ZyXEL p-2802h-i1 Manual Do Utilizador

Página de 418
Chapter 8 Wireless LAN
P-2802H(W)(L)-I Series User’s Guide
104
8.2.5  One-Touch Intelligent Security Technology (OTIST)
With ZyXEL’s OTIST, you set up the SSID and the encryption (WEP or WPA-PSK) on the 
ZyXEL Device. Then, the ZyXEL Device transfers them to the devices in the wireless 
networks. As a result, you do not have to set up the SSID and encryption on every device in 
the wireless network.
The devices in the wireless network have to support OTIST, and they have to be in range of the 
ZyXEL Device when you activate it. See 
 for more details.
8.3  Additional Wireless Terms
The following table describes wireless network terms and acronyms used in the ZyXEL 
Device’s Web Configurator.
8.4  General WLAN Screen 
"
If you are configuring the ZyXEL Device from a computer connected to the 
wireless LAN and you change the ZyXEL Device’s SSID or security settings, 
you will lose your wireless connection when you press Apply to confirm. You 
must then change the wireless settings of your computer to match the ZyXEL 
Device’s new settings.
Click Network > Wireless LAN to open the Wireless LAN General screen.
Table 29   Additional Wireless Terms
TERM
DESCRIPTION
RTS/CTS Threshold
In a wireless network which covers a large area, wireless devices are 
sometimes not aware of each other’s presence.  This may cause them to send 
information to the AP at the same time and result in information colliding and 
not getting through.
By setting this value lower than the default value, the wireless devices must 
sometimes get permission to send information to the ZyXEL Device. The 
lower the value, the more often the devices must get permission.
If this value is greater than the fragmentation threshold value (see below), 
then wireless devices never have to get permission to send information to the 
ZyXEL Device.
Preamble
A preamble affects the timing in your wireless network. There are two 
preamble modes: long and short.
 
If a device uses a different preamble mode 
than the ZyXEL Device does, it cannot communicate with the ZyXEL Device.
Authentication
The process of verifying whether a wireless device is allowed to use the 
wireless network.
Fragmentation 
Threshold
A small fragmentation threshold is recommended for busy networks, while a 
larger threshold provides faster performance if the network is not very busy.