Verizon FiOS 9100VM User Manual page 45

Verizon fios router
Table of Contents

Advertisement

Verizon FiOS Router (Model 9100VM)
Beacon Interval
(in milliseconds)
DTIM Interval
(in milliseconds)
Fragmentation Threshold
RTS Threshold
Wireless Security
Stations Security Type
Authentication Method
030-300239 Rev. A
Select cts_only to activate this feature.
Select cts_rts to activate this feature.
Enter the beacon interval value.
The beacon interval is the time between beacon frame transmissions. Beacons are
transmitted by the Router to help identify wireless networks. Beacons contain rate and
capability information. Beacons received by stations can be used to identify the wireless
access points in the area.
Enter the DTIM (Delivery Traffic Indication Message) interval value. A DTIM is a
countdown mechanism for the Router. It informs wireless network clients of the next
window for listening to broadcast and multicast messages.
Setting the fragmentation threshold can increase the reliability of frame transmissions on
the wireless network. Any MAC Service Data Unit (MSDU) or MAC Protocol Data Unit
(MPDU) larger than this value will be fragmented into an MPDU of the specified size.
Enter the RTS (Request to Send) threshold. This setting controls what size data packet the
low level RF protocol issues to an RTS packet.
RTS/CTS handshaking will be performed for any data or management MPDU containing a
number of bytes greater than the threshold. If this value is larger than the MSDU size
(typically set by the fragmentation threshold), no handshaking will be performed. A value
of zero will enable handshaking for all MPDUs.
When this feature is enabled (the box contains a check mark), wireless security is activated,
and the security type can be configured.
When the box is clear, wireless security is deactivated. By factory default, Wireless
Security is disabled.
Set the type of security for the Router's wireless network. Choose from the following
options: WPA, WPA2, WPA and WPA2, 802.1x WEP, Non-802.1x WEP, Authentication
Only. Details on these options are discussed later in this section.
This is the authentication method used with the security type.
45
User Guide
March 2008

Advertisement

Table of Contents
loading

Table of Contents