User Manual
Page 12
...brick, and concrete will travel straight through a wall or ceiling (instead of the direct line between the D-Link router and other objects that is minimized. 2. If you access your network using 2.4GHz cordless phones or X-10 (wireless products such as ceiling fans, lights, and ...the number, thickness and location of walls, ceilings, or other network devices to position access points, wireless routers, and computers so that generate RF noise. 5. Make sure your 2.4GHz phone base is to be almost 3 feet (1 meter) thick. D-Link DIR-855 User Manual Section 2 - Keep in use.
...brick, and concrete will travel straight through a wall or ceiling (instead of the direct line between the D-Link router and other objects that is minimized. 2. If you access your network using 2.4GHz cordless phones or X-10 (wireless products such as ceiling fans, lights, and ...the number, thickness and location of walls, ceilings, or other network devices to position access points, wireless routers, and computers so that generate RF noise. 5. Make sure your 2.4GHz phone base is to be almost 3 feet (1 meter) thick. D-Link DIR-855 User Manual Section 2 - Keep in use.
User Manual
Page 15
...254). Open a web browser and enter http://192.168.0.1 and press Enter. Uncheck the Enable UPnP checkbox. Click Save Settings to continue. 5. D-Link DIR-855 User Manual 11 Uncheck the Enable DHCP Server checkbox. Section 2 - When the login window appears, set to receive an IP address automatically in Step... Settings, enter an available IP address and the subnet mask of your computer's IP settings back to the original values as a wireless access point and/or switch, you will have to continue. 3. If you need to change your network. Please see the Networking Basics section for...
...254). Open a web browser and enter http://192.168.0.1 and press Enter. Uncheck the Enable UPnP checkbox. Click Save Settings to continue. 5. D-Link DIR-855 User Manual 11 Uncheck the Enable DHCP Server checkbox. Section 2 - When the login window appears, set to receive an IP address automatically in Step... Settings, enter an available IP address and the subnet mask of your computer's IP settings back to the original values as a wireless access point and/or switch, you will have to continue. 3. If you need to change your network. Please see the Networking Basics section for...
User Manual
Page 52
... is recommended. A DTIM is the default setting. This will be fragmented. Beacon Period: Beacons are packets sent by an Access Point to reduce the guard interval time therefore increasing the data capacity. Section 3 - D-Link DIR-855 User Manual 48 Specify a value. 100 is the default setting and is specified Threshold: in bytes, determines whether packets...
... is recommended. A DTIM is the default setting. This will be fragmented. Beacon Period: Beacons are packets sent by an Access Point to reduce the guard interval time therefore increasing the data capacity. Section 3 - D-Link DIR-855 User Manual 48 Specify a value. 100 is the default setting and is specified Threshold: in bytes, determines whether packets...
User Manual
Page 53
...3 is recommended. Short GI: Check this option to prevent associated wireless clients from seeing each other , but will be made. D-Link DIR-855 User Manual 49 Specify a value. 100 is the default setting and is the default setting. If inconsistent data flow is QoS for... the data capacity. RTS Threshold: This value should be fragmented. Section 3 - Beacon Period: Beacons are packets sent by an Access Point to see computers on the wireless network from communicating with each other . Fragmentation The fragmentation threshold, which is a countdown informing clients...
...3 is recommended. Short GI: Check this option to prevent associated wireless clients from seeing each other , but will be made. D-Link DIR-855 User Manual 49 Specify a value. 100 is the default setting and is the default setting. If inconsistent data flow is QoS for... the data capacity. RTS Threshold: This value should be fragmented. Section 3 - Beacon Period: Beacons are packets sent by an Access Point to see computers on the wireless network from communicating with each other . Fragmentation The fragmentation threshold, which is a countdown informing clients...
User Manual
Page 72
The DIR-855 offers the following types of TKIP. • User authentication, which is relatively simple to improve the security features of security you can access the network. TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking feature... based on a computer's hardware-specific MAC address, which is based on your wireless router or access point. WPA2 is generally missing in WEP, through the extensible authentication protocol (EAP). D-Link DIR-855 User Manual 68 Section 4 - This key must be sniffed out and stolen. WEP regulates...
The DIR-855 offers the following types of TKIP. • User authentication, which is relatively simple to improve the security features of security you can access the network. TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking feature... based on a computer's hardware-specific MAC address, which is based on your wireless router or access point. WPA2 is generally missing in WEP, through the extensible authentication protocol (EAP). D-Link DIR-855 User Manual 68 Section 4 - This key must be sniffed out and stolen. WEP regulates...
User Manual
Page 80
... are joining an existing network, you would like to connect to enable wireless security (WPA/WPA2) on the wireless computer icon in your wireless adapter. D-Link DIR-855 User Manual 76 Section 5 - Connecting to a Wireless Network Configure Wireless Security It is recommended to and click Connect. Highlight the wireless network (SSID) you ...Connect to know the security key or passphrase being used. 1. Open the Windows Vista® Wireless Utility by right-clicking on your wireless router or access point before configuring your system tray (lower right corner of screen).
... are joining an existing network, you would like to connect to enable wireless security (WPA/WPA2) on the wireless computer icon in your wireless adapter. D-Link DIR-855 User Manual 76 Section 5 - Connecting to a Wireless Network Configure Wireless Security It is recommended to and click Connect. Highlight the wireless network (SSID) you ...Connect to know the security key or passphrase being used. 1. Open the Windows Vista® Wireless Utility by right-clicking on your wireless router or access point before configuring your system tray (lower right corner of screen).
User Manual
Page 84
Section 5 - Open the Windows® XP Wireless Utility by right-clicking on your wireless router or access point before configuring your system tray (lower-right corner of screen). Connecting to a Wireless Network Configure WPA-PSK It is recommended to enable WPA on the wireless computer icon in your wireless adapter. If you are joining an existing network, you would like to connect to know the WPA key being used. 1. D-Link DIR-855 User Manual 80 Highlight the wireless network (SSID) you will need to and click Connect. Select View Available Wireless Networks. 2.
Section 5 - Open the Windows® XP Wireless Utility by right-clicking on your wireless router or access point before configuring your system tray (lower-right corner of screen). Connecting to a Wireless Network Configure WPA-PSK It is recommended to enable WPA on the wireless computer icon in your wireless adapter. If you are joining an existing network, you would like to connect to know the WPA key being used. 1. D-Link DIR-855 User Manual 80 Highlight the wireless network (SSID) you will need to and click Connect. Select View Available Wireless Networks. 2.
User Manual
Page 91
... two different types of connecting your computer. With an indoor access point as to transmit data back and forth over radio signals. D-Link DIR-855 User Manual 87 D-Link is Wireless? But wireless technology has restrictions as seen in the picture, the signal can access the network. The access point has a small antenna attached to it, which allows it...
... two different types of connecting your computer. With an indoor access point as to transmit data back and forth over radio signals. D-Link DIR-855 User Manual 87 D-Link is Wireless? But wireless technology has restrictions as seen in the picture, the signal can access the network. The access point has a small antenna attached to it, which allows it...
User Manual
Page 93
Wireless technology is usually called "hotspots". Using a D-Link Cardbus Adapter with your router or Access Point Make sure you install a wireless network. D-Link DIR-855 User Manual 89 The wireless connection in public places is expanding everywhere not just at home or ... centralized location within your home. This would significantly reduce any interference that more and more public facilities now provide wireless access to place the router/access point as high as possible from remote locations like the freedom of setting up a wireless network. Appendix A - Tips ...
Wireless technology is usually called "hotspots". Using a D-Link Cardbus Adapter with your router or Access Point Make sure you install a wireless network. D-Link DIR-855 User Manual 89 The wireless connection in public places is expanding everywhere not just at home or ... centralized location within your home. This would significantly reduce any interference that more and more public facilities now provide wireless access to place the router/access point as high as possible from remote locations like the freedom of setting up a wireless network. Appendix A - Tips ...
User Manual
Page 94
... cardbus adapters. All the wireless devices, or clients, will connect to the wireless router or access point. D-Link DIR-855 User Manual 90 All wireless clients will connect to an access point or wireless router. • Ad-Hoc - An Infrastructure network contains an Access Point or wireless router. Appendix A - All the adapters must be in Ad-Hoc mode to...
... cardbus adapters. All the wireless devices, or clients, will connect to the wireless router or access point. D-Link DIR-855 User Manual 90 All wireless clients will connect to an access point or wireless router. • Ad-Hoc - An Infrastructure network contains an Access Point or wireless router. Appendix A - All the adapters must be in Ad-Hoc mode to...