistics are for the wired network, the LAN. IP Address The Access Point’s local IP address is displayed here. MAC Address This shows the MAC Address of the Access Point’s wired interface. Connection This shows the status of the Access Point’s connection for the wired network. Packets Received This shows the number of packets received. Packets Sent This shows the number of packets sent. Bytes Received This shows the number of bytes received. Bytes Sent This shows the number of bytes sent. Error Packets Received This shows the number of error packets received. Drop Received Packets This shows the number of packets being dropped after they were received. Wireless-G Exterior Access Point with Power Over Ethernet 23 Chapter 6 Advanced Configuration Wireless Name This indicates the wireless network/SSID to which the statistics refer. IP Address The Access Point’s local IP address is displayed here. MAC Address This shows the MAC Address of the Access Point’s wireless interface. Connection This shows the status of the Access Point’s wireless networks. Packets Received This shows the number of packets received for each wireless network. Packets Sent This shows the number of packets sent for each wireless network. Bytes Received This shows the number of bytes received for each wireless network. Bytes Sent This shows the number of bytes sent for each wireless network. Error Packets Received This shows the number of error packets received for each wireless network. Drop Received Packets This shows the number of packets being dropped after they were received. Reset Counter Press this button to reset packet statistic counters to zeros. To update the status information, click the Refresh button. Help information is available on the right side of the screen. Wireless-G Exterior Access Point with Power Over Ethernet 24 Introduction Appendix A Appendix A: Troubleshooting This appendix provides solutions to problems that may occur during the installation and operation of the Wireless‑G Exterior Access Point with Power Over Ethernet. Read the description below to solve your problems. If you can’t find an answer here, check the Linksys website at www.linksys.com. Can the Access Point act as my DHCP Server? No. The Access Point is nothing more than a wireless hub, and as such cannot be configured to handle DHCP capabilities. What IEEE 802.11b features are supported? The product supports the following IEEE 802.11 functions: • CSMA/CA plus Acknowledge protocol • Multi-Channel Roaming • Automatic Rate Selection • RTS/CTS feature • Fragmentation • Power Management What IEEE 802.11g features are supported? The product supports the following IEEE 802.11g functions: Can I run an application from a remote computer over the wireless network? • CSMA/CA plus Acknowledge protocol • OFDM protocol This will depend on whether or not the application is designed to be used over a network. Consult the application’s documentation to determine if it supports operation over a network. • Multi-Channel Roaming • Automatic Rate Selection • RTS/CTS feature • Fragmentation • Power Management Can I play multiplayer games with other users of the wireless network? Yes, as long as the game supports multiple players over a LAN (local area network). Refer to the game’s documentation for more information. What is Ad-hoc? What is the IEEE 802.11b standard? wireless LAN. An Ad-hoc wireless LAN is applicable at a departmental scale for a branch or SOHO operation. It is one of the IEEE standards for wireless networks. The 802.11b standard allows wireless networking hardware from different manufacturers to communicate, provided that the hardware complies with the 802.11b standard. The 802.11b standard states a maximum data transfer rate of 11Mbps and an operating frequency of 2.4GHz. What is the IEEE 802.11g standard? It is one of the IEEE standards for wireless networks. The 802.11g standard allows wireless networking hardware from different manufacturers to communicate, provided that the hardware complies with the 802.11g standard. The 802.11g standard states a maximum data transfer rate of 54Mbps and an operating frequency of 2.4GHz. Wireless-G Exterior Access Point with Power Over Ethernet An Ad-hoc wireless LAN is a group of computers, each with a WLAN adapter, connected as an independent What is Infrastructure? An integrated wireless and wired LAN is called an Infrastructure configuration. Infrastructure is applicable to enterprise scale for wireless access to a central database, or wireless application for mobile workers. What is roaming? Roaming is the ability of a portable computer user to communicate continuously while moving freely throughout an area greater than that covered by a single Access Point. Before using the roaming function, the workstation must make sure that it is set to the same channel number as the Access Point of the dedicated coverage area. 25 Introduction Appendix A To achieve true seamless connectivity, the wireless LAN must incorporate a number of different functions. Each node and Access Point, for example, must always acknowledge receipt of each message. Each node must maintain contact with the wireless network even when not actually transmitting data. Achieving these functions simultaneously requires a dynamic RF networking technology that links Access Points and nodes. In such a system, the user’s end node undertakes a search for the best possible access to the system. First, it evaluates such factors as signal strength and quality, as well as the message load currently being carried by each Access Point and the distance of each Access Point to the wired backbone. Based on that information, the node next selects the right Access Point and registers its address. Communications between end node and host computer can then be transmitted up and down the backbone. As the user moves on, the end node’s RF transmitter regularly checks the system to determine whether it is in touch with the original Access Point or whether it should seek a new one. When a node no longer receives acknowledgment from its original Access Point, it undertakes a new search. Upon finding a new Access Point, it then re-registers, and the communication process continues. What is the ISM band? The FCC and their counterparts outside of the U.S. have set aside bandwidth for unlicensed use in the ISM (Industrial, Scientific and Medical) band. Spectrum in the vicinity of 2.4 GHz, in particular, is being made available worldwide. This presents a truly revolutionary opportunity to place convenient high speed wireless capabilities in the hands of users around the globe. What is Spread Spectrum? Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communications systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband transmission, but the trade-off produces a signal that is, in effect, louder and thus easier to detect, provided that the receiver knows the parameters of the spreadspectrum signal being broadcast. If a receiver is not tuned to the right frequency, a spread-spectrum signal looks like background noise. There are two main alternatives, Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS). Wireless-G Exterior Access Point with Power Over Ethernet What is DSSS? What is FHSS? And what are their differences? Frequency Hopping Spread Spectrum (FHSS) uses a narrowband carrier that changes frequency in a pattern that is known to both transmitter and receiver. Properly synchronized, the net effect is to maintain a single logical channel. To an unintended receiver, FHSS appears to be short-duration impulse noise. Direct Sequence Spread Spectrum (DSSS) generates a redundant bit pattern for each bit to be transmitted. This bit pattern is called a chip (or chipping code). The longer the chip, the greater the probability that the original data can be recovered. Even if one or more bits in the chip are damaged during transmission, statistical techniques embedded in the radio can recover the original data without the need for retransmission. To an unintended receiver, DSSS appears as low power wideband noise and is rejected (ignored) by most narrowband receivers. Would the information be intercepted while transmitting on air? WLAN features two-fold protection in security. On the hardware side, as with Direct Sequence Spread Spectrum technology, it has the inherent security feature of scrambling. On the software side, the WLAN series offers a variety of wireless security methods to enhance security and access control. Users can set it up depending upon their needs. Can Linksys wireless products support file and printer sharing? Linksys wireless products perform the same function as LAN products. Therefore, Linksys wireless products can work with NetWare, Windows NT/2000, or other LAN operating systems to support printer or file sharing. What is WEP? WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40-bit shared-key algorithm, as described in the IEEE 802.11 standard. What is a MAC Address? The Media Access Control (MAC) address is a unique number assigned by the manufacturer to any Ethernet networking device, such as a network adapter, that allows the network to identify it at the hardware level. For all practical purposes, this number is usually permanent. Unlike IP addresses, which can change every time a computer logs on to the network, the MAC address of a device stays the same, making it a valuable identifier for the network. 26 Appendix A Introduction How do I avoid interference? Using multiple Access Points on the same channel and in close proximity to one another will generate interference. When employing multiple Access Points, make sure to operate each one on a different channel (frequency). How do I reset the Access Point? Press the Reset button on the back of the Access Point for about ten seconds. This will reset the unit to its default settings. How do I resolve issues with signal loss? There is no way to know the exact range of your wireless network without testing. Every obstacle placed between an Access Point and wireless PC will create signal loss. Leaded glass, metal, concrete floors, water, and walls will inhibit the signal and reduce range. Start with your Access Point and your wireless PC in the same room and move it away in small increments to determine the maximum range in your environment. You may also try using different channels, as this may eliminate interference affecting only one channel. Also, open the Access Point’s Web-based Utility. Click the Wireless tab and then the Advanced Wireless tab. Make sure the Output Power is set to 100%. Does the Access Point function as a firewall? No. The Access Point is only a bridge from wired Ethernet to wireless clients. I have excellent signal strength, but I cannot see my network. Wireless security, such as WEP or WPA, is probably enabled on the Access Point, but not on your wireless adapter (or vice versa). Verify that the same wireless security settings are being used on all devices in your wireless network. What is the maximum number of users the Access Point can handle? No more than 65, but this depends on the volume of data and may be fewer if many users create a large amount of network traffic. WEB: If your questions are not addressed here, refer to the Linksys website, www.linksys.com Wireless-G Exterior Access Point with Power Over Ethernet 27
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : No Encryption : Standard V2.3 (128-bit) User Access : Print, Copy, Print high-res XMP Toolkit : 3.1-702 Modify Date : 2007:05:04 10:02:55-07:00 Create Date : 2007:05:04 08:54:29-07:00 Metadata Date : 2007:05:04 10:02:55-07:00 Creator Tool : Adobe InDesign CS2 (4.0.4) Format : application/pdf Title : WAP200E User Guide Creator : Linksys Document ID : uuid:27577d09-9eb5-4cca-830c-07cbec25f0ff Instance ID : uuid:f51d620c-1d82-4b33-a6ac-0f305d4128d0 Producer : Adobe PDF Library 7.0 Page Count : 5 Author : LinksysEXIF Metadata provided by EXIF.tools