ALTAI A2 Configuration Manual

20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
1
Altai A2 WiFi Access Point/Bridge
Configuration Manual
Firmware Version 1.0.6.48
Version 1.1
Date: December 17, 2012
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
2
Copyright © 2012 Altai Technologies Limited
ALL RIGHTS RESERVED.
Altai Technologies Limited
Unit 209, 2nd Floor, East Wing, Building 17, Phase 2, Hong Kong Science Park, Shatin, New Territories, Hong Kong
Telephone: +852 2116 8087 Fax: +852 2607 4021 Web: www.altaitechnologies.com
Customer Support Centre:
Email: support@altaitechnologies.com
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
3
Radio Frequency Interference Requirements
This device complies with Part 15 of FCC Rules. Operation is subject to the following conditions:
1. This device may not cause harmful interference.
2. This device must accept any interference received, including interference that may cause
undesired operation.
3. This device should not be co-located or operating in conjunction with any other antenna
or transmitter.
Interference Statement
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
- Reorient or relocate the receiving antenna.
- Increase the separation between the equipment and receiver.
- Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
- Consult the dealer or an experienced radio/TV technician for help.
FCC Caution: To assure continued compliance, (example – use only shielded interface cables when connecting to computer or peripheral devices). Any changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate this equipment.
Warning
The user is advised to keep apart from the base-station and antenna with at least 45cm when the base-station is in operation.
Disclaimer
All specifications are subject to change without prior notice. Altai Technologies assumes no responsibilities for any inaccuracies in this document or for any obligation to update information in this document. This document is provided for information purposes only. Altai Technologies reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
4
Table of Contents
1 INTRODUCTION ........................................................................................................................................ 7
1.1 Total Performance....................................................................................................................... 7
1.2 Compatible With 802.11n ........................................................................................................... 7
1.3 Large Capacity ............................................................................................................................ 7
1.4 Different Operation Modes ......................................................................................................... 7
2 A2 MODEL AND FIRMWARE VERSION ..................................................................................................... 7
3 GETTING START ....................................................................................................................................... 8
3.1 Setup Local Area Connection on Your PC ................................................................................. 8
3.2 Check Access ............................................................................................................................ 11
4 CONFIGURATION WITH WEB-ADMIN ...................................................................................................... 12
4.1 Web Browser Connection ......................................................................................................... 12
4.2 Checking the A2 Versions ........................................................................................................ 13
4.3 Setup – User Name, Password and System Name .................................................................... 14
4.4 Regulatory Domain Configuration ........................................................................................... 14
4.5 NTP Configuration ................................................................................................................... 15
4.6 SNMP Configuration ................................................................................................................ 15
4.7 QoS Mode And Diffserv Tagging ............................................................................................ 16
4.8 Inter-VAP Forwarding .............................................................................................................. 16
4.9 Telnet ........................................................................................................................................ 16
4.10 Network Operation Mode ......................................................................................................... 17
4.11 Switch Mode ............................................................................................................................. 18
4.12 Gateway Mode .......................................................................................................................... 20
4.13 Network provider ...................................................................................................................... 23
4.14 Access Link Safe Mode/ Backhaul Link Self-healing .............................................................. 24
4.15 AMR Meter Traffic ................................................................................................................... 24
4.16 Setup – Wireless Radio Parameter ............................................................................................ 24
4.17 AP Mode ................................................................................................................................... 24
4.18 CPE Mode ................................................................................................................................. 32
4.19 Repeater Mode .......................................................................................................................... 33
4.20 Bridge Mode ............................................................................................................................. 33
4.21 Disable Mode ............................................................................................................................ 39
4.22 Reboot ....................................................................................................................................... 40
4.23 Restore Configuration to Default Setting ................................................................................. 41
5 PERFORMANCE MANAGEMENT MONITORING IN WEB-ADMIN ............................................................. 42
5.1 System ....................................................................................................................................... 42
5.2 Clients Statistics ........................................................................................................................ 44
5.3 Rogue AP Detection ................................................................................................................. 44
5.4 Radio Association-AP Mode .................................................................................................... 45
5.5 Radio Association-Bridge Mode .............................................................................................. 47
6 SOFTWARE UPGRADE THROUGH WEB-ADMIN AND CUSTOMIZATION .................................................. 48
6.1 Customization Profile and Logo ............................................................................................... 48
6.2 Firmware Update Through HTTP or HTTPS ........................................................................... 48
7 GLOSSARY .............................................................................................................................................. 51
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
5
Table of Figures
FIGURE 1 CONTROL PANEL IN WINDOWS XP ............................................................................................................ 8
FIGURE 2 NETWORK CONNECTIONS IN WINDOWS XP ............................................................................................... 9
FIGURE 3 WIRELESS NETWORK CONNECTION PROPERTIES IN WINDOWS XP ............................................................ 9
FIGURE 4 INTERNET PROTOCOL (TCP/IP) PROPERTIES IN WINDOWS XP ................................................................ 10
FIGURE 9 NTP CONFIGURATION ............................................................................................................................. 15
FIGURE 10 SNMP CONFIGURATION .......................................................................................................................... 15
FIGURE 11 TELNET TO A2 ......................................................................................................................................... 17
FIGURE 12 TYPE IN THE USERNAME AND PASSWORD OF TELNET .............................................................................. 17
FIGURE 13 THE IP ADDRESS HERE IS THE ETHERNET INTERFACE OF THE A2 ........................................................... 18
FIGURE 14 NETWORK CONFIGURATIONS UNDER SWITCH MODE AND THE IP ADDRESS HERE IS THE ETHERNET
INTERFACE OF THE A2 ....................................................................................................................................... 18
FIGURE 15 NETWORK CONFIGURATIONS UNDER GATEWAY MODE ......................................................................... 20
FIGURE 16 PPPOE CONFIGURATION ........................................................................................................................ 21
FIGURE 17 CONFIGURE DHCP SERVER ................................................................................................................... 22
FIGURE 18 CONFIGURE DHCP SERVER DISABLE .................................................................................................... 23
FIGURE 19 CONFIGURE DHCP SERVER DISABLE .................................................................................................... 23
FIGURE 20 WIRELESS RADIO PARAMETER CONFIGURATION ................................................................................... 25
FIGURE 22 VAP SETTING ................................................................ ................................ ........................................ 28
FIGURE 24 WIRELESS RADIO SECURITY CONFIGURATION ....................................................................................... 29
FIGURE 25 WEP KEY SETTINGS .............................................................................................................................. 30
FIGURE 26 WPA SETTINGS ..................................................................................................................................... 30
FIGURE 27 WPA-PSK SETTINGS ............................................................................................................................. 31
FIGURE 28 STATION MODE CONFIGURATION .......................................................................................................... 32
FIGURE 29 REPEATER MODE CONFIGURATION........................................................................................................ 33
FIGURE 31 ADVANCED BRIDGE RADIO SETTING ..................................................................................................... 37
FIGURE 32 BRIDGE ENCRYPTION SETTING_AES ...................................................................................................... 39
FIGURE 33 WIRELESS RADIO DISABLE MODE ......................................................................................................... 40
FIGURE 34 REBOOT WINDOW ................................................................................................ ................................ .. 40
FIGURE 35 A2 IS REBOOTING .................................................................................................................................. 40
FIGURE 36 RESET TO FACTORY DEFAULT SETTING IN WEB-ADMIN ........................................................................ 41
FIGURE 37 DETAILS OF THE SYSTEM ....................................................................................................................... 42
FIGURE 38 STATUSES OF THE VAPS ......................................................................................................................... 43
FIGURE 39 STATUSES OF THE REMOTE BRIDGES ..................................................................................................... 43
FIGURE 39 CHANNEL SCAN ..................................................................................................................................... 45
FIGURE 40 RADIO ASSOCIATION TABLE .................................................................................................................. 46
FIGURE 41 RADIO STATISTICS PER MAC ADDRESS (DATA IS CUMULATIVE) ........................................................... 46
FIGURE 42 RADIO ASSOCIATION BRIDGE LIST ........................................................................................................ 47
FIGURE 43 BRIDGE ASSOCIATION STATISTICS PER MAC ADDRESS ......................................................................... 47
FIGURE 44 CUSTOMIZATION .................................................................................................................................... 48
FIGURE 45 UPLOAD THE FIRMWARE THROUGH HTTP OR HTTPS .......................................................................... 49
FIGURE 46 FIRMWARE UPLOADING WEB-ADMIN.................................................................................................. 49
FIGURE 47 SUCCESSFUL FIRMWARE UPDATE WEB-ADMIN .................................................................................. 50
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
6
Manual Conventions
Bold
Bold type within paragraph text indicates commands, files names, directory names, paths, output, or returned values.
Italic
Within commands, italics indicate a variable that the user must specify. Titles of manuals or other published documents are also set in italics.
_____
Underline means that the words you have to pay attention.
Courier
The courier font indicates output or display.
[ ]
Within commands, items enclosed in square brackets are optional parameters or values that the user can choose to specify or omit.
{ }
Within commands, item enclosed in braces are options from which the user must choose.
|
Within commands, the vertical bar separates options.
An ellipsis indicates a repetition of preceding parameter.
>
The right angle bracket separates successive menu selection.
NOTE: This message denotes neutral or positive information that calls out important points
to the text. A note provides information that applies only in special cases.
Caution: Cautions call special attention to hazards that can cause system damage or
data corruption, to a lesser degree than warnings.
Warnings: Warnings call special attention to hazards that can cause system damage,
data corruption, personal injury, or death.
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
7
1 INTRODUCTION
1.1 TOTAL PERFORMANCE
Altai A2 WiFi Access Point/Bridge provides coverage for outdoor WiFi coverage and enhances the Altai indoor coverage solution. It combines IEEE 802.11a/b/g/n to offer best WiFi access in different scenarios.
1.2 COMPATIBLE WITH 802.11N
By adopting MIMO technology, Altai A2 provides up to 300Mbps data rate to 802.11n clients.
1.3 LARGE CAPACITY
Altai A2 has two radios. Both radios can work as access radio to enhance the total capacity of A2 unit and as backhaul link.
1.4 DIFFERENT OPERATION MODES
There are multiple operation modes for each radio. AP mode means the radio is working for clients association; CPE mode is used to receive signal from 2.4GHz radio end as backhaul link; Repeater mode is used to repeat the 2.4GHz radio signal; 5GHz radio can be selected as backhaul link when enabled Bridge mode and AP when enabled AP Mode; users can also disable the radio.
This manual is to summarize how to perform configuration for the Altai A2 through web-admin interface.
2 A2 MODEL AND FIRMWARE VERSION
This manual is applicable for the following models and firmware version:
Product name : A2 WiFi Access Point/Bridge Model number : A2/A2E Firmware version: v1.0.6.48
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
8
3 GETTING START
3.1 SETUP LOCAL AREA CONNECTION ON YOUR PC
Altai A2 can be connected with your PC in wireless mode. In the followings, wireless mode will be introduced.
Please kindly refer to the Altai A2 Installation Guide.
Start Network Configuration on your PC. For Windows XP user,
1. Click the “start” menu and choose “Control Panel”.
2. Click “Network Connections”.
Figure 1 Control Panel in Windows XP
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
9
3. Right-click on the “Wireless Network Connection” and select “Properties”.
Figure 2 Network Connections in Windows XP
4. After clicking on “Properties”, you will see the diagram as below.
Figure 3 Wireless Network Connection Properties in Windows XP
5. Marking the “Internet Protocol (TCP/IP)” and click the “Properties.
6. Type in an “IP address, for example, 192.168.1.2, which is under the same subnet as
the Default IP address of A2 (192.168.1.20).
7. Using the default Subnet mask(default: 255.255.255.0) setting at the first time.
8. Keep the “Default gateway” as “Blank”.
9. Keep the “Preferred DNS server and Alternate DNS server” as “Blank” also.
10. Click OK” when you finish setting and close the Window.
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
10
Figure 4 Internet Protocol (TCP/IP) Properties in Windows XP
11. Right-click on the “Wireless Network Connection” and select “View Available
Wireless Networks”.
Figure 5 Network Connections in Windows XP
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
11
12. Click on the “Altai Wireless Network
Figure 6 Showing Available Wireless Network Connections in Windows XP
3.2 CHECK ACCESS
ping” utility of DOS mode is a handy tool to check the access to the A2.
1. Go to DOS mode by typing “cmd” in “Run”.
2. Type command:
ping 192.168.1.20 The A2 shall respond to your ping request if it has a correct connection with your PC.
NOTE: Using the same PC to ping different Altai A2 may cause ping failure. This is because the Altai A2 has the same default IP address but different MAC addresses. You need to type a command “arp –din DOS mode to clear ARP table on PC before each ping.
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
12
4 CONFIGURATION WITH WEB-ADMIN
4.1 WEB BROWSER CONNECTION
A2 can be accessed through a Web Browser, for example, Internet Explorer (IE).
1. Open an IE session and type the IP address of the A2. Example: https://192.168.1.20,
where 192.168.1.20 is the A2’s IP address. The A2 default IP Address is 192.168.1.20. Note: the release version 1.0.6.48 only supports https format URL link.
2. A window will pop up, as shown in Figure 7. Enter the user name and password in the
corresponding fields. The default User Name and Password are shown in Table 1. They are case sensitive.
Default User Name
Default Password
From version 1.0. onwards
altai
wag
Table 1 Default User Name and Password for logging in A2
Figure 7 Enter User Name and Password
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
13
3. Figure . A Menu Bar is located on the left hand side of the IE window. Different
configurations can be chosen through the menu bar.
Figure 8 Web-admin Login Page
4.2 CHECKING THE A2 VERSIONS
The running version can be checked by selecting About under Administration in the menu bar. In Figure 9, it shows:
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
14
Firmware Version: v1.0.6.48
Figure 9 Firmware version of A2
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
15
4.3 SETUP USER NAME, PASSWORD AND SYSTEM NAME
The Password and System Name can be configured by selecting System under Configuration in the menu bar, as shown in Figure
Figure 10 System Configuration
The User Name and Password for login are mentioned in Section 4.1, but only password can be changed by entering a new string in the field of Password. Note: it is need to re-enter to confirm the password. Please press Change Password button to store the new password.
The System Name is the name of A2.
NOTE: Click the Update icon to store the changed settings.
4.4 REGULATORY DOMAIN CONFIGURATION
Regulatory Domain configuration controls the permitted wireless mode, frequency spectrum,
Maximum EIRP, and Maximum TX power in the system to fulfill the customer country regulation.
The ETSI setting is intended for use in Europe or other ETSI-compliant countries, though some European countries have regulations slightly different from the ETSI ones. The FCC setting is intended for use in the US or other FCC-compliant countries. The RoW setting is a super regulatory domain which allows access to all 2.4GHz and 5GHz channels, with no limit on EIRP and conducted TX power. The Malaysia setting is intended for use in Malaysia.
NOTE: Click the Update icon to store the changed settings.
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
16
4.5 NTP CONFIGURATION
NTP is a network time protocol for the AP to synchronize the system time. There is no NTP server IP address by default. If NTP is needed, IP address of the NTP server must be added and A2 will synchronize with the NTP server. This measure is useful to maintain the network and make sure all APs using the same system time by setting the same NTP server.
Figure 5 NTP Configuration
NOTE: Click the Update icon to store the changed settings.
4.6 SNMP CONFIGURATION
In the SNMP Manager, the administrator can change the Read Community and Write Community which is used for security check between AP and SNMP manager. Access Subnet IP and Access Subnet Mask can be configured to specify the IP address of SNMP Manager and
Access Subnet where SNMP manager is located. Notification Server can be added for SNMP monitoring of APs. A2 will send SNMP trap packet to the added Notification Server. They are parameters used for SNMP control between Altai A2 and AWMS system or a third party NMS.
Figure 6 SNMP Configuration
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
17
NOTE: Click the Update icon to store the changed settings.
4.7 QOS MODE AND DIFFSERV TAGGING
If QoS Mode is set to "Disabled", QoS feature is turned OFF. All traffic has equal priority and equal chance of being delivered in a timely manner. When congestion occurs, all traffic has an equal chance of being dropped. If QoS Mode is set to "Enabled", QoS feature is turned ON. Users can create QoS profiles and apply different transmission priority policies to different traffic types. The QoS implementation is based on WMM, which is a subset of 802.11e. It prioritizes traffic between the AP/Bridge and wireless client device / peer bridge device, on a per VAP basis. This control enables QoS for both 2.4GHz and 5GHz radios. QoS profile can be selected for 2.4GHz radio under the VAP settings, whereas ToS/802.1Q profile will be automatically used for 5GHz radio.
DiffServ Tagging setting is effective only when QoS Mode is enabled. The default setting is "Enabled". If DiffServ Tagging is "Disabled", DiffServ Tagging feature is turned OFF. If DiffServ Tagging is "Enabled", DiffServ Tagging feature is turned ON. The ToS field of IP packets will be changed based on the QoS policies configured.
NOTE: Click the Update icon to store the changed settings.
4.8 INTER-VAP FORWARDING
The default setting of Inter-VAP forwarding is “Disabled”. “Enabled” allows user traffic (Wireless clients) to pass across VAPs (SSID). “Disabled” blocks the user traffic flow between VAPs (SSID) for VAPs security.
NOTE: Click the Update icon to store the changed settings.
4.9 TELNET
Administrator can login to the A2 by telnet command in Command Prompt via Ethernet or WiFi. For example, to telnet A2 with IP address of 192.168.1.20; telnet command is telnet
192.168.1.20 2223” as shown in Figure 7 telnet to A2. Then, type in the Username and Password of telnet as following table:
Username
root
Password
5up
Table 2 Telnet login name and password
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
18
Figure 7 telnet to A2
Figure 8 Type in the Username and Password of telnet
NOTE: The telnet port number is limited at 2223.
4.10 NETWORK OPERATION MODE
The default setting for the Network Operation Mode is Switch Mode. If the A2 is set to Switch Mode, it acts as a switch and routes traffic between the DS and wireless clients accordingly. When it is in Gateway mode, it acts as a gateway and the Local IP Address and Local IP Address Mask information must be entered to specify the A2 local interface for serving the
wireless client. In Switch mode, VLAN mode is by default disabled and clients in different SSID under the
same A2 can communicate with each other. However, if VLAN is enabled, each SSID can be edited with a specific VLAN tag value. Only clients with same VLAN tag in same or different SSID can communicate. Moreover, in this mode, DHCPS, NAT and PPPoE configuration do not take effect.
However, in Gateway mode, the DHCPS, NAT and PPPoE configurations can be configured but the VLAN configuration do not take effect.
In Switch mode,
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
19
VLAN can be configured DHCPS, NAT and PPPoE are disabled
In Gateway mode
VLAN is disabled DHCPS, NAT and PPPoE can be configured
4.11 SWITCH MODE
4.11.1 Static IP address
In IP Assignation, there are two kinds of mode for A2: Static IP address and DHCP Client. In
Switch mode, by clicking Network Configuration in the System page, users can configure the IP Address, Subnet Mask and Gateway Address, as shown in
Figure 9 and Figure 10.
Figure 9 The IP address here is the Ethernet interface of the A2
Figure 10 Network Configurations under Switch mode and the IP address here is the Ethernet interface of the A2
4.11.2 DHCP Proxy
DHCP Proxy (also known as DHCP option 82) provides additional security when DHCP is used to allocate network addresses. It enables the Access Point to act as a DHCP relay agent to prevent DHCP client requests from untrusted sources. You can configure the Access Point to adds option 82 information to DHCP Request from client before forwarding the request to the DHCP server.
4.11.3 The Access Point adds the DHCP option 82 payload and forwards the request to the
server. The payload can contain the MAC address or the MAC address and SSID of the
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
20
point, depending on how you configure this option, as shown in
Figure 9.
4.11.4 VLAN Configuration
Default setting of VLAN is “Disabled”. By clicking “Enabled”, VLAN can be enabled. A2 supports VLAN to VAP mappings to provide network security.
Management VLAN is used to configure the management VLAN of A2. A2 can only be accessed through the specified management VLAN when VLAN is enabled. It will be ignored when VLAN is disabled.
Native VLAN Tagging configuration specifies the tagging for packets in the native VLAN.
Default setting is “Disabled and native VLAN packets are transmitted with untagged. If it sets to “Enabled”, tagged native VLAN packets are transmitted.
4.11.5 STP Configuration
STP ensures a loop free topology for any bridged LAN. Under switch mode, STP can be configured with choice of “Enabled” and “Disabled”, where the default setting is “Disabled”.
The system supports the following fixed default STP parameters:
Bridge priority: 32768 Bridge maximum age: 20 seconds Bridge hello time: 2 seconds Bridge forwarding delay: 15 seconds Ethernet port path cost: 80 Ethernet port priority: 128 802.11a bridge port path cost for each bridge link: 100 802.11a bridge port path priority for each bridge link: 128
4.11.6 DHCP Client
By enabling DHCP Client and clicking the icon Update, the A2 will acquire a dynamic IP address from a DHCP server after rebooting.
Without enabling DHCP Client, the IP Address, Subnet Mask and the Default Gateway Address should be configured by the user, unless the user prefers using the default setting.
NOTE: It is not recommended enabling DHCP client to allocate the IP address for A2
due to the fact that DHCP server may assign a dynamic IP address to the A2. Users associate A2 web-admin pages impossibly as the A2 IP address is unknown
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
21
4.12 GATEWAY MODE
In Gateway mode, by clicking Network Configuration in the System page, users can configure the WAN and LAN settings.
Figure 11 Network Configurations under Gateway mode
4.12.1 WAN Configuration
NAT is set to “Enabled” as default. The settings for Static IP address and DHCP Client are similar to those in switch mode. Please
refer to the previous section for details.
4.12.1.1 WAN Interface
Default setting is "Ethernet". This control is used to specify the WAN interface. The Ethernet interface or 5G bridge interfaces can be used as the WAN interface when the A2 works in AP mode. Use the pull down menu to select either one. The 2.4G Radio Client interface is used as the WAN interface when the A2 works in Station mode.
4.12.1.2 PPPoE Configuration
If PPPoE is chosen, a PPPoE login will be attempted for the PPPoE Username, PPPoE Password and PPPoE Service Name, see Figure 12.
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
22
Figure 12 PPPoE Configuration
NOTE: The DNS Auto Update should be set to Disable when using PPPoE. User need
to configure the DNS server IP address manually. PPPoE Active Mode, Max Idle Time and Redial Period can be configured. When “Connect on Demand” is selected, PPPoE will establish the connection with the remote
access concentrator only when hosts in the local subnet need to access the internet. If the
parameter is set “Keep Alive”, PPPoE will establish the connection with the remote access
concentrator upon boot-up. Default setting of Max Idle Time is 30 minutes. Only when PPPoE works under Connect on
Demand mode, it will be disconnected if PPPoE connection has been idle for the Max Idle Time.
When last attempt failed, A2 will attempt to establish the PPPoE connection at Redial Period.
4.12.2 DNS Auto Update
By setting DNS Auto Update to Enabled” and clicking the icon Update, the A2 will acquire a DNS Server IP address via the DHCP Server after rebooting. User need not to set a DNS Server IP Address manually.
Without enabling the A2 as a DHCP Client, the DNS IP Address and DNS Domain Name should be configured by the user.
NOTE: DNS Auto Update can only be enabled when DHCP client is enabled. If the
DNS Auto Update is enabled, it must be used in conjugation with either the DHCP Client or the PPPoE Mode being enabled. If both the DHCP Client and the PPPoE Mode are disabled then the DNS Auto Update must also be set to Disabled.
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
23
4.12.3 LAN Configuration
In Gateway Mode, A2 can be a DHCP server, a DHCP relay or none of them. When the DHCP Server Mode sets to Server, the A2 will act as a DHCP server and use the
settings specified in the field Start IP Address, Maximum Number of DHCP Users and DNS to serve the wireless clients.
1. Configure the Local IP Address and Subnet Mask Length. Local IP Address is the
gateway IP address for the client who associates A2. Only the clients under the same subnet of local IP address can get IP address from A2.
2. Configure the Start IP Address, Maximum Number of DHCP Users, and DNS, see
Figure 13.
3. Reboot the A2
Figure 13 Configure DHCP Server
When the DHCP Server Mode sets to Disabled, the A2 will neither be a DHCP server nor a DHCP Relay and hence the wireless clients CANNOT get IP addresses from the A2 to access the Internet. Instead, each wireless client should set a fixed static IP address which is in the same network domain as the A2.
1. Configure the Relay Server IP Address, see Figure 14.
2. Reboot the A2
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
24
Figure 14 Configure DHCP Server Disable
4.13 NETWORK PROVIDER
Network Provider is to build in Ethernet Virtual Interface. It is designed to establish a layer 2 tunnel with Ethernet Virtual Interface Concentrator. Ethernet Virtual Interface Concentrator has a trunk interface that connects to multiple VLAN (Network Provider) Ethernet Virtual Interface in Access Point will pick up all Layer 2 traffic that are generated by users, encapsulate it in an IP packet and forward it to the Ethernet Virtual Interface Concentrator (EVIC). The EVIC will remove the encapsulated Layer 2 frame before forwarding it on to the upstream network.
Enter the Network Provider’s name in the first column, follow by IP address, secret key and VLAN tag. These parameters can be found in the EVIC and must be match in both EVI and EVIC. See Figure 19.
Figure 159 Configure DHCP Server Disable
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
25
4.14 ACCESS LINK SAFE MODE/ BACKHAUL LINK SELF-HEALING
Access Link Safe Mode is for detecting the backhaul link integrity. If the AP loses its backhaul connectivity, it forces the clients to re-associate with another AP by changing its SSID to a default “A2 Safe Mode XXX”, where “XXX” is the MAC address of the 2.4GHz radio in hexadecimal. This action can protect the client from connecting to the AP which has no backhaul to the Internet end. Default Access Link Safe Mode is Disabled. Press the icon Enabled, A2 will work under Access Link Safe Mode.
In the case where multiple physical backhauls are available, the Backhaul Link Self-Healing feature will switch to other backhaul if the current one goes down. For example, when default backhaul is set to 5GHz Radio, once the 5GHz Bridge link is broken down, A2 will try Ethernet end as its new backhaul. Default setting is Disabled. After enabled the Backhaul Link Self-Healing, Default Backhaul Link can be configured.
Three different Ping Host can be added to the list for monitoring the connectivity. If either Access Link Safe Mode or Backhaul Link Self-Healing is enabled, the AP will ping those specified hosts periodically at the Ping Interval configured.
4.15 AMR METER TRAFFIC
AMR Meter is a feature for special purpose and it should be disable by default.
4.16 SETUP WIRELESS RADIO PARAMETER
Wireless radio parameters can be modified under Configuration in the menu bar. By selecting the icons, 2.4G Radio can operate on different modes separately: AP mode, Bridge mode and Disable. The default setting of 2.4G Radio is AP mode.
4.17 AP MODE
Wireless Radio working on AP mode is used for clients association. Altai A2 combines
802.11b/g and draft 802.11n together to offer access for clients. The Radio Enable Mode, Wireless Mode, Auto Channel Selection, Radio Frequency
(Channel), Maximum Clients, Transmit Power, Advanced Settings and VAP can be configured by selecting AP icon under 2.4G Radio, as shown in Figure 16.
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
26
Figure 16 Wireless Radio Parameter Configuration
4.17.1 Wireless Mode and Radio Frequency
Altai A2 can offer 2.4GHz radio access, the following tables list the operation mode and available frequency under the particularly wireless mode. Default setting of AP mode radio is working on 2.4GHz 300Mbps (802.11n HT 40ext ch+1) and default channel is channel 6 (2437MHz).
2.4GHz Radio Mode
Data Rate
Channels
Radio Frequency
802.11b
11 Mbps
1,2,3,4,5,6,7,8,9,10,11,12,13
2.412GHz-2.472GHz
802.11b/g
54 Mbps
1,2,3,4,5,6,7,8,9,10,11,12,13
2.412GHz-2.472GHz
802.11ng HT20
130 Mbps
1,2,3,4,5,6,7,8,9,10,11,12,13
2.412GHz-2.472GHz
802.11ng HT40ext ch+1
300 Mbps
1,2,3,4,5,6,7,8,9
2.412GHz-2.452GHz
802.11ng HT40ext ch-1
300 Mbps
5,6,7,8,9,10,11,12,13
2.432GHz-2.472GHz
Table 3 Radio operation wireless mode, channel and Radio Frequency for ETSI
2.4GHz Radio Mode
Data Rate
Channels
Radio Frequency
802.11b
11 Mbps
1,2,3,4,5,6,7,8,9,10,11
2.412GHz-2.462GHz
802.11b/g
54 Mbps
1,2,3,4,5,6,7,8,9,10,11
2.412GHz-2.462GHz
802.11ng HT20
130 Mbps
1,2,3,4,5,6,7,8,9,10,11
2.412GHz-2.462GHz
802.11ng HT40ext ch+1
300 Mbps
1,2,3,4,5,6,7
2.412GHz-2.442GHz
802.11ng HT40ext ch-1
300 Mbps
5,6,7,8,9,10,11
2.432GHz-2.462GHz
Table 4 Radio operation wireless mode, channel and Radio Frequency for FCC
2.4GHz Radio Mode
Data Rate
Channels
Radio Frequency
802.11b
11 Mbps
1,2,3,4,5,6,7,8,9,10,11,12,13
2.412GHz-2.472GHz
802.11b/g
54 Mbps
1,2,3,4,5,6,7,8,9,10,11,12,13
2.412GHz-2.472GHz
802.11ng HT20
130 Mbps
1,2,3,4,5,6,7,8,9,10,11,12,13
2.412GHz-2.472GHz
802.11ng HT40ext ch+1
300 Mbps
1,2,3,4,5,6,7,8,9
2.412GHz-2.452GHz
802.11ng HT40ext ch-1
300 Mbps
5,6,7,8,9,10,11,12,13
2.432GHz-2.472GHz
Table 5 Radio operation wireless mode, channel and Radio Frequency for RoW
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
27
4.17.2 Auto Channel Selection
By default, the Auto Channel Selection is disabled; the A2 is fixed on Channel 6. When Enabled of Auto Channel Selection is chosen, A2 can scan all available radio channels which are assigned to the regulatory domain. The cleanest channel is then selected as the operating channel.
NOTE: After changing frequency channel, it takes around 3 minutes for A2 to
optimize its radio performance.
4.17.3 Maximum Clients
A value between the ranges from 0 to 256 can be filled in Maximum Clients blank. This feature can limit the total associated clients under the particular radio.
4.17.4 Transmit Power
The value of the Transmit Power depends on both the gain of the antenna and the maximum value of the Effective Isotropic Radiated Power (Max EIRP) allowed based on Regulatory Domain. The Transmit Power should be configured within the given range as shown in Figure
16. The Tx Power could be set from 10 to 26 dBm for 2.4GHz radio, and Tx Power range for 5GHz radio is from 10 to 23 dBm.
NOTE: Click the Update icon to store the changed settings.
4.17.5 Advanced Radio Setting
More radio parameters can be verified and altered by selecting the Advanced icon in the field of Advanced Setting. The parameters are shown in Figure 1. The following table showed is the best
suggested interval worked with the current operated APs. Note that it is not suggested to change the parameters in Advanced Radio Settings unless you are experienced administrators.
Number of active
VAPs
Auto Beacon Interval
(ms)
1
100 2 150 3 150 4 200 5 200
6
240
7
280 8 320 9 360
10
400
11
440
12
480
13
520
14
560
15
600
16
640
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
28
Table 6 Beacon Interval
Fragment Threshold: It means the size of each frame. If it is set to 256 bytes and the size of data block is 1024 bytes, the data block will be divided to four frames to send.
RTS/CTS Threshold: RTS is a flow control mechanism to prevent collision between 802.11b and 802.11g mobile stations to send data to the access point in the same time. CTS is another flow control mechanism to prevent collision when two mobile stations, who do not know the existence of each other, send data to the access point in the same time. RTS and CTS are used for point-to-multipoint bridge application and they are enabled when the threshold set to 2346.
Figure 21 Advanced Wireless Radio Setting
4.17.6 Service Set IDentifier (SSID) and Virtual Access Point (VAP)
In order for the A2 and mobile clients to communicate, all of them must be configured to use the same SSID for communication both at the VAP and clients ends. SSID broadcast can be disabled by selecting Suppress SSID. Suppress SSID is used to prevent unauthorized users scanning for SSID while still allowing users who know the correct SSID to connect.
VLAN can be enabled by adding different VLAN Tag ID. The traffic will pass through the specific VLAN switch port when VLAN is enabled.
Each VAP setting (including SSID) can be altered by selecting Edit. The setting of each VAP is shown in Figure 17. The default SSID for each VAP ID is Altai Wireless Network. VLAN Tag can also be set here.
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
29
Figure 172 VAP Setting
4.17.7 Access Control List (ACL)
By selecting Access Configurations, a window, as shown in Figure 3, is brought up for choosing the ACL mode, adding MAC Address with ACL Type (Allow or Deny).
There are three modes in the Access Control List (ACL). They are Disabled, Enabled-Allow and Strict-Deny:
1. Disabled
- The function of ACL is disabled.
2. Enabled–Allow
- The function of ACL is enabled.
- The MAC addresses which are specified in the ACL will consider as Allow.
- i.e. No computer can access to the base station, unless the computer which has an
MAC address matches one of the entries of the ACL with its ACL Type is Allow.
3. Enabled–Deny
- The function of ACL is enabled.
- The MAC addresses which are specified in the ACL will consider as Deny.
- i.e. Every computer can access to the base station, unless the computer which has
an MAC address matches one of the entries of the ACL with its ACL Type is Deny.
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
30
Figure 23 ACL
4.17.8 Encryption and Authentication
By selecting Security Configurations, a window, as shown in Figure 184, is brought up for choosing the Authentication Mode and Cipher Mode.
Figure 184 Wireless Radio Security Configuration
After selecting Open or Shared-Key for Authentication Mode, WEP for Cipher Mode, the WEP key settings can be defined as shown in Figure 195.
WPA/WPA2 or WPA-PSK/WPA2-PSK can be enabled by selecting WPA/WPA2 or WPA-PSK/WPA2-PSK for Authentication Mode. The AES and TKIP are the two available options for Cipher Mode. The related settings are shown in Figure 206 and Figure 217.
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
31
NOTE: Click the Update icon to store the WEP or WPA settings.
Figure 195 WEP Key Settings
Figure 206 WPA Settings
RADIUS server is used for authentication. A2 can store separate RADIUS server address for each VAP. It is only visible when the Authentication Mode is set to “WPA”. The default setting of RADIUS server port is 1812. RADIUS secret shared password between the RADIUS server and A2. A password up to 128 characters long can be added. The VLAN IP address and VLAN Subnet Mask configured on the VAP security web page will be used only when A2 runs in the following conditions.
1. A2 runs in switch mode and VLAN is enabled.
2. The VAP does not belong to native VLAN.
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
32
3. The authentication mode is WPA.
Figure 217 WPA-PSK Settings
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
33
4.18 CPE MODE
Under VAP web-site interface, AP mode, Repeater mode, and (CPE) Station mode can be chosen. When A2 is set to CPE mode, and backhaul link can be established through associating the Station VAP with the remote APs. That means Station VAP works as backhaul link, clients can connect with C1 by Ethernet end. The Security configuration should match to the remote SSID security type and pass phase. VLAN Trunk can be establish if the remote SSID is running trunk mode as well.
There are three different station modes: NAT mode, WDS mode and MAC address translation mode (MAT mode).
When station works in NAT mode, A2 works in Gateway mode and the Station mode VAP is enabled. Repeater works in WDS mode when WDS is enabled and A2 works in Station mode. The MAT mode can be enabled when A2 runs in Switch mode and WDS is disabled.
Figure 228 Station Mode Configuration
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
34
4.19 REPEATER MODE
The 2.4GHz Radio Repeater Mode is the combination of both AP mode and CPE Mode. CPE mode configuration can be found in the Remote VAP and AP Configuration in VAP 1-15 as shown in Figure 29.
Figure 239 Repeater Mode Configuration
4.20 BRIDGE MODE
The 5GHz Radio, Radio Operational Mode, Wireless Mode, Radio Frequency (Channel), Transmit Power, Encryption Configuration, Advanced Settings and Remote Bridge Configuration can be configured by selecting 5GHz Radio under Configuration in the menu
bar, as shown in Figure 30.
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
35
Figure 30 5GHz Radio Parameter Configuration
4.20.1 AP Mode
A2 offers AP mode in 5GHz Radio. 5GHz Radio working on AP mode is used for clients association. Altai A2 combines 802.11a, 802.11na HT20 and 802.11na HT40 together to offer access for clients.
4.20.2 Bridge Radio Wireless Mode
A2 can work under either 802.11a mode or 802.11na mode by selecting on pulling down list. If A2 is set to 802.11a mode, A2 allows only 802.11a bridges to connect as peers, if A2 work in
802.11a turbo static mode, A2 will allows only same 802.11na bridges to connect as peers.
4.20.3 Data Rate & Radio Frequency
The choice of this item depends on the environment where A2 is used and which wireless mode A2 is working in.
5GHz Radio Mode
Data Rate
Channels
802.11a
54 Mbps
36, 40, 44, 48, 52, 56, 60, 64, 100, 104, 108, 112, 116, 120, 124, 128, 132, 136, 140
802.11na HT20
130 Mbps
36, 40, 44, 48, 52, 56, 60, 64, 100, 104, 108, 112, 116, 120, 124, 128, 132, 136, 140
802.11na HT40ext ch+1
300 Mbps
36, 44, 52, 60, 100, 108, 116, 124, 132
802.11na HT40ext ch-1
300 Mbps
40, 48, 56, 64, 104, 112, 120, 128, 136
Table 7 5GHz Radio channel and Data Rate for ETSI
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
36
5GHz Radio Mode
Data Rate
Channels
802.11a
54 Mbps
52, 56, 60, 64, 100, 104, 108, 112, 116, 120, 124, 128, 132, 136, 140, 149, 153, 157, 161
802.11na HT20
130 Mbps
52, 56, 60, 64, 100, 104, 108, 112, 116, 120, 124, 128, 132, 136, 140, 149, 153, 157, 161
802.11na HT40ext ch+1
300 Mbps
52, 60, 100, 108, 116, 124, 132, 149, 157
802.11na HT40ext ch-1
300 Mbps
56, 64, 104, 112, 120, 128, 136, 153, 161
Table 8 5GHz Radio channel and Data Rate for FCC
5GHz Radio Mode
Data Rate
Channels
802.11a
54 Mbps
36, 40, 44, 48, 52, 56, 60, 64, 100, 104, 108, 112, 116, 120, 124, 128, 132, 136, 140, 149, 153, 157, 161, 165, 169, 173
802.11na HT20
130 Mbps
36, 40, 44, 48, 52, 56, 60, 64, 100, 104, 108, 112, 116, 120, 124, 128, 132, 136, 140, 149, 153, 157, 161, 165, 169, 173
802.11na HT40ext ch+1
300 Mbps
36, 44, 52, 60, 100, 108, 116, 124, 132, 149, 157
802.11na HT40ext ch-1
300 Mbps
40, 48, 56, 64, 104, 112, 120, 128, 136, 153, 161
Table 9 5GHz Radio channel and Data Rate for RoW
For ETSI:
In 802.11a mode: User can select a 5GHz channel in the pool from channel 36 to 64 (5.18GHz to 5.32GHz) and 100 to 140 (5.5GHz to 5.7GHz)
In 802.11na HT20: User can select a 5GHz channel in the pool from channel 36 to 64 (5.18GHz to 5.32GHz) and 100 to 140 (5.5GHz to 5.7GHz)
In 802.11na HT40ext ch+1: Users can select a 5GHz channel in the pool from channel 36 to 60 (5.18GHz to 5.3GHz) and 100 to 132 (5.5GHz to 5.66GHz)
In 802.11na HT40ext ch-1: Users can select a 5GHz channel in the pool from channel 40 to 64 (5.2GHz to 5.32GHz) and 104 to 136 (5.52GHz to 5.68GHz)
For FCC:
In 802.11a mode: User can select a 5GHz channel in the pool from channel 52 to 64 (5.26GHz to 5.32GHz), 100 to 140 (5.5GHz to 5.7GHz) and 149 to 161 (5.745GHz to 5.825GHz).
In 802.11na HT20: Users can select a 5GHz channel in the pool from channel 52 to 64 (5.26GHz to 5.32GHz), 100 to 140 (5.5GHz to 5.7GHz) and 149 to 161 (5.745GHz to 5.825GHz).
In 802.11na HT40ext ch+1: Users can select a 5GHz channel in the pool from channel 52 to 60 (5.26GHz to 5.3GHz), 100 to 132 (5.5GHz to 5.66GHz) and 149 to 157 (5.745GHz to 5.785GHz).
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
37
In 802.11na HT40ext ch-1: Users can select a 5GHz channel in the pool from channel 56 to 64 (5.28GHz to 5.32GHz), 104 to 136 (5.52GHz to 5.68GHz) and 153 to 161 (5.765GHz to 5.805GHz).
For RoW:
In 802.11a mode: User can select a 5GHz channel in the pool from channel 36 to 64 (5.18GHz to 5.32GHz), 100 to 140 (5.5GHz to 5.7GHz) and 149 to 173 (5.745GHz to 5.865GHz).
In 802.11na HT20: User can select a 5GHz channel in the pool from channel 36 to 64 (5.18GHz to 5.32GHz), 100 to 140 (5.5GHz to 5.7GHz) and 149 to 173 (5.745GHz to 5.865GHz).
In 802.11na HT40ext ch+1: Users can select a 5GHz channel in the pool from channel 36 to 60 (5.18GHz to 5.3GHz), 100 to 132 (5.5GHz to 5.66GHz) and 149 to 157 (5.745GHz to 5.785GHz).
In 802.11na HT40ext ch-1: Users can select a 5GHz channel in the pool from channel 40 to 64 (5.2GHz to 5.32GHz), 104 to 136 (5.52GHz to 5.68GHz) and 153 to 161 (5.765GHz to 5.805GHz).
4.20.4 Bridge Radio Transmit Power
The power for 5GHz Radio is set in this area. The value of the Transmit Power depends on both the gain of the 5GHz antenna and the Max EIRP allowed by the country in which A2 is used. The Transmit Power can be configured within the given range (10 - 23dBm).
NOTE: Click the Update icon to store the Transmit Power settings.
4.20.5 Advanced Radio Setting
More radio parameters can be verified and altered by selecting the Advanced icon in the field of Advanced Setting. The parameters are shown in Figure 2431.
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
38
Figure 24 Advanced Bridge Radio Setting
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
39
Multicast Rate: This option allows Multicast packets to be sent in higher rates (up to the 54 Mbps) than commonly used (6 Mbps at IEEE 802.11g/a mode). This is ALTAI's A2 proprietary feature thus it may be incompatible with the devices from other vendors. Both A2 based devices the sender and the receiver must have the same Multicast Rate configured in order to achieve better multicast packet throughput performance
RTS/CTS Threshold: RTS is a flow control mechanism to prevent collision between 802.11b and 802.11g mobile stations to send data to the access point in the same time. CTS is another flow control mechanism to prevent collision when two mobile stations, who do not know the existence of each other, send data to the access point in the same time. RTS and CTS are used for point-to-multipoint bridge application and they are enabled when the threshold set to 2347.
4.20.6 Signal Indication Configure
LED of LAN port is also used to indicate the 5GHz Bridge signal alignment. The Signal Indication function can be activated under 5GHz radio advance configuration from web interface.
The LED Signal indicator range could be configured from web page. The 3 signal level input should be in ascending order form left to right. The default setting of LED signal threshold is
-80, -70 and -60. The 3 displayed signal levels are classified as:
Signal Level
LED Status
Weakest
Slow Blink
Middle
Fast Blink
Strongest
Solid On
Table 10 LED signal level
Buzzer can also be used for 5GHz Bridge signal strength alignment. User can activate the buzzer under advanced setting of 5GHz radio. Buzzer beep frequency depends on the signal strength level. Buzzer will be turned off after a pre-defined period. Beep duration could be set from 0 to 15 sec and by default beep duration is 0s.
4.20.7 Remote Bridge Configuration
The MAC address of the remote AP should be added into the field MAC Address, and the remote AP should add the MAC address of local AP to form a bridge. Moreover, all bridging equipments including both local AP and remote APs should be set at the Same Radio Frequency.
4.20.8 Bridge Security
By enabling Bridge Security in the 5GHz Configuration, as shown in Error! Reference source not found., users can input an encryption key for the bridge. Note: if the Local AP and Remote
AP mismatch the encryption type or encryption key, there will be no link established by 5GHz radio. Please make sure the security parameter setting at the both ends of the bridge.
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
40
Figure 252 Bridge encryption setting_AES
4.21 DISABLE MODE
The particular radio of A2 can be disabled by click the Disable icon. There is no need to configure the Transmit Power and Advanced Settings.
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
41
Figure 263 Wireless Radio Disable Mode
4.22 REBOOT
System reboot of A2 can be chosen by selecting Reboot under Administration in the menu bar. It is required to select Reboot A2 WiFi Access Point/Bridge to confirm this action, as shown in Figure 27.
When the A2 is rebooting, a message “Please wait... A2 WiFi Access Point/Bridge is Rebooting” is shown on the window, as shown in Figure 28. It will take about 20 seconds for the access point to boot up.
Figure 274 Reboot Window
Figure 285 A2 is Rebooting
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
42
4.23 RESTORE CONFIGURATION TO DEFAULT SETTING
The choices of factory default can be chosen by selecting Factory Default under
Administrations in the menu bar.
The default settings (IP Address, Subnet Mask, Default Gateway Address and Remote Bridge Configurations are retained) can be restored by selecting the icon Reset to Factory
Default (address retained) or Reset to Factory Default, as shown in Figure . Please reboot the A2 afterwards.
Note: after resetting to factory default without address retained, please type <https://192.168.1.20> to open A2 web-admin.
Figure 29 Reset to Factory Default Setting in Web-admin
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
43
5 PERFORMANCE MANAGEMENT MONITORING IN WEB-ADMIN
5.1 SYSTEM
The statistics can be monitored by selecting System under Status in the menu bar. All details are shown on the window, as shown in Figure .
Figure 30 Details of the system
The status of each VAP can be shown by clicking Vap under the field of Wireless Radio, as shown in Figure .
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
44
Figure 31 Statuses of the Vaps
The status and MAC address of each remote bridge can be shown by selecting Remote Bridge under the field of 5GHz Radio, as shown in Figure 32.
Figure 32 Statuses of the Remote Bridges
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
45
5.2 CLIENTS STATISTICS
The clients’ association statistics can be monitored by selecting Clients Statistics under the field of Status in the menu bar, as shown in Figure .
The Address Lease Table shows the Client MAC Address, Client IP Address of each end user.
Figure 40 Clients Statistics
5.3 ROGUE AP DETECTION
Rogue AP Detection can help to detect Rogue AP under the 2.4GHz radio Channel Scan by
selecting under the field of Status in the menu bar. It allows the administrator to check important radio parameters in the environment nearby. APs or ad hoc mode clients from different vendors can be scanned using this function. Click the Start Scan button to initialize the Channel Scan.
A2 can detect Rogue AP by configuring Legitimate AP BSSID and Legitimate AP SSID.
For example, the Legitimate AP SSID is set to “*voip”, then click the scan button. When scan status shows Success, then press Channel Scan Result. The SSID with “voip” will be marked by
* in scanning result, as shown in Figure 33.
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
46
Figure 33 Channel scan
5.4 RADIO ASSOCIATION-AP MODE
The each radio association statistics can be monitored by selecting Radio Association under the field of Status in the menu bar. The corresponding statistics can be shown by selecting the related MAC Address, as shown in Figure 34.
The Association Table shows the ID, Mac Address, RSSI, and VAP of each station as shown in Figure 34. A more detailed 2.4GHz Association Statistic of each station can be brought up by selecting the related Mac Address as shown in Figure 35.
Status
Description
ID
Station ID, a number randomly generated by A2 to represent a mobile client
Mac Address
Station Mac Address
RSSI
Receiver Signal Strength
VAP
Virtual Access Point ID Number that the mobile client associates to
Table 11 2.4GHz Client Association Status
NOTE: The association page would be refreshed for every 15 seconds
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
47
Figure 34 Radio Association Table
Figure 35 Radio Statistics per MAC Address (data is cumulative)
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
48
5.5 RADIO ASSOCIATION-BRIDGE MODE
The bridge radio association can be monitored by selecting 5G radio Association Bridge under the field of Status in the menu bar, as shown in Figure 36 Radio Association Bridge List and Figure 37.
Figure 36 Radio Association Bridge List
Figure 37 Bridge Association Statistics per MAC address
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
49
6 SOFTWARE UPGRADE THROUGH WEB-ADMIN AND CUSTOMIZATION
The firmware can be upgraded by selecting Firmware Update under the field of
Administrations in the menu bar respectively. The firmware also allow user to upload a
customized logo and configuration profile. Please note that the connection link should be maintained during file transfer to prevent interruption to the system.
6.1 CUSTOMIZATION PROFILE AND LOGO
User can request a sample of pre-configured profile from Altai Technologies Technical Support Team and modify the parameters if he or she wishes to, then upload the configuration profile and reboot the AP. Take same procedures apply to a customized logo as well. If user wants to reset it to factory default configuration, remove both logo and profile in the same page. Refer to Figure 374.
Figure 38 Customization
6.2 FIRMWARE UPDATE THROUGH HTTP OR HTTPS
Follow the steps below to perform the Firmware Update with a firmware image file (.bin) in local directory through HTTP or HTTPS.
1. Click the Browse bottom to bring up a file chooser dialog which you can specify the
name and location of the firmware image you want to import see Figure 395.
2. Click the Update Firmware bottom to start uploading the new firmware from the local
directory, see Figure 406.
3. If the firmware upgrade is successful, a window will appear as Figure 417. A2 will
reboot automatically.
4. Type in URL with https://<ip address of A2>, note ‘http’ cannot link to the web admin
of A2 under the new firmware version.
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
50
5. After the A2 reboots, check the firmware version by selecting About under the field of
Administrations in the menu bar, as discussed in Section 4.2, to ensure the expected
firmware is uploaded.
6. Select Factory Default under the field Administrations in the menu bar and click Reset
to Factory Default (address retained) or Reset to Factory Default to make the default
settings effective. Note: If press Reset to Factory Default with address retained, the IP address of A2 web-admin will not be changed after rebooting the AP. While Reset to
Factory Default is chosen, IP address of A2 will be changed into 192.168.1.20 .
7. Click the icon REBOOT AP to reboot the A2.
Figure 395 Upload the Firmware through HTTP or HTTPS
Figure 406 Firmware Uploading – Web-admin
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
51
Figure 417 Successful Firmware Update – Web-admin
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
52
7 GLOSSARY
802.1q IEEE 802.1Q was a project in the IEEE 802 standards process to develop a mechanism
to allow multiple bridged networks to transparently share the same physical network link without leakage of information between networks (i.e. trunking). IEEE 802.1Q is also the name of the standard issued by this process, and in common usage the name of the encapsulation protocol used to implement this mechanism over Ethernet networks. This protocol allows for individual VLANs to communicate with one another with the use of a layer-3 (network) router.
802.11 802.11 refers to a family of specifications developed by the IEEE for wireless LAN technology. 802.11 specifies an over-the-air interface between a wireless client and a base station or between two wireless clients. The IEEE accepted the specification in 1997.
802.11a An extension to 802.11 that applies to wireless LANs and provides up to 54 Mbps in the 5GHz band. 802.11a uses an Orthogonal Frequency Division Multiplexing (OFDM) encoding scheme rather than Frequency Hopping Spread Spectrum (FHSS) or Direct Sequence Spread Spectrum.
802.11b Also referred to as 802.11 High Rate or Wi-Fi. It is an extension to 802.11 that applies to wireless LANS and provides 11 Mbps transmission (with a fallback to 5.5, 2 and 1 Mbps) in the 2.4 GHz band. 802.11b uses only DSSS. 802.11b was a 1999 ratification to the original 802.11 standard, allowing wireless functionality comparable to Ethernet.
802.11e A supplement to the IEEE 802.11 wireless LAN (WLAN) specification for enhancements to the 802.11 Medium Access Control (MAC) to improve and manage Quality of Service (QoS), provide Classes of Service (CoS), and enhanced security and authentication mechanisms.
802.11g The 802.11g specification is a standard for Wireless Local Area Networks (WLANs) that offers transmission over relatively short distances at up to 54 megabits per second (Mbps), compared with the 11 Mbps theoretical maximum with the earlier 802.11b standard. Networks employing 802.11g operate at radio frequencies between 2.400 GHz and 2.4835 GHz, the same band as 802.11b. But the 802.11g specification employs Orthogonal Frequency Division Multiplexing (OFDM), the modulation scheme used in 802.11a, to obtain higher data speed. Computers or terminals set up for 802.11g can fall back to speeds of 11 Mbps. This feature makes 802.11b and 802.11g devices compatible within a single network. Modification of an
802.11b access point to 802.11g compliance usually involves only a firmware upgrade.
802.11i A supplement to the IEEE 802.11 wireless LAN (WLAN) specification for enhanced security through the use of stronger encryption protocols such as the Temporal Key Integrity Protocol (TKIP) and AES Counter-Mode Cipher Block Chaining Message Authentication Code Protocol (AES-CCMP). These protocols provide replay protection, cryptographically keyed integrity checks, and key derivation based on the IEEE 802.1X port authentication standard.
802.11n A supplement to the previous 802.11 standards. 802.11n combines the MIMO (Multiple-input Multiple-output) and channel-bonding (40MHz) operation to physical layer and frame aggregation to the MAC layer. The current state of 802.11n supports a data rate of 300Mbit/s and the throughput can achieve at 150Mbit/s.
ACL Access Control List: It is a table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file.
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
53
ad-hoc mode An 802.11 networking framework in which devices or stations communicate directly with each other, without the use of an Access Point (AP). Ad-hoc mode is also referred to as peer-to-peer mode or an Independent Basic Service Set (IBSS). Ad-hoc mode is useful for establishing a network where wireless infrastructure does not exist or where services are not required.
antenna gain The measure of an antenna assembly performance relative to a theoretical antenna, called an isotropic radiator (radiator is another term for antenna). Certain antenna designs feature higher performance relative to vectors or frequencies.
AP Access Point: A hardware unit that acts as a communication hub by linking wireless mobile 802.11 stations such as PCs to a wired backbone network. A Trapeze Networks Mobility System has Mobility Point APs.
ASCII American Standard Code for Information Interchange: An 8-bit code for representing characters, consisting of 7 data bits plus 1 parity bit.
association The relationship established between mobile (wireless) stations and a wireless AP (AP) in which the stations receive services from the AP.
bandwidth The gap between the highest and lowest frequencies employed by network signals. More commonly, it refers to the rated throughput capacity of a network protocol or medium. The frequency range necessary to convey a signal measured in units of hertz (Hz).
broadcast A data frame or packet that is transmitted to every node on the local network segment (as defined by the broadcast domain). Broadcasts are known by their broadcast address, which is a destination network and host address with all the bits turned on.
channel Communication path wide enough to permit a single RF transmission. Multiple channels can be multiplexed over a single cable in certain environments.
dB decibels: Unit for measuring relative power ratios in terms of gain or loss. Units are expressed in terms of the logarithm to base 10 of a ratio and typically are expressed in watts. dB is not an absolute value, rather it is the measure of power lost or gained between two devices. Because antennas and other RF devices/systems commonly have power gains or losses on the orders of magnitude or even orders of four orders of magnitude, dB is a more easily used expression.
dBd decibels over Dipole: A relative gain measurement with respect to a half wave dipole (0 dBd = 2.14 dBi) using a standard dipole antenna as a reference.
dBi dBi referenced to an isotropic antenna, which theoretically is perfect in terms of symmetric patterns of radiation. Real world antennas do not perform with even nominal amounts of symmetry, but this effect generally is used to the advantage of the system designer.
dBm decibels per Milliwatt: 0 dBm is defined as 1 mw at 1 kHz of frequency at 600 ohms of impedance.
DHCP Dynamic Host Configuration Protocol: Provides a mechanism for allocating IP addresses dynamically so that addresses can be reused when hosts no longer need them.
DNS Domain Name Server: System used on the Internet for translating names of network nodes into addresses.
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
54
DSSS Direct Sequence Spread Spectrum: One of two types of spread spectrum radio technology used in wireless LAN (WLAN) transmissions. To increase a data signal's resistance to interference, the signal at the sending station is combined with a higher-rate bit sequence that spreads the user data in frequency by a factor equal to the spreading ratio.
EIRP Effective Isotropic Radiated Power: Term for the expression of the performance of an antenna in a given direction relative to the performance of a theoretical (isotropic) antenna and is expressed in watts or dBW. EIRP is the sum of the power sent to the antenna plus antenna gain.
encryption The conversion of information into a scrambled form that effectively disguises it to prevent unauthorized access. Every encryption scheme uses some well-defined algorithm, which is reversed at the receiving end by an opposite algorithm in a process known as decryption.
Ethernet Baseband LAN specification invented by Xerox Corporation and developed jointly by Xerox, Intel, and Digital Equipment Corporation. Ethernet networks use CSMA/CD and run over a variety of cable types at 10 Mbps. Ethernet is similar to the IEEE 802.3 series of standards.
FastRoamingTM The Trapeze Mobility System feature that quickly hands off a roaming user's
credentials. Mobility Exchanges in a Trapeze Mobility Domain pass each other this vital user information to permit seamless roaming. This allows 802.1X and non-802.1X, MAC-authenticated devices, such as 802.11 phones, to roam quickly between Mobility Exchanges.
FCC Federal Communications Commission: U.S. government agency that supervises, licenses, and controls electronic and electromagnetic transmission standards. The FCC Rules in Title 47 of the Code of Federal Regulations govern telecommunications in the United States. Wireless LANs must comply with Part 15 of the FCC rules, which are written specifically for RF devices.
firmware Software instructions set permanently or semipermanently in ROM.
FHSS Frequency Hopping Spread Spectrum: One of two types of spread spectrum radio
technology used in wireless LAN (WLAN) transmissions. The FHSS technique modulates the data signal with a narrowband carrier signal that hops in a predictable sequence from frequency to frequency as a function of time over a wide band of frequencies. Interference is reduced, because a narrowband interferer affects the spread spectrum signal only if both are transmitting at the same frequency at the same time. The transmission frequencies are determined by a spreading (hopping) code. The receiver must be set to the same hopping code and must listen to the incoming signal at the proper time and frequency to receive the signal.
FPGA Field Programmable Gate Array: An FPGA is a specially made digital semiconductor often used for prototyping. With an FPGA, a design engineer is able to program electrical connections on site for a specific application, without paying thousands of dollars to have the chip manufactured in mass quantities.
FTP File Transfer Protocol: Defined in RFC 959, it is a Application protocol that is part of the TCP/IP protocol stack, used for transferring files between network nodes.
gateway In the IP community, an older term referring to a routing device. Today, the term router is used to describe nodes that perform this function, and gateway refers to a
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
55
special-purpose device that performs an application-layer conversion of information from one protocol stack to another.
handoff The process of transferring the handling of that cellular call to the new base station.
host address Logical address configured by an administrator or server on a device.
Logically identifies this device on an internetwork.
https Hypertext Transfer Protocol over Secure Sockets Layer: An Internet protocol developed by Netscape to encrypt and decrypt network connections to web servers. Built into all secure browsers, HTTPS uses the Secure Sockets Layer (SSL) protocol as a sublayer under the regular HTTP application layer, and uses port 443 instead of HTTP Port 80 in its interactions with the lower layer, TCP/IP.
ICMP Internet Control Message Protocol: Defined in RFC 792, it is a Network layer Internet protocol that reports errors and provides other information relevant to IP packet processing.
IEEE Institute of Electrical and Electronic Engineers: An American professional society whose standards for the computer and electronics industry often become national or international standards. In particular, the IEEE 802 standards for LANs are widely followed.
infrastructure network In an infrastructure network, all communications are relayed through an AP (AP). Wireless devices can communicate with each other or with a wired network. The network is defined by the distance of mobile stations from the AP, but no restriction is placed on the distance between stations. Stations must request association with the AP to obtain network services, which the AP can grant or deny based on the contents of the association request. Like most corporate wireless LANs (WLANs), which must access a wired LAN for file servers and printers, Trapeze Networks Mobility System is an infrastructure network.
IP Internet Protocol: Defined in RFC 791, it is a Network Layer protocol that is part of the TCP/IP stack and allows connectionless service. IP furnishes an array of features for addressing, type-of-service specification, fragmentation and reassembly, and security.
IP address Often called an Internet address, this is an address uniquely identifying any device (host) on the Internet (or any TCP/IP network). Each address consists of four octets (32 bits), represented as decimal numbers separated by periods (a format known as dotted-decimal). Every address is made up of a network number, an optional subnetwork number, and a host number. The network and subnetwork numbers together are used for routing, while the host number addresses an individual host within the network or subnetwork. The network and subnetwork information is extracted from the IP address by using the subnet mask. There are five classes of IP addresses (A-E), which allocate different numbers of bits to the network, subnetwork, and host portions of the address.
LOS Line Of Sight: Refers to the fact that there must be a clear, unobstructed path between the transmitters and receivers. This is essential for our LMDS products and enhances general performance in every RF deployment as opposed to partial or completely obstructed data paths. The opposite to LOS is NLOS, or Non Line Of Sight.
MAC address Media Access Control address: A Data Link Layer hardware address that every port or device needs to connect to a LAN segment. These addresses are used by various devices in the network for accurate location of logical addresses. MAC addresses are defined by the IEEE standard, and their length is six characters, typically using the burned-in address
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
56
(BIA) of the local LAN interface. Variously called “hardware address”, “physical address”, “burned-in address” or “MAC-layer address”.
MTU Maximum Transmission Unit: The largest packet size, measured in bytes, that an interface can handle.
NAT Network Address Translation: An algorithm instrumental in minimizing the requirement for globally unique IP addresses, permitting an organization whose addresses are not all globally unique to connect to the Internet, regardless, by translating those addresses into globally routable address space.
NLOS Non Line Of Sight. Also known as obstructed path or pathway.
noise Undesirable communications channel signals.
NTP Network Time Protocol: Protocol built on top of TCP that ensures accurate local
time-keeping with reference to radio and atomic clocks located on the Internet. This protocol is capable of synchronizing distributed clocks within milliseconds over long time periods.
OFDM Orthogonal Frequency Division Multiplexing: A technique that splits a wide frequency band into a number of narrow frequency bands and sends data across the subchannels. The wireless networking standards 802.11a and 802.11g are based on OFDM.
open system authentication The sender and the recipient do not share a secret key. Each party generates its own key-pair and asks the receiver to accept the (usually randomly) generated key. Once accepted, this key is used for a short time only, then a new key is generated and agreed upon. So, it is a two-step authentication method, in which sender first sends its identity and in response of that it gets the authentication results.
ping Packet Internet Groper: ICMP echo message and its reply. Often used in IP networks to test the reach ability of a network device.
PoE Power over Ethernet: A technology, defined in the developing IEEE 802.3af standard, to deliver dc power over twisted-pair Ethernet data cables rather than power cords. The electrical current, which enters the data cable at the power-supply end and comes out at the device end, is kept separate from the data signal so neither interferes with the other.
Remote Bridge A bridge located on a network system separate from the host system.
RF Radio Frequency: Any frequency within the electromagnetic spectrum associated with
radio wave propagation. When an RF current is supplied to an antenna, an electromagnetic field is created that then is able to propagate through space. Many wireless technologies are based on RF field propagation.
RFC Request For Comments: Document series used as the primary means for communicating information about the Internet. Some RFCs are designated by the IAB as Internet standards. Most RFCs document protocol specifications, such as Telnet and FTP, but some are humorous or historical. RFCs are available online from numerous sources.
shared key authentication Shared key authentication supports authentication of STAs as either a member of those who know a shared secret key or a member of those who do not. Shared key authentication accomplishes this with the use of the WEP privacy mechanism. Therefore, this authentication scheme is only available if the WEP option is implemented. The
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
57
required secret, shared key is presumed to have been delivered to participating STAs via a secure channel that is independent of IEEE 802.11. During the shared key authentication exchange, both the challenge and the encrypted challenge are transmitted. This facilitates unauthorized discovery of the pseudorandom number (PRN) sequence for the key/IV pair used for the exchange. Implementations should therefore avoid using the same key/IV pair for subsequent frames.
SNMP Simple Network Management Protocol: SNMP forms part of the Internet Protocol suite, as defined by the Internet Engineering Task Force (IETF). It is a Network management protocol used almost exclusively in TCP/IP networks. SNMP provides a means to monitor and control network devices, and to manage configurations, statistics collection, performance, and security.
SNMP2 Simple Network Management Protocol Version 2: Version 2 of the popular network management protocol. SNMP2 supports centralized as well as distributed network management strategies, and includes improvements in the SMI, protocol operations, management architecture, and security.
SSID Service Set Identifier: A 32-character (maximum) unique identifier attached to the header of packets sent over a WLAN that acts as a password when a mobile device tries to connect to the Basic Service Set.
STP Spanning-Tree Protocol: Bridge protocol that uses the spanning-tree algorithm, enabling a learning bridge to dynamically work around loops in a network topology by creating a spanning tree. Bridges exchange BPDU messages with other bridges to detect loops, and then remove the loops by shutting down selected bridge interfaces. Refers to both the IEEE 802.1 Spanning-Tree Protocol standard and the earlier Digital Equipment Corporation Spanning-Tree Protocol upon which it is based. The IEEE version supports bridge domains and allows the bridge to construct a loop-free topology across an extended LAN. The IEEE version generally is preferred over the Digital version.
subnet mask A 32-bit address mask used in IP to identify the bits of an IP address that are used for the subnet address. Using a mask, the router does not need to examine all 32 bits, only those selected by the mask.
telnet The standard terminal emulation protocol within the TCP/IP protocol stack. Defined in RFC 854, it is a method of remote terminal connection, enabling users to log in to remote networks and use those resources as if they were locally connected.
throughput Rate of information arriving at, and possibly passing through, a particular point in a network system.
VAP Virtual Access Point: It is a logical entity that exists within a physical Access Point (AP).
When a single physical AP supports multiple “Virtual APs”, each Virtual AP appears to stations
(STAs) to be an independent physical AP, even though only a single physical AP is present.
VLAN Virtual LAN: Group of devices on one or more LANs that are configured (using management software) so that they can communicate as if they were attached to the same wire, when in fact they are located on a number of different LAN segments. Because VLANs are based on logical instead of physical connections, they are extremely flexible.
VLAN tag It works by tagging each frame, i.e. an Ethernet header extension that enlarges the header from 14 to 18 bytes. The VLAN tag contains the VLAN ID and priority.
20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Commercially Confidential
58
WEP Wired Equivalent Privacy: A security protocol for wireless local area networks (WLANs) defined in the 802.11b standard. WEP is designed to provide the same level of security as that of a wired LAN. LANs are inherently more secure than WLANs because LANs are somewhat protected by the physicalities of their structure, having some or all part of the network inside a building that can be protected from unauthorized access. WLANs, which are over radio waves, do not have the same physical structure and therefore are more vulnerable to tampering. WEP aims to provide security by encrypting data over radio waves so that it is protected as it is transmitted from one end point to another. However, it has been found that WEP is not as secure as once believed. WEP is used at the two lowest layers of the OSI model
- the data link and physical layers; it therefore does not offer end-to-end security.
Wi-Fi Wireless Fidelity: Wi-Fi is a label for devices conforming to the IEEE 802.11b standard for WLAN. The IEEE 802.11b standard has been published by the IEEE, which does not perform conformance testing. In order to establish such a conformance testing process, the Wi-Fi Alliance (formerly known as WECA) has been formed, which tests devices for conformance with the IEEE 802.11b standard and issues the Wi-Fi label for conforming devices.
WME Wireless Multimedia Extensions: Also known as Wi-Fi Multimedia (WMM), it is a Wi-Fi Alliance interpretability certification, based on the IEEE 802.11e draft standard. It provides basic Quality of service (QoS) features to IEEE 802.11 networks. WMM prioritizes traffic according to 4 AC (Access Categories) - voice, video, best effort and background. However, it does not provide guaranteed throughput. It is suitable for simple applications that require QoS, such as Wi-Fi Voice over IP (VoIP) phone.
WPA Wi-Fi Protected Access: WPA was created by the Wi-Fi Alliance in 2002, in part out of impatience with the slow-moving IEEE 802.11i standard. The industry consortiums consensus was that an alternative to WEP was needed quickly, and WPA was the result. To avoid multiple standards and conflicts later on, WPA was designed from the get-go to be compatible with IEEE 802.11i and was based on its early draft specifications.
Loading...