Gigabyte GN-WPKG User Manual - Page 13

TX Power, RTS Threshold, Fragment Threshold, 1-2. Authentication and Security Screen

Page 13 highlights

Figure 3-4 - Configuration Screen TX Power: Select percentage of transmitted power. (Default: Auto) RTS Threshold: This is a mechanism implemented to prevent the "Hidden Node" problem, "Hidden Note" is a situation in which two stations are within range of the same Access Point, but are not within range of each other. Therefore, they are hidden nodes for each other and can not detect each other. This mechanism is a way to prevent data collision when Adapters require transmission. (Default: OFF) Fragment Threshold: Fragmentation mechanism is used for improving the efficiency when high traffic flows along in the wireless network. (Default: OFF) 3-1-2. Authentication and Security Screen: If an authentication or security setting is configured in your Access Point or router, you must enable this function to ensure successful connection. Use the following tab to configure data security and ID authentication (see Figure 3-5). You may configure different settings in the profile, including 802.11 Protocol Authentication and Security and 802.1X Protocol. 10

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26

10
Figure 3-4 – Configuration Screen
TX Power:
Select percentage of transmitted power. (Default: Auto)
RTS Threshold:
This is a mechanism implemented to prevent the “Hidden Node” problem,
“Hidden Note” is a situation in which two stations are within range of the same
Access Point, but are not within range of each other. Therefore, they are hidden
nodes for each other and can not detect each other. This mechanism is a way to
prevent data collision when Adapters require transmission. (Default: OFF)
Fragment Threshold
: Fragmentation mechanism is used for improving the efficiency
when high traffic flows along in the wireless network. (Default: OFF)
3-1-2. Authentication and Security Screen:
If an authentication or security setting is configured in your Access Point or router, you
must enable this function to ensure successful connection. Use the following tab to
configure data security and ID authentication (see
Figure 3-5
). You may configure
different settings in the profile, including 802.11 Protocol Authentication and Security and
802.1X Protocol.