User's Manual

ACCESS POINT
43
Setting fragmentation threshold can be a tricky business. Getting the best performance
out of fragmentation depends on the network traffic condition.
6.2 Encryption
All users throughout the Internet can read unencrypted data, illustrated below
with a simple wired network.
Figure 35 - Intercepted data
B want to send some data to A, but the data was intercepted by C.
Figure 36 - Retransmitted data
C then modifies the data and transmits it to A. A is unaware of C’s presents and
thinks the data originates from B.
With wireless networks, data is even more vulnerable to such attacks since everyone
within your radio transmitting range can intercept your data.