Specifications

Chapter 4 Common Configuration
59
To explain the effect of STP & Pseudo VLAN on the wireless clients, we will compare 3
separate scenarios.
Scenario #1
– (No STP, No Pseudo VLAN)
Referring to the illustration below, if the Spanning Tree Protocol (STP) and Pseudo
VLAN are not implemented in a network, all clients (Notebook#1, #2, #3 & #4,) can
access to one another, resulting low level of data security. If redundant paths were found
in this network, broadcast packets will be duplicated and forwarded endlessly resulting
in a broadcast storm.
Scenario #2
– (With STP, No Pseudo VLAN)
When STP is enabled, extra redundant network paths between access points will be
disabled, hence preventing multiple active network paths in between any two network
access points.
If one of the access points is down, the STP algorithm will reactivate one of the
redundant paths so that the network connection will not be lost.
All wireless users will be able to communicate with each other if they are associated to
the access points of the same WDS zone.