Menu Content/Inhalt
Home

Performance levels Print
June 2011
Software used for analysis:  Qchec

Performance1.JPG
Data Size (kBytes) Throughput (Mbps)
100
53.334
200 66.667
300 75
400 78.049
500 81.633
600 82.759
700 82.353
800 84.211
900 85.714
1000 86.002





Manufacturer claim:
  • 60-70Mbps with 5km of range

Go back to Wireless Bridge home page
 
Security standards Print
June 2011
WEP = Wired equivalent privacy
TKIP = Temporal Key Integrity Protocol
CCMP = Counter Mode with Cipher Block Chaining Message Authentication Code Protocol

AP security:
•WEP, WPA-PSK, WPA2-PSK, WPA-Enterprise, WPA2-Enterprise, WEP 802.1X

WDS security:
•WEP, TKIP, AES

WEP:    
•40-bit encryption key
•Various key sizes – longer key requires interception of more packets to crack
•Outdated, many flaws, no longer used

TKIP (WPA):
•128-bit per-packet key
•Part of the IEEE 802.11i standard
•Avoids major problems with WEP

AES (WPA2): 
•256-bit
•IEEE 802.11i standard
•CCMP as the standard encryption protocol; more secure than WEP and TKIP protocols of WPA

MAC ACL (address filtering)



Go back to Wireless Bridge home page
 
Security standards Print
June 2011
WEP = Wired equivalent privacy
TKIP = Temporal Key Integrity Protocol
CCMP = Counter Mode with Cipher Block Chaining Message Authentication Code Protocol

AP security:
•WEP, WPA-PSK, WPA2-PSK, WPA-Enterprise, WPA2-Enterprise, WEP 802.1X

WDS security:
•WEP, TKIP, AES

WEP:    
•40-bit encryption key
•Various key sizes – longer key requires interception of more packets to crack
•Outdated, many flaws, no longer used

TKIP (WPA):
•128-bit per-packet key
•Part of the IEEE 802.11i standard
•Avoids major problems with WEP

AES (WPA2): 
•256-bit
•IEEE 802.11i standard
•CCMP as the standard encryption protocol; more secure than WEP and TKIP protocols of WPA

MAC ACL (address filtering)



Go back to Wireless Bridge home page
 
Security standards Print
June 2011
WEP = Wired equivalent privacy
TKIP = Temporal Key Integrity Protocol
CCMP = Counter Mode with Cipher Block Chaining Message Authentication Code Protocol

AP security:
•WEP, WPA-PSK, WPA2-PSK, WPA-Enterprise, WPA2-Enterprise, WEP 802.1X

WDS security:
•WEP, TKIP, AES

WEP:    
•40-bit encryption key
•Various key sizes – longer key requires interception of more packets to crack
•Outdated, many flaws, no longer used

TKIP (WPA):
•128-bit per-packet key
•Part of the IEEE 802.11i standard
•Avoids major problems with WEP

AES (WPA2): 
•256-bit
•IEEE 802.11i standard
•CCMP as the standard encryption protocol; more secure than WEP and TKIP protocols of WPA

MAC ACL (address filtering)



Go back to Wireless Bridge home page
 
Wireless Bridge Print
June 2011
Wireless Bridge Building Block WAP-5015D

This building block consists of a radio and an integrated flat panel antenna with a water proof enclosure for outdoor installation.  Scroll down and you will find a few block diagrams showing how we can deploy this building block for various purposes.  The detailed specification is as shown below on the RHS.  The following links provide specific information on:
Pic1.JPGPic2.JPG




















The diagrams below show 4 ways of setting up a wireless bridge with WAP-5015D.


Router AP Mode
   •Connect wireless devices to Internet via ADSL modem
      NAT enabled
AP Mode
   •Access Point for wireless clients connection
      NAT disabled
WDS Mode
   •Allows wireless network expansion of multiple sites using multiple APs
      NAT disabled
CPE Mode
   •Connect wired devices to Internet via AP
      NAT enabled
Client Bridge + Universal Repeater Mode
   •Repeater for both wired and wireless devices
      NAT disabled
CPE + AP Mode
   •Connect both wired and wireless devices to Internet via AP
      NAT enabled


Go back to Wireless LAN home page
 
<< Start < Prev 151 152 153 154 155 156 157 158 159 160 Next > End >>

Results 1414 - 1422 of 2512