Linksys WRTP54G User Guide - Page 83
system, the user's end node undertakes a search for the best possible access to the system. First
UPC - 745883564903
View all Linksys WRTP54G manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 83 highlights
Wireless-G Broadband Router with 2 Phone Ports What is ad-hoc mode? When a wireless network is set to ad-hoc mode, the wireless-equipped computers are configured to communicate directly with each other. The ad-hoc wireless network will not communicate with any wired network. What is infrastructure mode? When a wireless network is set to infrastructure mode, the wireless network is configured to communicate with a wired network through a wireless access point. What is roaming? Roaming is the ability of a portable computer to communicate continuously while moving freely throughout an area greater than that covered by a single access point. Before using the roaming function, the user must make sure that the computer uses the same channel number that is used by the access point of the dedicated coverage area. To achieve true seamless connectivity, the wireless LAN must incorporate a number of different functions. Each node and access point, for example, must always acknowledge receipt of each message. Each node must maintain contact with the wireless network even when not actually transmitting data. Achieving these functions simultaneously requires a dynamic RF networking technology that links access points and nodes. In such a system, the user's end node undertakes a search for the best possible access to the system. First, it evaluates such factors as signal strength and quality, as well as the message load currently being carried by each access point and the distance of each access point to the wired backbone. Based on that information, the node next selects the right access point and registers its address. Communications between end node and host computer can then be transmitted up and down the backbone. As the user moves on, the end node's RF transmitter regularly checks the system to determine whether it is in touch with the original access point or whether it should seek a new one. When a node no longer receives Appendix A: Troubleshooting 75 Frequently Asked Questions