Zebra Technologies Corporation W2WLAN11G 用户手册
33
2. Scan for the configured access point (using both SSID and BSSID) on all channels. If no
access point found, proceed to step 3. If found, connection is attempted. If connection
successful, proceed to step 6 (done). If connection fails, proceed to step 3.
successful, proceed to step 6 (done). If connection fails, proceed to step 3.
3. Scan for all access points with the correct SSID (BSSID ignored) that have the identical
security settings as the configured access point on all channels. If no access point found,
proceed to step 5. If multiple access points found, connection is attempted on access
point with best signal strength. If connection successful, proceed to step 6 (done). If
connection fails, proceed to step 4. If single access point found, connection is
attempted. If connection successful, proceed to step 6 (done). If connection fails,
proceed to step 5.
proceed to step 5. If multiple access points found, connection is attempted on access
point with best signal strength. If connection successful, proceed to step 6 (done). If
connection fails, proceed to step 4. If single access point found, connection is
attempted. If connection successful, proceed to step 6 (done). If connection fails,
proceed to step 5.
4. Delete access point to which connection failed in step 3. If another access point with the
correct SSID and correct security settings is available, go to step 3. Otherwise, go to step
5.
5.
5. Exhausted all connection attempt, delay for 5 seconds, then go to step 1.
6. Connection succeeded, done.
6. Connection succeeded, done.
This approach will handle the following conditions:
• Configured access point can’t be reached (power is off).
• Configured access point can’t accept another station (load balancing is forcing the
• Configured access point can’t accept another station (load balancing is forcing the
printer to connect to a different access point).
Setting Up an Ad-Hoc (Peer) Network
On wireless computer networks, ad-hoc mode is a method for wireless devices to directly
communicate with each other. Operating in ad-hoc mode allows all wireless devices within
range of each other to discover and communicate in peer-to-peer fashion without using access
points. To set up an ad-hoc wireless network, each wireless adapter must be configured for ad-
hoc mode versus the alternative infrastructure mode. In addition, all wireless adapters on the
ad-hoc network must use the same SSID and the same channel number. An ad-hoc network
tends to feature a small group of devices all in very close proximity to each other. Performance
suffers as the number of devices grows, and a large ad-hoc network quickly becomes difficult to
manage.
communicate with each other. Operating in ad-hoc mode allows all wireless devices within
range of each other to discover and communicate in peer-to-peer fashion without using access
points. To set up an ad-hoc wireless network, each wireless adapter must be configured for ad-
hoc mode versus the alternative infrastructure mode. In addition, all wireless adapters on the
ad-hoc network must use the same SSID and the same channel number. An ad-hoc network
tends to feature a small group of devices all in very close proximity to each other. Performance
suffers as the number of devices grows, and a large ad-hoc network quickly becomes difficult to
manage.
WiFi devices in ad-hoc mode offer minimal security against unwanted incoming connections.
Only WEP security is available in the ad-hoc mode. Ad-hoc WiFi devices cannot disable SSID
broadcast like infrastructure mode devices can. Attackers generally will have little difficulty
connecting to an ad-hoc device if they get within signal range.
Only WEP security is available in the ad-hoc mode. Ad-hoc WiFi devices cannot disable SSID
broadcast like infrastructure mode devices can. Attackers generally will have little difficulty
connecting to an ad-hoc device if they get within signal range.