Wireless Matrix: Difference between revisions
Jump to navigation
Jump to search
Line 5: | Line 5: | ||
===WDS Applicability Matrix=== | ===WDS Applicability Matrix=== | ||
The following matrix specifies possible ''WDS'' network setups for each '''wireless-protocol'''. | The following matrix specifies possible ''WDS'' network setups for each '''wireless-protocol'''. First column specifies possible WDS network structure. | ||
{| cellpadding="3" border="1" | {| cellpadding="3" border="1" | ||
! | ! !! ROS 802.11 !! nstreme !! nv2 | ||
|- | |- | ||
|'''AP-bridge'''*''' to AP-bridge'''||V|| || | |'''AP-bridge'''*''' to AP-bridge'''||V|| || |
Revision as of 13:19, 12 July 2011
Applicability Matrix General Information
- Applicability Matrix indicates type of wireless network when specific feature can be used.
- Note that there are 2 columns for 802.11 protocol: 802.11 specifies availability of mode in "pure" 802.11 network (when connecting to any vendor AP) and ROS 802.11 specifies availability of mode when connecting to RouterOS AP that implements necessary proprietary extensions for mode to work.
WDS Applicability Matrix
The following matrix specifies possible WDS network setups for each wireless-protocol. First column specifies possible WDS network structure.
ROS 802.11 | nstreme | nv2 | |
---|---|---|---|
AP-bridge* to AP-bridge | V | ||
AP-bridge to Station-WDS | V | V | V |
AP-bridge to WDS-Slave | V |
* - mode=ap-bridge applies to mode=bridge too.
Station Applicability Matrix
The following matrix specifies station modes available for each wireless-protocol. Table applies to RouterOS v5rc11 and above:
802.11 | ROS 802.11 | nstreme | nv2 | |
---|---|---|---|---|
station | V | V | V | V |
station-wds | V | V | V | |
station-pseudobridge | V | V | V | |
station-pseudobridge-clone | V | V | V | |
station-bridge | V | V | V |
Other Options Applicability Matrix
802.11 | ROS 802.11 | nstreme | nv2 | |
---|---|---|---|---|
Distance Setting | V | V | ||
Security Profile | V | V | V | - ** |
HW-Retries | V | V | V |
** - Nv2 protocol uses different security configuration.