User manual SMC WBR14S-3GN

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual SMC WBR14S-3GN. We hope that this SMC WBR14S-3GN user guide will be useful to you.

Lastmanuals help download the user guide SMC WBR14S-3GN.


Mode d'emploi SMC WBR14S-3GN
Download

You may also download the following manuals related to this product:

   SMC WBR14S-3GN annexe 1 (31 ko)
   SMC WBR14S-3GN FICHE TECHNIQUE (138 ko)

Manual abstract: user guide SMC WBR14S-3GN

Detailed instructions for use are in the User's Guide.

[. . . ] USER GUIDE BarricadeTM N Draft 11n Wireless 3G Broadband Router SMCWBR14S-3GN Draft 11n Wireless 3G Broadband Router User Guide SMC Networks U. S. A 20 Mason Irvine, CA 92618 Phone: (949) 679-8000 SMC Networks Europe C/Fructuós Gelabert 6-8, 2º, 2ª Edificio Conata II 08970 Sant Joan Despí, Barcelona, Spain Phone: +34 93 477 4920 March 2010 Pub. # 149100000029W E032010-AP-R02 Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for its use, nor for any infringements of patents or other rights of third parties which may result from its use. [. . . ] Default: auto) Reverse Direction Grant (RDG) -- When Reverse Direction Grant is enabled, the wireless 3G Broadband Router can reduce the transmitted data packet collision by using the reverse direction protocol. During TXOP (Transmission Opportunity) period, the receiver could use remaining transmission time to transmit data to a sender. The RDG improves transmission performance and scalability in a wireless environment. Aggregate MSDU (A-MSDU) -- This option enables Mac Service Data Unit (MSDU) aggregation. (Default: Disabled) Auto Block ACK -- Select to block ACK (Acknowledge Number) or not during data transferring. Decline BA Request -- Select to reject peer BA-Request or not. OTHER HT SETTINGS Figure 39: HT Physical Mode Settings HT TxStream ­ HT means High Throughput. The number of HT TxStream means how many antennas will transmit data simultaneously. Default: 2) HT RxStream ­ The number of HT RxStream means how many antennas will receive data simultaneously. Default: 2) ­ 68 ­ CHAPTER 7 | Wireless Configuration Advanced Settings ADVANCED SETTINGS The Advanced Settings page includes additional parameters concerning the wireless network and Wi-Fi Multimedia settings. NOTE: There are several variables to consider when selecting a radio mode that make it fully functional. Simply selecting the mode you want is not enough to ensure full compatibility for that mode. Information on these variables may be found in the HT Physcial Mode Setting section. ADVANCED WIRELESS The Advanced Wireless section on the Wireless Settings Advanced page includes additional radio parameters. Figure 40: Advanced Wireless Settings The following items are displayed in this section on this page: BG Protection Mode -- Enables a backward compatible protection mechanism for 802. 11b clients. There are three modes: (Default: Auto) Auto -- The unit enables its protection mechanism for 802. 11b clients when they are detected in the network. When 802. 11b clients are not detected, the protection mechanism is disabled. ­ 69 ­ CHAPTER 7 | Wireless Configuration Advanced Settings On -- Forces the unit to always use protection for 802. 11b clients, whether they are detected in the network or not. Note that enabling b/g Protection can slow throughput for 802. 11g/n clients by as much as 50%. Off -- Forces the unit to never use protection for 802. 11b clients. This prevents 802. 11b clients from connecting to the network. Beacon Interval -- The rate at which beacon signals are transmitted from the access point. The beacon signals allow wireless clients to maintain contact with the access point. They may also carry powermanagement information. (Range: 20-999 TUs; Default: 100 TUs) Data Beacon Rate (DTIM) -- The rate at which stations in sleep mode must wake up to receive broadcast/multicast transmissions. Known also as the Delivery Traffic Indication Map (DTIM) interval, it indicates how often the MAC layer forwards broadcast/multicast traffic, which is necessary to wake up stations that are using Power Save mode. The default value of one beacon indicates that the access point will save all broadcast/multicast frames for the Basic Service Set (BSS) and forward them after every beacon. [. . . ] SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 2. END OF TERMS AND CONDITIONS ­ 118 ­ GLOSSARY 10BASE-T IEEE 802. 3-2005 specification for 10 Mbps Ethernet over two pairs of Category 3 or better UTP cable. 100BASE-TX IEEE 802. 3-2005 specification for 100 Mbps Fast Ethernet over two pairs of Category 5 or better UTP cable. ACCESS POINT An internetworking device that seamlessly connects wired and wireless networks. Access points attached to a wired network, support the creation of multiple radio cells that enable roaming throughout a facility. AES Advanced Encryption Standard: An encryption algorithm that implements symmetric key cryptography. AES provides very strong encryption using a completely different ciphering algorithm to TKIP and WEP. AUTHENTICATION The process to verify the identity of a client requesting network access. IEEE 802. 11 specifies two forms of authentication: open system and shared key. BACKBONE The core infrastructure of a network. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE SMC WBR14S-3GN

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets...
In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service.

Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual SMC WBR14S-3GN will begin.

Search for a user manual

 

Copyright © 2015 - LastManuals - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.

flag