SWRU423A July   2015  – May 2016 WL1801MOD , WL1805MOD , WL1807MOD , WL1831MOD , WL1835MOD , WL1837MOD

 

  1.   WiLink 8 WLAN Features Guide
    1.     Trademarks
    2. 1 Introducion
      1. 1.1 Scope
      2. 1.2 Acronyms Table
      3. 1.3 WiLink 8 Specification
    3. 2 General Features
      1. 2.1  Supported Rates
        1. 2.1.1 11b Rates
        2. 2.1.2 11a/g Rates
      2. 2.2  High-Throughput (HT) Features
        1. 2.2.1 11n Rates
        2. 2.2.2 MIMO at 2.4 GHz
        3. 2.2.3 40-MHz BW Operation
        4. 2.2.4 A-MPDU and A-MSDU
        5. 2.2.5 RIFS
        6. 2.2.6 BA Sessions
        7. 2.2.7 Greenfield
      3. 2.3  Quality of Service (QoS)
      4. 2.4  Protection Types
        1. 2.4.1 General
        2. 2.4.2 Protection Methods
      5. 2.5  Suspend and Resume
      6. 2.6  WoW (Wake on WLAN)
      7. 2.7  Set TX Power
      8. 2.8  5-GHz Antenna Diversity
      9. 2.9  Wi-Fi – Bluetooth/Bluetooth Smart Coexistence
      10. 2.10 Wi-Fi – ZigBee Coexistence
      11. 2.11 Accurate Synchronization Over Wi-Fi
    4. 3 Single Role: Station
      1. 3.1  Scanning
        1. 3.1.1 One-Shot Scan
        2. 3.1.2 Connection Scan
        3. 3.1.3 Background Scan
      2. 3.2  Connection
        1. 3.2.1 Manual (Via Commands)
          1. 3.2.1.1 Connection Time
          2. 3.2.1.2 Connection Success Rate
          3. 3.2.1.3 Connect to Best BSSID of the Configured SSID
        2. 3.2.2 Automatic (Via Profiles)
        3. 3.2.3 Wi-Fi Protected Setup (WPS)
          1. 3.2.3.1 WPS PBC
          2. 3.2.3.2 WPS PIN
      3. 3.3  Disconnection
      4. 3.4  DHCP Client
      5. 3.5  Security
        1. 3.5.1 Authentication Types
        2. 3.5.2 Encryption Types
        3. 3.5.3 Broadcast Key Rotation (BKR)
      6. 3.6  Filtering
        1. 3.6.1 Beacon Filtering
        2. 3.6.2 Multicast Filtering
      7. 3.7  Auto ARP
      8. 3.8  Preferred Networks (Profiles)
        1. 3.8.1 Hidden Network
      9. 3.9  Power-Save Mode
        1. 3.9.1 Active
        2. 3.9.2 Auto Power-Save Mode
        3. 3.9.3 Forced Power-Save Mode
      10. 3.10 Power-Save Delivery Protocols
        1. 3.10.1 Legacy
        2. 3.10.2 U-APSD
      11. 3.11 Keep-Alive Mechanism
      12. 3.12 Smart Config
      13. 3.13 Regulatory Domain
      14. 3.14 DFS Slave (Channel Switch)
      15. 3.15 Roaming
        1. 3.15.1 Roaming Mechanism
          1. 3.15.1.1 Mechanism Enabling
          2. 3.15.1.2 Roaming Candidates List
          3. 3.15.1.3 A Decision to Roam
          4. 3.15.1.4 Connection to a Better AP
        2. 3.15.2 Roaming Triggers
          1. 3.15.2.1 RSSI Level Delta
          2. 3.15.2.2 APs Disappearing
    5. 4 Single Role: AP
      1. 4.1  Connection
      2. 4.2  Hidden SSID
      3. 4.3  Security
      4. 4.4  Regulatory Domain
      5. 4.5  AP Scan
      6. 4.6  Automatic Channel Selection (ACS)
        1. 4.6.1 40-MHz Operation
        2. 4.6.2 ACS Whitelist and Blacklist Channels
      7. 4.7  Maximum Connected Stations
      8. 4.8  Aging
      9. 4.9  DFS Master
        1. 4.9.1 DFS Standards
        2. 4.9.2 DFS Mechanism
        3. 4.9.3 WiLink8.0 DFS Master Capabilities
      10. 4.10 Access Control
        1. 4.10.1 Blacklist
        2. 4.10.2 Whitelist
      11. 4.11 Extreme Low Power (ELP)
    6. 5 Single Role: P2P
      1. 5.1 P2P Device
        1. 5.1.1 Searching Phase
        2. 5.1.2 Negotiation
        3. 5.1.3 Group Formation
      2. 5.2 PSP Client
      3. 5.3 P2P GO
    7. 6 Single Role: Mesh
      1. 6.1 Supported Modes
        1. 6.1.1 Mesh Point
        2. 6.1.2 Mesh Portal/Gate
        3. 6.1.3 Mesh Access Point
      2. 6.2 Hardware and Software Requirements
        1. 6.2.1 Hardware requirements
        2. 6.2.2 Software Requirements
      3. 6.3 Capabilities
    8. 7 Multi-Role
      1. 7.1 General Overview
      2. 7.2 Limitations
    9. 8 Performance
      1. 8.1 Single-Role
      2. 8.2 Multi-Role
      3. 8.3 AP and mBSSID (Dual AP) Fairness
        1. 8.3.1 AP Fairness: 1-to-10 Stations Throughput Distribution
        2. 8.3.2 mBSSID Fairness: 10 Stations Throughput Distribution
      4. 8.4 Bluetooth WLAN Coexistence
        1. 8.4.1 WLAN Single Role – Bluetooth Performance
  2.   Revision History

Wi-Fi Protected Setup (WPS)

The WPS method is an additional way to establish a Wi-Fi connection. The WPS-capable devices declare this capability in the beacons and probes. In this method, the connection is secured and the data exchange encrypted. The WPS connection method is invoked in two ways: hardware and software. Both the hardware and the software processes are invoked using one of two WPS connection methods: PBC or PIN. When one device has started a WPS connection process, the second device has two minutes to respond to the connection initiator device. After two minutes, the connection initiator stops the process.

An advantage in either WPS method is that the secured Wi-Fi network can be joined without knowing the privacy key.

A disadvantage is that during the WPS connection process, no specific SSID is defined. This limitation can result in a situation where two independent stations start a WPS process concurrently, for example, within the two minute time frame, and the peer station will not know which of them to connect to. This situation is called WPS overlapping. The peer station is only able to connect when one station terminates the WPS connection process.