Download Print this page

NETGEAR MR314 Reference Manual page 102

Cable/dsl wireless router
Hide thumbs Also See for MR314:

Advertisement

In the infrastructure mode, the wireless access point converts airwave data into wired Ethernet
data, acting as a bridge between the wired LAN and wireless clients. Connecting multiple Access
Points via a wired Ethernet backbone can further extend the wireless network coverage. As a
mobile computing device moves out of the range of one access point, it moves into the range of
another. As a result, wireless clients can freely roam from one Access Point domain to another and
still maintain seamless network connection.
The Extended Service Set Identification (ESSID) is one of two types of Service Set Identification
(SSID). In an ad-hoc wireless network with no access points, the Basic Service Set Identification
(BSSID) is used. In an infrastructure wireless network that includes an access point, the Extended
Service Set Identification (ESSID) is used.
An SSID is a thirty-two character (maximum) alphanumeric key identifying the wireless local area
network. Some vendors refer to the SSID as network name. For the wireless devices in a network
to communicate with each other, all devices must be configured with the same SSID.
The absence of a physical connection between nodes makes the wireless links vulnerable to
eavesdropping and information theft. To provide a certain level of security, the IEEE 802.11
standard has defined two types of authentication methods, Open System and Shared Key. With
Open System authentication, a wireless PC can join any network and receive any messages that are
not encrypted. With Shared Key authentication, only those PCs that possess the correct
authentication key can join the network. By default, IEEE 802.11 wireless devices operate in an
Open System network.
Wired Equivalent Privacy (WEP) data encryption is utilized when the wireless nodes or access
points are configured to operate in Shared Key authentication mode. There are two shared key
methods implemented in most commercially available products, 64-bit and 128-bit WEP data
encryption.
The 64-bit WEP data encryption method, allows for a five-character (40-bit) input. Additionally,
24 factory-set bits are added to the forty-bit input to generate a 64-bit encryption key. (The 24
factory-set bits are not user-configurable). This encryption key will be used to encrypt/decrypt all
data transmitted via the wireless interface. Some vendors refer to the 64-bit WEP data encryption
as 40-bit WEP data encryption since the user-configurable portion of the encryption key is 40 bits
wide.

Hide quick links:

Advertisement

loading

This manual is also suitable for:

Mr314na