Setting up a wireless router client

Source: Internet
Author: User
Tags reset

No line from the client setting is divided into the following steps, understanding the following procedures will make it easy for you to learn the installation without wiring set by the client and its related settings.


  


Many organizations implement wireless network connectivity, but since wireless networking is a very new concept, there is little detailed discussion about this setting. In this article, we will provide some tips to help you set up client and access nodes, discuss how wireless devices are set up, and the details of some of the special effects of standard line selection on wireless devices.


  


no lines set by the client considerations


  

The
wireless network interface may appear in PCI, USB, and PC card formats. USB devices should connect the computer directly to a powerful hub, and PCI and PC Card devices should be installed on the slots to provide the antenna with the maximum exposure space. Note that the moving cable is away from the antenna, minimizing the RF conflict. Use protective cables and speakers where possible. Electronic conflicts will reduce the maximum bandwidth.


  


no lines are set by the client when setting up a wireless client, notice if you should save the default settings. These settings will make your system run faster, and you can compromise security issues. Some settings need to be configured at the Access node. Make sure they are the same. 3lian.com


  


no lines are set by the client as follows:


  


Ad hoc,or peer-to-peer Networking: Some wireless devices can communicate without using an Access node. This capability increases the flexibility of the customer system, but it may be critical to a central management network security policy.


  


encryption keys: These keys play a role in encrypting data. The client and Access node settings must match. The default key is: To allow the client can easily be joined to the network, for security, the key should be changed regularly to prevent intruders to crack the password.


  


Mobile IP: Cellular Wireless networks allow clients to wander from one wireless node to another. In a large enough network, you can cause the client to enter a different subnet. In general, IP conflicts can occur, but using mobile IP to create a series of forwarding addresses allows access nodes to be reset to data across subnets. Mobile IP is not suitable for use in a network other than a special continuous wireless network.


  


Rate control:rate control allows you to define the speed of communication. Reduce maximum bandwidth, increase roaming range, reduce energy consumption, but get the most valuable features. The default setting is the usual best setting. Configurations that will be allowed to match in different sections.


  


WEP: The encryption plan used by wireless standard (802.11B) is called Wired Equivalent Protection (WEP), which compensates for physical security vulnerabilities. Not all wireless systems provide encryption. The default 802.11b is internationally available 40-bit encryption, but some US mode also supports 128-bit encryption. Sometimes, the encryption in the default setting is disable, and this option can be changed to enable.


  


WLAN Service Area: This value is similar to the network workgroup, where the configuration of different WLAN service areas allows multiple wireless networks of the same type to overlap in the same physical area, except that clients in the same working area can communicate with other nodes. Sometimes, the number of service areas is the default, such as 101. If you want to change its settings, you will risk a certain security.


  


Do you need multiple network profile


  


because wireless devices are always used on different networks, the vendor network device always packs the wireless product. Especially for Windows 9x laptops, it does not support multiple network configurations. Easy to use is very important, especially for small office and home wireless settings.


  


The smallest network also has the ability to store multiple network configurations for the same device. The most advanced can even convert the default printer, modem settings, area code, remote code and shared network configuration. These features provide flexibility, but if the conversion is too complex it can cause configuration failure. Remind you to carefully evaluate network Profiler to ensure user network availability. Even if the hardware is stable, you will be blamed if the end user does not like the application.


  


the attributes of Access point


  


for the design of the network, Access Point is the most important component, it determines how many clients to support, encryption level, access control, login, network management, client management, it manages all the worldly possessions. Select the Access node as carefully as you would select the router.


  


the network capabilities of Access point to detect its physical characteristics. 3Com access point includes a "power base-t" connector that works with the CAT-5 line. This facility is installed in places where electricity is not easily accessible. This device includes a series of ports that can be configured or connected to an extended modem. While this may seem antithetical to the physical network, it allows you to customize routing packets and worry, or even set up a temporary network (for example, in a trade with insufficient network bandwidth). Other components include a USB or Bluetooth interface.


  


Access Point Settings


  


in this section, we will explain the configuration of the wireless access point. Other options will appear on the access Point Configuration screen to help you configure your device. The initial configuration of Access point differs depending on the vendor. 3Com access point uses a crossover cable and a terminal to complete. Proxim HomeRF Wireless gateways are configured using a priority wireless client. Other ways to set access point include Web, Ethernet, Telnet, or physical converters.


  


Some access point requires a password. The default password is easy to obtain, and makes the network vulnerable to security, especially when the device can be configured remotely. Be careful about changing your password. If the password is lost, you cannot change the configuration of the device. The way the system is reset to clear the password clears the network configuration.


Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.