Proxim ORiNOCO User's Guide Page 36

  • Download
  • Add to my manuals
  • Print
  • Page
    / 145
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 35
Access Point Features AP-800 User Guide
Configuring the Device
36
Guard Interval: Guard Interval ensures that distinct transmissions do not interfere with one another. This feature
provides immunity to users. Each user is allotted a time slot to transmit their data and this time slot ends with the
guard interval. This parameter is used to configure the guard interval for the wireless interface.
Tx Antennas: This parameter enables the transmission antennas. This is configured as bit-mask. Eg: 3 - 011
(binary value) - first and second antennas are enabled. 7 - 111 (binary value) - all three are enabled.
Rx Antennas: This parameter enables the receiving antennas. This is configured as bit-mask. Eg: 3 - 011 (binary
value) - first and second antennas are enabled. 7 - 111 (binary value) - all three are enabled.
The bottom enclosure of the device will display R and A with specific numbers, where R stands for Radio and A stands for
Antenna.
Ethernet
The Ethernet feature is the most popular physical layer LAN technology because it strikes a good balance between
speed, cost and ease of installation. Because of these benefits it is an ideal networking technology for the computer
users. Using this feature you can view the properties of the Ethernet of your network.
Ethernet Features
MAC Address: This parameter represents the MAC address of the Ethernet interface.
Speed: This parameter is used for configuring the speed of the Ethernet interface.
Transmit: This parameter is used for configuring the transmit mode of the Ethernet interface.
Security
The AP supports the following security features:
WEP Encryptions
The IEEE 802.11 standards specify an optional encryption feature, known as Wired Equivalent Privacy or WEP, that is
designed to provide a wireless LAN with a security level equal to what is found on a wired Ethernet network. WEP
encrypts the data portion of each packet exchanged on an 802.11 network using an Encryption Key (also known as a
WEP Key).
When Encryption is enabled, two 802.11 devices must have the same Encryption Keys and both devices must be
configured to use Encryption in order to communicate. If one device is configured to use Encryption but a second device
is not, then the two devices will not communicate, even if both devices have the same Encryption Keys.
802.1x Authentication
IEEE 802.1x is a standard that provides a means to authenticate and authorize network devices attached to a LAN port.
A port in the context of IEEE 802.1x is a point of attachment to the LAN, either a physical Ethernet connection or a
wireless link to an Access Point. 802.1x requires a RADIUS server and uses the Extensible Authentication Protocol
Decimal Binary Active Antennas Marking of the Enclosure
1 001 First Antenna A1
2 010 Second Antenna A2
3 011 First and Second Antenna A1 and A2
4 100 Third Antenna A3
5 101 Third and First Antenna A3 and A1
6 110 Third and Second Antenna A3 and A2
7 111 First, Second and Third Antenna A1, A2, and A3
Page view 35
1 2 ... 31 32 33 34 35 36 37 38 39 40 41 ... 144 145

Comments to this Manuals

No comments