Tl-Wa854Re: 300Mbps Universal Wifi Range Extender
Tl-Wa854Re: 300Mbps Universal Wifi Range Extender
Tl-Wa854Re: 300Mbps Universal Wifi Range Extender
REV.:1.1.0
1910011043
http://www.tp-link.com
This equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection
against harmful interference in a residential installation. This equipment generates, uses and can
radiate radio frequency energy and, if not installed and used in accordance with the instructions,
may cause harmful interference to radio communications. However, there is no guarantee that
interference will not occur in a particular installation. If this equipment does cause harmful
interference to radio or television reception, which can be determined by turning the equipment off
and on, the user is encouraged to try to correct the interference by one or more of the following
measures:
This device complies with part 15 of the FCC Rules. Operation is subject to the following two
conditions:
Any changes or modifications not expressly approved by the party responsible for compliance
could void the user’s authority to operate the equipment.
Note: The manufacturer is not responsible for any radio or tv interference caused by unauthorized
modifications to this equipment. Such modifications could void the user’s authority to operate the
equipment.
“To comply with FCC RF exposure compliance requirements, this grant is applicable to only
Mobile Configurations. The antennas used for this transmitter must be installed to provide a
separation distance of at least 20 cm from all persons and must not be co-located or operating in
conjunction with any other antenna or transmitter.”
This is a class B product. In a domestic environment, this product may cause radio interference, in
which case the user may be required to take adequate measures.
第十二條 經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用者均不得擅自變更頻
率、加大功率或變更原設計之特性或功能。
第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通行;經發現有干擾現象時,應立
即停用,並改善至無干擾時方得繼續使用。前項合法通信,指依電信規定作業之無線電信。低功率
射頻電機需忍受合法通信或工業、科學以及醫療用電波輻射性電機設備之干擾。
減少電磁波影響,請妥適使用。
安全諮詢及注意事項
●請使用原裝電源供應器或只能按照本產品注明的電源類型使用本產品。
●注意防潮,請勿將水或其他液體潑灑到本產品上。
●插槽與開口供通風使用,以確保本產品的操作可靠並防止過熱,請勿堵塞或覆蓋開口。
●請勿將本產品置放於靠近熱源的地方。除非有正常的通風,否則不可放在密閉位置中。
●請不要私自打開機殼,不要嘗試自行維修本產品,請由授權的專業人士進行此項工作。
Safety Information
z When product has power button, the power button is one of the way to shut off the product;
when there is no power button, the only way to completely shut off power is to disconnect the
product or the power adapter from the power source.
z Don’t disassemble the product, or make repairs yourself. You run the risk of electric shock
and voiding the limited warranty. If you need service, please contact us.
z Avoid water and wet locations.
DECLARATION OF CONFORMITY
For the following equipment:
Product Description: 300Mbps Universal WiFi Range Extender
Model No.: TL-WA854RE
Trademark: TP-LINK
We declare under our own responsibility that the above products satisfy all the technical
regulations applicable to the product within the scope of Council Directives:
Directives 1999/5/EC, Directives 2004/108/EC, Directives 2006/95/EC, Directives 1999/519/EC,
Directives 2011/65/EU
The above product is in conformity with the following standards or other normative documents
ETSI EN 300 328 V1.7.1: 2006
EN 55022:2010
EN 55024:2010
EN 61000-3-2:2006+A1:2009+A2:2009
EN 61000-3-3:2008
EN 60950-1:2006+A11:2009+A1:2010+A12:2011
EN 62311:2008
Yang Hongliang
Package Contents
The following items should be found in your package:
¾ TL-WA854RE 300Mbps Universal WiFi Range Extender
¾ Quick Installation Guide
¾ Resource CD for TL-WA854RE 300Mbps Universal WiFi Range Extender, including:
z This User Guide
) Note:
Make sure that the package contains the above items. If any of the listed items is damaged or
missing, please contact your distributor.
Conventions
The Range Extender, the Device or TL-WA854RE mentioned in this User guide stands for
TL-WA854RE 300Mbps Universal WiFi Range Extender without any explanations.
Parameters provided in the pictures are just references for setting up the product, which may differ
from the actual situation. You can set the parameters according to your demand.
The power plug may differ from the picture illustrated in this UG due to different regional power
specifications. As follows we just take that of EU version for example.
Chapter 1 Introduction
1.1 Product Overview
The TL-WA854RE 300Mbps Universal WiFi Range Extender is dedicated to Small Office/Home
Office (SOHO) wireless network solutions. It will enlarge your existing wireless network and
mobility within your wireless network while also allowing you to connect a wired device to a
wireless environment. Increased mobility and the absence of cabling will be beneficial for your
network.
With using IEEE 802.11n wireless technology, this device can transmit wireless data at the rate of
up to 300Mbps. With multiple protection measures, including wireless LAN 64/128/152-bit WEP
encryption, Wi-Fi protected Access (WPA2-PSK, WPA-PSK), the TL-WA854RE 300Mbps
Universal WiFi Range Extender delivers complete data privacy.
It supports an easy wireless connection to the root AP (equipped with WPS/QSS button) by
pressing the RE button on the front panel. It also supports an easy, web-based setup for
installation and management. Even though you may not be familiar with the Range Extender, you
can easily configure it with the help of this Guide. Before installing the Range Extender, please
look through this Guide to get the full information of the TL-WA854RE 300Mbps Universal WiFi
Range Extender.
1.3 Appearance
Figure 1-1
z LED Explanation:
Table 1-1
2) No Obstacles and Spacious - Clear obstacles in the way between TL-WA854RE and
Wireless router. It’s better to locate it in a spacious place, such as near the corridors.
3) No Interference - Keep TL-WA854RE far away from wireless interference, which may come
from electrical appliances that works in the same frequency band as TL-WA854RE, such as
Blue tooth devices, cordless phones, microwave ovens, etc.
4) 3 Signal Lights - You can also find an ideal location via the signal lights on the front panel of
TL-WA854RE. These lights show the strength of signal your range extender receives from
the root AP. It's recommended that you choose a location where at least 3 signal lights light
blue, in order to guarantee a good performance.
) Note:
TP-LINK recommends that you connect to the Range Extender when your home network
connection is poor, or when you want a larger wireless coverage to eliminate “dead zones”. As in
compliance with the wireless transmission protocol, all the Range Extender devices are set to
work in half-duplex instead of full-duplex mode. In other words, the Range Extender has to
process one-way communication between your root Wireless router (or AP) and the terminal
clients; so the transmission time will be double-increased, while the speed will be decreased.
) Note:
If the above screen does not prompt, it means that your web-browser has been set to a proxy.
Go to Tools menu>Internet Options>Connections>LAN Settings, in the screen that
appears, cancel the Using Proxy checkbox, and click OK to finish it.
2. After successful login, there will pop up the Quick Setup Start page. Click Next to get the
quick setup started.
5. A list of available wireless network will appear. Check the box before the SSID of your desired
network, and then click Next.
) Note:
If you could not find your wireless network name (SSID) in the list, you can click Rescan to
redetect it or tick the checkbox before "Set SSID and MAC Manually" to manually configure
the wireless settings.
6. Wireless Settings page will appear as shown in Figure 3-7. Enter the WiFi Password of your
main router/AP, name your range extender WiFi network or keep it default, and then click
Next to continue.
7. Double-check your wireless setting and network setting, when Figure 3-8 appears. If verified,
click Finish to complete the Quick Setup. If there is anything wrong, click Back to return the
previous pages and reconfigure it.
8. When the Range Extender is applying the wireless settings (as shown in Figure 3-9), please
wait for a while patiently until Figure 3-10 appears. Then you have successfully extended the
root device’s wireless signal.
4.1 Status
Selecting Status will enable you to view the Range Extender’s current status and configuration, all
of which are read-only.
z WiFi Name - The Range Extender's wireless network name (also called SSID) which
your PC and other wireless device can be connected to.
z MAC Address - The physical address of the system.
z DHCP Server - It shows the current status of the DHCP Server of the Range Extender.
z Channel - The current wireless channel in use.
10
z Wireless Connection – It shows whether the Range Extender is connected to the Main
Router/AP by Wireless.
z IP Address –The IP address of the Range Extender.
z Type – The Range Extender's IP address Type.
z Signal Received From Main Router/AP - This is the signal strength the Range
Extender received from the Main Router/AP.
z Wireless Rate To Main Router/AP - This is the real wireless rate between the Range
Extender and the Main Router/AP.
¾ Main Router/AP Info - This part shows you the current information of the Main Router/AP.
z WiFi Name - This is the WiFi name of the Main Router/AP (The Main Router/AP is
usually your router or access point or gateway).
z MAC Address - The MAC address of the main Router or AP.
z Internet Access - It shows whether the Main Router/AP has access to the Internet.
¾ System Up Time - The length of the time since the device was last powered on or reset.
¾ Firmware Version - This field displays the current firmware version of the Range Extender.
¾ Hardware Version - This field displays the current hardware version of the Range Extender.
Click the Refresh button to get the latest status and settings of the device.
4.3 Profile
Profile function can help you remember previously connected wireless networks.
You can Edit, Delete or Add profiles in this page (as shown in Figure 4-2) for your convenient
reconnection later on.
11
z MAC of Root Device - The MAC of your root device this profile will connect to.
z Wireless Security - The security type of your root wireless networks this profile will refer
to. Please make sure it's the same as the root AP's.
z Wireless Password - The wireless password of your root AP. Please make sure it's the
same as your root AP.
Click Save to save this profile in the profile list and go back to the Profile List page.
Click Back to go back to the Profile List page, without saving any configuration on this page.
3. After you’ve set and saved the profile, it will return to the profile list page and display as in
Figure 4-4.
12
Click Edit to further edit the profile(s), or Delete to delete the profile(s).
Click Connect to connect the range extender to the wireless network that you have chosen in
the profile list.
Click Add to add a new profile to the list.
Click Delete All to delete all the information in the profile list.
4.4 Network
The Network option allows you to customize your local network manually by changing the default
settings of the Range Extender. There are three submenus under the DHCP menu: LAN, DHCP
Settings and DHCP Client List. Clicking one of them will enable you to configure the
corresponding function. The detailed explanations for each submenu are provided below.
4.4.1 LAN
Selecting Network > LAN will enable you to configure the IP parameters of Network on this page.
13
¾ MAC Address - The physical address of the LAN port, as seen from the LAN. The value
cannot be changed.
¾ Type - Several IP types are supported, including: (1) Dynamic IP; (2) Static IP, and they are
explained below.
z Dynamic IP - In this type, if your range extender have connected to a router, your client
will dynamically get a IP Address/Gateway from the router, otherwise the client will get a
IP Address/Gateway in the same network as you set below. And this type is
recommended.
z Static IP - In this type, you can configure IP Address/Gateway manually.
¾ IP Address - Enter the IP address of your Range Extender in dotted-decimal notation (factory
default setting is 192.168.0.254).
¾ Subnet Mask - An address code that determines the size of the network. Normally use
255.255.255.0 as the subnet mask.
¾ Gateway - The gateway should be in the same subnet as your IP address.
) Note:
1. The IP parameters cannot be configured if you have chosen Dynamic IP. In this situation the
device will automatically configure the IP parameters appropriate to your need.
2. If you are not familiar with the setting items in this page, it's strongly recommended to keep
the provided default values, otherwise may result in lower wireless network performance or
even can't work.
3. If you choose Static IP, the domain name log in function won't work, and you have to use the
IP you set to log in the Range Extender's web based utility.
) Note:
The DHCP Settings function cannot be configured if you have chosen Dynamic IP in Network ->
LAN, in which situation the device will help you configure the DHCP automatically as you need.
The DHCP Settings page will appear as Figure 4-8.
14
15
¾ Address Lease Time - Enter the amount of time for the PC to connect to the Range Extender
with its current assigned dynamic IP address. The time is measured in minutes. After the time
is up, the PC will be automatically assigned a new dynamic IP address. The range of the time
is 1 ~ 2880 minutes. The default value is 120 minutes.
¾ Default Gateway (optional) - Enter the IP address of the gateway for your LAN. The factory
default setting is 0.0.0.0.
¾ Default Domain (optional) - Enter the domain name of the your DHCP server. You can leave
the field blank.
¾ Primary DNS (optional) - Enter the DNS IP address provided by your ISP. Consult your ISP
if you don’t know the DNS value. The factory default setting is 0.0.0.0.
¾ Secondary DNS (optional) - Enter the IP address of another DNS server if your ISP provides
two DNS servers. The factory default setting is 0.0.0.0.
Click Save to save the changes.
) Note:
To use the DHCP server function of the device, you should configure all computers in the LAN as
"Obtain an IP Address automatically" mode. This function will not take effect until the device
reboots.
4.5 Wireless
The Wireless option, improving functionality and performance for wireless network, can help you
make the Range Extender an ideal solution for your wireless network. Here you can create a
16
wireless local area network just through a few settings. Wireless Settings is used for the
configuration of some basic parameters of the Range Extender. Wireless Security provides three
different security types to secure your data and thus provide greater security for your wireless
network. MAC filtering allows you to control the access of wireless stations to the Range Extender.
Wireless Advanced allows you to configure some advanced parameters for the Range Extender.
Throughput Monitor helps to watch wireless throughput information Wireless statistics enables you
to get detailed information about the current connected wireless stations.
There are six submenus under the Wireless menu (shown in Figure 4-12): Wireless Settings,
Wireless Security, Wireless MAC Filtering, Wireless Advanced, Wireless Statistics and
Throughput Monitor. Click any of them, and you will be able to configure the corresponding
function. The detailed explanations for each submenu are provided below.
¾ Operation Mode - Two Operation Modes are supported in most of regions, including
Universal Mode and WDS Mode. And some regions also support Proxy Mode.
z Universal Mode - The range extender is compatible with most routers and access points
in this mode.
17
z WDS Mode - Please choose this mode if your main router or access point works in WDS
mode (uses a 4-address frame format to interact with stations).
z Proxy Mode - This mode has the best compatibility with routers and access points of all
brands. If your range extender has problem working in Universal Mode and WDS Mode,
please choose Proxy Mode. However, it may decrease the overall performance.
¾ Region - Select your region from the drop-down list. This field specifies the region where the
wireless function of this device can be used. It may be illegal to use the wireless function of
this device in a region while you chose a different region in the drop-down list. If your country
or region is not listed, please contact your local government agency for assistance.
¾ Survey - Click this button, you can search the AP which runs in the current channel.
¾ Main Router/AP WiFi Network Name (SSID) - The SSID of the AP your device is going to
connect to as a client. You can also use the search function to select the SSID to join.
¾ MAC Address of Main Router/AP - The BSSID of the AP your device is going to connect to
as a client. You can also use the search function to select the BSSID to join.
¾ Range Extender WiFi Network Name (SSID) - The wireless network name (also called SSID)
of the device which your PC or other device can be connected to.
¾ Channel Width - The bandwidth of the wireless channel.
To apply any settings you have altered on the page, please click the Save button, and then you
will be reminded to reboot the device.
18
19
• WEP Key Format - You can select ASCII or Hexadecimal format. ASCII format stands
for any combination of keyboard characters in the specified length. Hexadecimal format
stands for any combination of hexadecimal digits (0-9, a-f, A-F) in the specified length.
• WEP Key - Select which of the four keys will be used and enter the matching WEP key
information for your network in the selected key radio button. These values must be
identical on all wireless stations in your network.
• Key Type - You can select the WEP key length (64-bit, or 128-bit, or 152-bit.) for
encryption. "Disabled" means this WEP key entry is invalid.
1) For 64-bit encryption - You can enter 10 hexadecimal digits (any combination of 0-9,
a-f, A-F, zero key is not permitted) or 5 ASCII characters.
2) For 128-bit encryption - You can enter 26 hexadecimal digits (any combination of
0-9, a-f, A-F, zero key is not permitted) or 13 ASCII characters.
3) For 152-bit encryption - You can enter 32 hexadecimal digits (any combination of
0-9, a-f, A-F, zero key is not permitted) or 16 ASCII characters.
) Note:
If you do not set the key, the wireless security function is still disabled even if you have
selected Shared Key as Authentication Type.
Be sure to click the Save button to save your settings on this page.
20
¾ Wireless MAC Filtering - Click the Enable button to trigger the Wireless MAC Address
Filtering function. The default setting is disabled.
To Add a Wireless MAC Address filtering entry, click the Add New… button. The “Add or Modify
Wireless MAC Address Filtering entry" page will appear, shown in Figure 4-16.
¾ MAC Address - Enter the wireless station's MAC address that you want to control.
¾ Description - Give a simple description of the wireless station.
¾ Status - Select a status for this entry, either Enabled or Disabled.
21
Click the Next button to go to the next page and click the Previous button to return to the previous
page.
For example: If you desire that the wireless station A with MAC address 00-0A-EB-00- 07-BE is
able to access the device, while all other wireless stations cannot access the device, you should
configure the Wireless MAC Address Filtering list by following these steps:
1. Click the Enable button to enable this function.
2. Select the radio button: Deny the stations not specified by any enabled entries in the list
to access for Filtering Rules.
3. Delete all or disable all entries if there are any entries already.
4. Click the Add New... button and enter the MAC address 00-0A-EB-00-07-BE in the MAC
Address field, enter Wireless Station A in the Description field and select Enabled in the
Status pull-down list. Click the Save button.
The filtering rules that configured should be similar to the following list:
) Note:
If you enable the function and select the “Deny the stations not specified by any enabled
entries in the list to access” for Filtering Rules, and there are not any enabled entries in the list,
thus, no wireless stations can access the device.
22
¾ Beacon Interval - Specifies a value between 40-1000 milliseconds. The beacons are the
packets sent by the device to synchronize a wireless network. Beacon Interval value
determines the time interval of the beacons. The default value is 100.
¾ RTS Threshold - Specifies the RTS (Request to Send) Threshold. If the packet is larger
than the specified RTS Threshold size, the device will send RTS frames to a particular
receiving station and negotiate the sending of a data frame. The default value is 2346.
¾ Fragmentation Threshold - This value is the maximum size determining whether packets
will be fragmented. Setting the Fragmentation Threshold too low may result in poor network
performance since excessive packets. 2346 is the default setting and is recommended.
¾ DTIM Interval - Determines the interval of the Delivery Traffic Indication Message (DTIM).
You can specify the value between 1-255 Beacon Intervals. The default value is 1, which
indicates the DTIM Interval is the same as Beacon Interval.
¾ Enable WMM - WMM function can guarantee the packets with high- priority messages being
transmitted preferentially. It is strongly recommended enabled.
¾ Enable Short GI - This function is recommended for it will increase the data capacity by
reducing the guard interval time.
¾ Enable AP Isolation - Isolates all connected wireless stations so that wireless stations
cannot access each other through WLAN.
23
You cannot change any of the values on this page. To update this page and to show the current
connected wireless stations, click the Refresh button.
If the numbers of connected wireless stations go beyond one page, click the Next button to go to
the next page and click the Previous button to return the previous page.
) Note:
This page will be refreshed automatically every 5 seconds.
24
secure one because it controls access to the device’s web-based management page. Besides,
you can find out what happened to the system in System Log.
There are six submenus under the System Tools menu (shown as Figure 4-20): Firmware
Upgrade, Factory Defaults, Backup & Restore, Reboot, Password, and System Log. Clicking
any of them will enable you to configure the corresponding function. The detailed explanations for
each submenu are provided below.
) Note:
1. There is no need to upgrade the firmware unless the new firmware has a new feature you
want to use. However, when experiencing problems caused by the device itself, you can try to
upgrade the firmware.
2. Before upgrading the device’s firmware, you should write down some of your customized
settings to avoid losing important configuration settings of device.
25
2. Enter the path name or click Browse… to select the downloaded file on the computer into the
File blank.
3. Click Upgrade.
) Note:
Do not turn off the device or press the Reset button while the firmware is being upgraded. The
device will reboot after the Upgrading has been finished.
) Note:
Any settings you have saved will be lost when the default settings are restored.
26
• Click Restore to update the configuration with the file whose path is the one you have input or
selected in the blank.
) Note:
The current configuration will be covered with the uploading configuration file. Wrong process will
lead this device unmanaged. The restoring process lasts for 20 seconds and this device will restart
automatically then. Keep the power of this device on during the process, in case of any damage.
4.6.4 Reboot
Selecting System Tools > Reboot allows you to reboot the device on the screen shown in Figure 4-24.
27
4.6.5 Password
Selecting System Tools > Password allows you to change the factory default user name and
password of the device on the screen shown in Figure 4-25.
) Note:
The new user name and password must not exceed 14 characters in length and must not include
any spaces. Enter the new Password twice to confirm it.
Click Save when finished.
Click Clear All to clear all.
28
¾ Log Type - By selecting the log type, only logs of this type will be shown.
¾ Log Level - By selecting the log level, only logs of this level will be shown.
Click the Refresh button to show the latest log list.
Click the Save Log button to save all the logs in a txt file.
Click the Clear Log button to delete all the logs from the system permanently, not just from the
page.
Click the Next button to go to the next page, or click the Previous button return to the previous
page.
29
Username admin
Password admin
IP Address 192.168.0.254
Domain http://tplinkextender.net
Wireless
SSID TP-LINK_Extender_XXXXXX
) Note:
The default SSID is TP-LINK_Extender_XXXXXX (XXXXXX indicates the last unique six
characters of each device’s MAC address). This value is case-sensitive.
30
Appendix B: Troubleshooting
T1. How do I restore my Range Extender’s configuration to its factory default settings?
There are TWO methods available to restore the factory defaults.
Method 1:
With the Range Extender TL-WA854RE powered on, use a pin to press and hold the RESET
button on the rear panel for more than 8 seconds before releasing it.
Method 2:
Get logged in to the web-based management page of TL-WA854RE, then go to “System
Tools -> Factory Defaults” and click “Restore”.
) Note:
Once the Range Extender is reset, the current configuration settings will be lost and you will
need to reconfigure it.
31
T4. How can I know that my wireless signal has been repeated and boosted by
TL-WA854RE?
An easy way is to compare the signal strength of your target wireless network (symbolized by
its SSID), with TL-WA854RE in operation vs. out of operation. Before comparison, you’d
better make sure your computer can obtain an IP address from your target wireless network
and thus access the Internet, either via TL-WA854RE or without.
T5. Why does the wireless transmission rate speed down, while the wireless signal is
stronger after repeated by TL-WA854RE?
In compliance with the wireless transmission protocol, all the Range Extender devices are set
to work in half-duplex instead of full-duplex mode. In other words, the Range Extender has to
process one-way communication between your root Wireless router (or AP) and the terminal
clients; so the transmission time will be double-increased, while the speed will be decreased.
TP-LINK recommends that you connect to the Range Extender when your home network
connection is poor, or when you want a larger wireless coverage to eliminate “dead zones”.
32
Appendix C: Specifications
General
Standards and Protocols IEEE 802.3, 802.3u, 802.11n, 802.11b and 802.11g, TCP/IP, DHCP
Wireless
11n:up to 300Mbps(Automatic)
Radio Data Rate 11g:54/48/36/24/18/12/9/6M(Automatic)
11b:11/5.5/2/1M(Automatic)
33
Appendix D: Glossary
¾ 802.11b - The 802.11b standard specifies a wireless networking at 11 Mbps using
direct-sequence spread-spectrum (DSSS) technology and operating in the unlicensed radio
spectrum at 2.4GHz, and WEP encryption for security. 802.11b networks are also referred to
as Wi-Fi networks.
¾ 802.11g - specification for wireless networking at 54 Mbps using direct-sequence
spread-spectrum (DSSS) technology, using OFDM modulation and operating in the
unlicensed radio spectrum at 2.4GHz, and backward compatibility with IEEE 802.11b devices,
and WEP encryption for security.
¾ 802.11n - 802.11n builds upon previous 802.11 standards by adding MIMO (multiple-input
multiple-output). MIMO uses multiple transmitter and receiver antennas to allow for increased
data throughput via spatial multiplexing and increased range by exploiting the spatial diversity,
perhaps through coding schemes like Alamouti coding. The Enhanced Wireless Consortium
(EWC) was formed to help accelerate the IEEE 802.11n development process and promote a
technology specification for interoperability of next-generation wireless local area networking
(WLAN) products.
¾ Access Point (Range Extender) - A wireless LAN transceiver or "base station" that can
connect a wired LAN to one or many wireless devices. Access points can also bridge to each
other.
¾ DNS (Domain Name System) – An Internet Service that translates the names of websites into
IP addresses.
¾ Domain Name - A descriptive name for an address or group of addresses on the Internet.
¾ DoS (Denial of Service) - A hacker attack designed to prevent your computer or network from
operating or communicating.
¾ DSL (Digital Subscriber Line) - A technology that allows data to be sent or received over
existing traditional phone lines.
¾ ISP (Internet Service Provider) - A company that provides access to the Internet.
¾ MTU (Maximum Transmission Unit) - The size in bytes of the largest packet that can be
transmitted.
¾ SSID - A Service Set Identification is a thirty-two character (maximum) alphanumeric key
identifying a wireless local area network. For the wireless devices in a network to
communicate with each other, all devices must be configured with the same SSID. This is
typically the configuration parameter for a wireless PC card. It corresponds to the ESSID in
the wireless Access Point and to the wireless network name.
¾ WEP (Wired Equivalent Privacy) - A data privacy mechanism based on a 64-bit or 128-bit or
152-bit shared key algorithm, as described in the IEEE 802.11 standard.
¾ Wi-Fi –A trademark of the Wi-Fi Alliance and the brand name for products using the IEEE
802.11 family of standards.
¾ WLAN (Wireless Local Area Network) - A group of computers and associated devices
communicate with each other wirelessly, which network serving users are limited in a local
area.
34
¾ WPA (Wi-Fi Protected Access) - WPA is a security technology for wireless networks that
improves on the authentication and encryption features of WEP (Wired Equivalent Privacy). In
fact, WPA was developed by the networking industry in response to the shortcomings of WEP.
One of the key technologies behind WPA is the Temporal Key Integrity Protocol (TKIP). TKIP
addresses the encryption weaknesses of WEP. Another key component of WPA is built-in
authentication that WEP does not offer. With this feature, WPA provides roughly comparable
security to VPN tunneling with WEP, with the benefit of easier administration and use. This is
similar to 802.1x support and requires a RADIUS server in order to implement. The Wi-Fi
Alliance will call this, WPA-Enterprise. One variation of WPA is called WPA Pre Shared Key
or WPA-Personal for short - this provides an authentication alternative to an expensive
RADIUS server. WPA-Personal is a simplified but still powerful form of WPA most suitable for
home Wi-Fi networking. To use WPA-Personal, a person sets a static key or "passphrase" as
with WEP. But, using TKIP, WPA-Personal automatically changes the keys at a preset time
interval, making it much more difficult for hackers to find and exploit them. The Wi-Fi Alliance
will call this, WPA-Personal.
35