SBN

RTS Threshold Configuration for Improved Wireless Network Performance [Updated 2020]

In a scenario where a lot of users connect to a wireless network and where they occasionally lose their connections, an individual or a company can tweak the wireless router’s advanced settings to optimize the performance of users and solve the problem of some users unable to obtain an IP.

Most routers feature an “Advanced Settings” section that manages how data packets are handled on the network. The 802.11 standard includes the RTS (Request to Send) threshold function to control station access to the medium. Generally, high-end wireless LANs offer the RTS threshold in radio network interface cards (NICs) and access points — the function is not available in SOHO or inexpensive home products. RTS is used with CTS (Clear to Send).

Understanding RTS/CTS

Through fine-tuning of RTS/CTS, you can optimize the performance of your wireless LAN network. When you activate RTS/CTS on a station, it refrains from sending a data frame until that particular station completes the RTS/CTS connection with another station. Then a station starts the process by transferring the RTS frame. The access point will transfer a CTS frame after it receives the RTS frame. The CTS features a time value that will alert other stations to hold access to the medium while the station that initiates the RTS transmits the data.

The RTS/CTS connection provides a framework for the shared medium. The primary reason for implementing this function is to minimize the collision between hidden stations, which occurs when access points and wireless users are spread out in a location and there is a high occurrence of retransmissions on the wireless LAN.

The RTS function will then determine if the wireless access point should use CSMA/CD (Carrier Sense Multiple Access with Collision Detection) or CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) mechanism for packet (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Dan Virgillito. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/hoB6wrsUSgk/

Secure Guardrails