ZyXEL Communications Corporation VMG8924B10A Manual De Usuario

Descargar
Página de 204
 Appendix D Wireless LANs
VMG8924-B10A User’s Guide
371
If the Fragmentation Threshold value is smaller than the RTS/CTS value (see previously) you 
set then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames 
will be fragmented before they reach RTS/CTS size.
IEEE 802.11g Wireless LAN
IEEE 802.11g is fully compatible with the IEEE 802.11b standard. This means an IEEE 802.11b 
adapter can interface directly with an IEEE 802.11g access point (and vice versa) at 11 Mbps or 
lower depending on range. IEEE 802.11g has several intermediate rate steps between the 
maximum and minimum data rates. The IEEE 802.11g data rate and modulation are as follows:
Wireless Security Overview
Wireless security is vital to your network to protect wireless communication between wireless 
clients, access points and the wired network.
Wireless security methods available on the Device are data encryption, wireless client 
authentication, restricting access by device MAC address and hiding the Device identity.
The following figure shows the relative effectiveness of these wireless security methods available on 
your Device.
Note: You must enable the same wireless security settings on the Device and on all 
wireless clients that you want to associate with it. 
Table 164   
IEEE 802.11g
DATA RATE (MBPS)
MODULATION
1
DBPSK (Differential Binary Phase Shift Keyed)
2
DQPSK (Differential Quadrature Phase Shift Keying)
5.5 / 11
CCK (Complementary Code Keying) 
6/9/12/18/24/36/48/
54
OFDM (Orthogonal Frequency Division Multiplexing) 
Table 165   
Wireless Security Levels
SECURITY 
LEVEL
SECURITY TYPE
Least       
Secure                                                                                  
Most Secure
Unique SSID (Default)
Unique SSID with Hide SSID Enabled
MAC Address Filtering
WEP Encryption
IEEE802.1x EAP with RADIUS Server Authentication
Wi-Fi Protected Access (WPA)
WPA2