Wireless LAN USB Adapter: User'S Manual
Wireless LAN USB Adapter: User'S Manual
Adapter
USER’S MANUAL
VERSION 1.2
2008/03/24
Trademarks
All products, company, brand names are trademarks or registered trademarks of their
respective companies. They are used for identification purpose only.
Specifications are subject to be changed without prior notice.
Disclaimer
All of the contents in this manual, product specifications, size and shape are subject to
change without prior notice.
The manufacturer makes no representations or warranties with regard to the contents hereof
and reserves the right to revise this manual without obligation to notify any person.
The manufacturer shall not be liable for any technical or editorial errors or omissions
contained in this manual, or for any damage, direct or indirect, from discrepancies between
the manual and the product it describes.
The manufacturer assumes no responsibility, directly or indirectly, for financial losses or
claims from third persons resulting from the use of this product and any of its functions.
Total accessible capacity varies depending on operating environment.
All references to speed are for comparison purposes only. Actual data throughput will vary.
This product is based on IEEE draft 802.11n specifications and is not guaranteed to be forward
compatible with future versions of IEEE 802.11n specifications.
Compatibility with draft 802.11n devices from other manufacturers is not guaranteed.
Precautions
Please follow the precautions listed below. Failure to do so may cause damage to the device
and void the warranty.
* Read this User’s Manual carefully and follow the procedures for installing and using the
device.
* Do not open the device or attempt to disassemble or modify it. If it appears to be
malfunctioning, contact Technical Support.
* Never expose the device to water or other liquids or in damp or wet conditions in order
to avoid danger of electric shock, short-circuiting or personal injury.
* If any of the following situations arises, have the equipment checked by service
personnel:
- The USB connector is damaged.
- Liquid has penetrated into the equipment.
- The equipment has dropped and damaged.
- The equipment has obvious sign of breakage.
Copyright Notice
The contents of this publication may not be reproduced in any part or as a whole, stored,
transcribed in an information retrieval system, translated into any language, or transmitted
in any form or by any means, mechanical, magnetic, electronic, optical, photocopying,
manual, or otherwise, without the prior written permission.
We take every care in the preparation of this document, but no guarantee is given to the
correctness of its contents. Our products are under continuous improvement and we reserve
the right to make changes without notice.
Limited Warranty
This product is warranted against manufacturing defects for the period of one year.
The warranty period commences on the date of purchase from the authorized
reseller/retailer.
Your original purchase invoice, showing the date of purchase of the product is your proof of
the date of purchase.
During the warranty period, defective parts will be repaired or replaced. There will be no
charge for labor or parts during the one-year warranty period from the date of purchase.
Any shipping or other cost such as customs incurred costs, etc… is customers’ responsibility.
This warranty does not cover any failure resulting in loss to software, data, lost profits, lost
savings, any incidental damages or other economic consequential damages due to accident,
abuse, misuse, negligence and acts of God.
1. Introduction ............................................................. 1
3. IP ADDRESS ............................................................... 4
8. Troubleshooting ....................................................... 46
9. Glossary ................................................................ 47
INFORMATION TO USER
Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a Class B digital
device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference in a residential installation.
This equipment generates, uses and can radiate radio frequency energy and, if not
installed and used in accordance with the instructions, may cause harmful interference
to radio communications. However, there is no guarantee that interference will not
occur in a particular installation. If this equipment does cause harmful interference to
radio or television reception, which can be determined by turning the equipment off and
on, the user is encouraged to try to correct the interference by one of the following
measures:
* Reorient or relocate the receiving antenna.
* Increase the separation between the equipment and receiver.
* Connect the equipment into an outlet on a circuit different from that to which the receiver
is connected.
* Consult the dealer or an experienced radio/TV technician for help.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two
conditions: (1) This device may not cause harmful interference, and (2) this device must
accept any interference received, including interference that may cause undesired
operation.
FCC Caution: Any changes or modifications not expressly approved by the party responsible
for compliance could void the user's authority to operate this equipment.
IMPORTANT NOTE:
FCC Radiation Exposure Statement:
i
REGULATORY INFORMATION
WLAN Mini USB Adapter must be installed and used in strict accordance with the instructions.
This device complies with the following radio frequency and safety standards.
USA - Federal Communications Commission (FCC)
This device complies with Part 15 of FCC Rules. Operation is subject to the following two
conditions:
1. This device may not cause harmful interference.
2. This device must accept any interference that may cause undesired ooperation.
Europe - R&TTE Directive
This device complies with the specifications listed below
EN 300 328 V1.6.1 (2004-11)
EN 301 489-1 V1.4.1 (2002-08), EN 301 489-17 V1.2.1 (2002-08)
EN 60950-1: 2001
1 2412 ˇ ˇ ˇ
2 2417 ˇ ˇ ˇ
3 2422 ˇ ˇ ˇ ˇ
4 2427 ˇ ˇ ˇ ˇ
5 2432 ˇ ˇ ˇ ˇ
6 2437 ˇ ˇ ˇ ˇ
7 2442 ˇ ˇ ˇ ˇ
8 2447 ˇ ˇ ˇ ˇ
9 2452 ˇ ˇ ˇ ˇ
10 2457 ˇ ˇ ˇ ˇ ˇ
11 2462 ˇ ˇ ˇ ˇ ˇ
12 2467 ˇ ˇ ˇ
13 2472 ˇ ˇ ˇ
14 2484 ˇ
ii
Thank you for your purchase of the WLAN 11n ISM Band Dongle.
Featuring wireless technology, this wireless networking solution has
been designed for both large and small businesses, and it is scalable
so that you can easily add more users and new network features
depending on your business scale.
FEATURES
Support Microsoft Windows 2000, XP, Vista.
Indoor up to 100 meters, Outdoor up to 280 meters.
270/240/180/120/90/60/54/48/36/30/24/22/18/12/11/6/5.5/2/1 Mbps
selectable Data Rate and maximum of 300Mbps.
Support USB 2.0 interface.
64-bit, 128-bit or WEP, TKIP, AES.
2.400GHz ISM Frequency Band.
Modulation Method : BPSK/QPSK/16-QAM/64-QAM
Spread Spectrum :
IEEE 802.11b : DSSS (Direct Sequence Spread Spectrum).
IEEE 802.11g / n: OFDM (Orthogonal Frequency Division Multiplexing).
Easy operation and setting up.
SYSTEM REQUIREMENTS
Windows System: Windows 2000, XP, Vista
PCs must have a device driver installed. It allows you to communicate
with WLAN Mini USB Adapter.
1
BEFORE YOU START
1. Confirm Box Contents
LED
LED turns on when POWER is applied to the WLAN Mini USB Adapter.
LED is blinking when PC is sending data through WLAN Mini USB Adapter.
2
Wireless LAN network defined by IEEE 802.11n/b/g standard committee
could be configured as :
Ad Hoc wireless LAN, or
Infrastructure wireless LAN.
Ad Hoc network is a group of PCs installed with wireless LAN cards, this
group of PCs is called a BSS (Basic Service Set). PCs in this group can use
their wireless LAN cards to communicate with each other, but can not
connect to the Internet.
3
To use the WLAN Mini USB Adapter with a computing device, the WLAN
Mini USB Adapter must be equipped with an USB 1.1 or 2.0 Interface. All
drivers and supporting software for the WLAN Mini USB Adapter must be
installed and configured first.
Ask your system administrator for the following information, which you
may need to provide during driver installation :
Your Wireless Client Name.
Your Wireless SSID.
Your computer’s unique client name and workgroup name.
For your network account, your user name and password.
Your IP address, gateway address, and subnet mask if you’re not
using a DHCP server.
4
For Windows 2000 and XP.
Step 1 :
Insert the installation & driver
CD into your CD-ROM, choose
your language and click OK to
continue.
Step 2 :
Insert WLAN USB adapter into
USB port and click OK to
continue.
Step 3 :
After installation complete,
system will be rebooted
immediately.
5
Step 4 :
Start copying files until it
finishes the installation.
Step 5 :
Installation complete and system will be rebooted immediately.
6
WLAN USB Adapter uses its own management software. All functions
controlled by users are provided by this application. When you insert the
WLAN USB Adapter into the USB port of your PC, a new icon should
appear in the Windows System Tray automatically.
The tray icon appears at the bottom of the screen, and shows the signal
strength using colors and the received signal strength indication (RSSI).
Hold the mouse cursor over the tray icon to display the current configuration
profile name and association, as well as transmit and receive speed and the
wireless adapter name and IP address.
7
Preferences Set the startup options and menu options
for the ACU. Check whether the program
should start automatically when Windows
starts, and check the menu items that
should appear on the popup menu.
8
connected to.
Current Shows the current receive
Receive Rate rate in Mbps.
Current
Shows the current transmit
Transmit
rate in Mbps.
Rate
Client
Displays the IP address of
Adapter IP
the wireless adapter.
Address
Green Excellent 20 dB +
Green Good 10-20 dB +
Yellow Poor 5-10 dB
Red Poor < 5 dB
Gray No Connection No Connection
9
The following table describes the items found on the Current Status screen.
10
The following table describes the items found on the Advanced Status screen.
11n MIMO Shows the MIMO power save mode status. Available
Power Save for 802.11n devices only.
11
Current Noise Displays the current noise level in dBm.
Level
Up Time Shows how long the client adapter has been receiving
power (in hours:minutes:seconds). If the adapter runs
for more than 24 hours, the display shows in
days:hours:minutes:seconds.
802.11b Displays the 802.11b preamble format.
Preamble Configure the preamble format on the Advanced tab.
Channel Width Shows the channel width. Available for 802.11n devices
only.
QoS The type of quality of service that is currently being
used by your client adapter. QoS on wireless LANS
(WLAN) provides prioritization of traffic from the
access point over the WLAN based on traffic
classification.
12
component of the IEEE 802.11e WLAN standard for
QoS is enabled.
To add a new configuration profile, click New on the Profile Management tab.
To modify a configuration profile, select the configuration from the Profile
list and click the Modify button.
13
b. Remove a Configuration Profile
The Profile List provides icons that specify the operational state for that
profile. The list also provides icons that specify the signal strength for that
profile.
Importing a Profile :
1. From the Profile Management tab, click the Import button. The Import
Profile window appears.
2. Browse to the directory where the profile is located.
3. Highlight the profile name.
4. Click Open. The imported profile appears in the profiles list.
Exporting a Profile :
e. Ordering Profiles
Including a profile in the auto selection feature allows the wireless adapter to
automatically select that profile from the list of profiles and use it to connect
to the network.
14
Including a profile in auto profile selection:
The first profile in the Auto Selected Profiles box has highest priority,
and the last profile has lowest priority.
3. Click OK.
4. Check the Auto Select Profiles box.
5. Save the modified configuration file.
With auto profile selection enabled, the wireless adapter scans for available
networks. The highest priority profile with the same SSID as a found network
is used to connect to the network. On a failed connection, the client adapter
tries with the next highest priority profile.
15
5.2.3 Diagnostics
The Diagnostics tab of the Atheros Client Utility provides buttons used to
retrieve receive and transmit statistics. The Diagnostics tab does not require
any configuration.
The Diagnostics tab lists the following receive and transmit diagnostics for
frames received by or transmitted by the wireless network adapter:
Click the Adapter Information button for more general information about the
the wireless network adapter and the network driver interface specification
(NDIS) driver.
Click the Advanced Statistics button on the Diagnostics tab to also show
receive and transmit statistical information for the following receive and
transmit diagnostics for frames received by or transmitted to the wireless
network adapter:
16
• Association rejects: the number
of access point authentication
rejects received by the wireless
network adapter
• Standard MIC OK
• Standard MIC errors
• CKIP MIC OK
• CKIP MIC errors
17
5.3 Security
In the Atheros Client Utility, access the Security tab by clicking New or Modify
on the Profile Management tab. Click the Security tab in the Profile
Management window.
Edit the fields in the Security tab of Profile Management to configure the
profile. To define the security mode, select the radio button of the desired
security mode. Make sure to also edit the General and Advanced tabs.
The type of security mode the station is using. The options include the
following:
5.3.1 WPA/WPA2
• EAP-FAST
18
the Define PEAP (EAP-GTC) Configuration window appears. To
know more about this option refer Using PEAP (EAP-GTC)
security.
o If you chose MSCHAPv2 Username and Password from the
EAP-FAST Authentication Method drop-down list and clicked
Configure, the Configure Username and Password window
appears. To know more about this option refer Using
PEAP-MSCHAP V2 security.
o If you chose TLS Client Certificate from the EAP-FAST
Authentication Method drop-down list and clicked Configure,
the Define Certificate window appears. When configuring
EAP-TLS for EAP-FAST, you can check the Authenticate Server
Identity check box to force the system to authenticate the
identity of the server as an added level of security. This option
is available only when configuring EAP-FAST. To know more
about this option refer Using EAP-TLS security.
5. If you want to force the client adapter to disassociate after you log off
so that another user cannot gain access to the wireless network using
your credentials, check the No Network Connection Unless User is
Logged In check box. The default setting is checked.
6. Perform one of the following:
19
7. From the Select one or more PAC Authority to use with this Profile list,
highlight the PAC authorities associated with the network defined by
the profile's SSID. The list contains the names of all the authentication
servers from which you have previously provisioned a PAC.
When you create a new group, you can either import a PAC file into it
using the Import button or you can move a PAC from another group to
the new group.
10. To import a PAC, click Import. The PAC Import window appears. Do the
following:
a. Click Browse and select a PAC file to import. The default
location is C:/Program Files/Atheros.
b. Click the PAC file (*.pac) so that it appears in the File name box
at the bottom of the window.
c. Click Open.
20
d. If the Enter Password window appears, enter the PAC file
password, which can be obtained from your system
administrator, and click OK.
21
Doing so enables your computer to connect to the network prior to
user logon. The default setting is unchecked.
15. Click OK when done configuring EAP-FAST.
• EAP-TLS
To use EAP-TLS security In the Atheros Client Utility, access the Security
tab in the Profile Management window.
To use EAP-TLS security, the machine must already have the EAP-TLS
certificates downloaded onto it. Check with the IT manager.
Note: If you do not check the Use Machine Information for Domain
Logon check box, machine authentication is not performed.
Authentication does not occur until you log on.
4. Check the Validate Server Identity check box to force the system to
authenticate the identity of the server as an added level of security.
5. If you checked the Use Machine Information For Domain Logon check
box in the previous step, the Always Do User Authentication check box
at the bottom of the window becomes active. Perform one of the
following:
22
o Check the Always Do User Authentication check box if you want
the client to switch from using machine authentication to using
user authentication after you log on using your username and
password. This is the default setting.
o Uncheck the Always Do User Authentication check box if you
want the client to continue to use machine authentication after
the user's computer logs into the domain.
• EAP-TTLS
23
To use EAP security In the Atheros Client Utility, access the Security tab in
the Profile Management window.
To use EAP-TTLS security, the machine must already have the EAP-TTLS certificates
downloaded onto it. Check with the IT manager.
• PEAP (EAP-GTC)
To use PEAP (EAP-GTC) security In the Atheros Client Utility, access the Security
tab in the Profile Management window.
24
To use PEAP (EAP-GTC) security, the server must have WPA-PEAP certificates, and the
server properties must already be set. Check with the IT manager.
Note that Token uses a hardware token device or the Secure Computing SofToken
program (version 1.3 or later) to obtain and enter a one-time password during
authentication.
8. Click Settings and:
o Leave the Specific Server or Domain field blank to allow the client to
accept a certificate from any server that supplies a certificate signed by the
certificate authority listed in the Trusted Root Certification Authorities
drop-down box on the Define PEAP (EAP-GTC) Configuration window
(recommended) or enter the domain name of the server from which the
client will accept a certificate.
o If the Login Name field is not filled in automatically, enter your username.
o Click OK to save your settings and return to the Profile Management
(Security) window.
9. Click OK.
10. Enable the profile.
25
To use PEAP-MSCHAP V2 security In the Atheros Client Utility, access the Security
tab in the Profile Management window.
To use PEAP (EAP-MSCHAP V2) security, the server must have WPA-PEAP certificates,
and the server properties must already be set. Check with the IT manager.
o If you want to connect using a username and password, choose User Name
and Password.
o If you want to connect using a user certificate installed on your computer,
choose Certificate, select a certificate from the drop-down box and go to
Step 6.
5. Specify the username and password for inner PEAP tunnel authentication:
o Check Use Windows User Name to use the Windows user name as the
PEAP user name.
o OR: Enter a PEAP user name in the User Name field to use a separate user
name for the PEAP authentication process.
26
6. Click Settings. The Configuration Setting window appears.
7. Leave the Specific Server or Domain field blank to allow the client to accept a
certificate from any server that supplies a certificate signed by the certificate
authority listed in the Trusted Root Certification Authorities drop-down box on the
Define PEAP (EAP-MSCHAP V2) Configuration window (this is the
recommended option) or enter the domain name of the server from which the client
will accept a certificate.
8. If the Login Name field is not filled in automatically, enter your username with
nothing after it.
9. Click OK.
10. Enable the profile.
• LEAP
To use security In the Atheros Client Utility, access the Security tab in the Profile
Management window.
LEAP security requires that all infrastructure devices (e.g. access points and servers) are
configured for LEAP authentication. Check with the IT manager.
• Configuring LEAP
• Enabling LEAP
Configuring LEAP:
• On the Security tab, choose the WPA radio button. Choose WPA-LEAP from the
drop-down menu.
• OR: On the Security tab, choose the 802.1x radio button. Choose LEAP from the
drop-down menu.
27
2. To resume connection without providing credentials again after a temporary loss of
connection, check Always Resume the Secure Session.
3. Specify a user name and password:
Select to Use Temporary User Name and Password by choosing the radio button:
o Check Use Windows User Name to use the Windows user name as the
LEAP user name.
o OR: Check Manually Prompt for LEAP User Name and Password to
manually login and start the LEAP authentication process.
Select to Use Saved User Name and Password by choosing the radio button:
o Specify the LEAP user name, password, and domain to save and use.
4. Enter the user name and password.
5. Confirm the password.
6. Specify a domain name:
o Check the Include Windows Logon Domain with User Name setting to
pass the Windows login domain and user name to the RADIUS server.
(default)
o OR: Enter a specific domain name.
7. If desired, check No Network Connection Unless User Is Logged In to force the
wireless adapter to disassociate after logging off.
8. Enter the LEAP authentication timeout time (between 30 and 500 seconds) to
specify how long LEAP should wait before declaring authentication failed, and
sending an error message. The default is 90 seconds.
9. Click OK.
10. Enable the profile.
28
5.3.2 802.1x
Choosing 802.1x opens the 802.1x EAP type drop-down menu. The options include:
• EAP-FAST
• EAP-TLS
• EAP-TTLS
• PEAP (EAP-GTC)
• PEAP (EAP-MSCHAP V2)
• LEAP
If the access point that the wireless adapter is associating to has WEP set to Optional and
the client has WEP enabled, make sure that Allow Association to Mixed Cells is checked
on the Security Tab to allow association.
To use WPA Passphrase security In the Atheros Client Utility, access the Security tab in
the Profile Management window.
29
5.3.4 Pre-Shared Key (Static WEP)
Enables the use of pre-shared keys that are defined on both the access point and the station.
To define pre-shared encryption keys, choose the Pre-Shared Key radio button and click
the Configure button to fill in the Define Pre-Shared Keys window.
If the access point that the wireless adapter is associating to has WEP set to Optional and
the client has WEP enabled, make sure that Allow Association to Mixed Cells is checked
on the Security Tab to allow association.
5.3.5 None
No security (not recommended).
30
5.4 JumpStart for Wireless
Step 1:
Run Setup.exe in folder “JSW_Install_CD” and follow onscreen instructions to
complete the installation.
31
Step 2 :
Choose “Join a wireless
network” and click Next to
continue.
Step 3 :
Users have three ways to connect to an AP:
32
2. Within two minutes, choose
the first option and click Next
to continue.
4. Connect Successfully.
33
Method B Enter a Pin code into AP :
2. Enter the Pin number in the configuration web page into the Client
PIN Number blank and click “Start PIN”.
34
3. Click Next to continue.
4.Connect Successfully.
35
Method C Enter a Pin from AP :
3.Connect Successfully.
36
6.1
The installation driver CD will automatically activate the autorun installation
program after you insert the disk into your CD drive.
Step 1:
Insert the installation & driver
CD into your CD-ROM, click
OK to continue.
Step 2:
Insert WLAN USB adapter into
USB port and click OK to
continue.
Step 3:
Choose setup language and
click Next to continue.
37
Step 4:
Click Cancel if Vista prompted Found New Hardware.
Step 5:
Click Next to continue.
Step 6:
Choose accept and click
Next to continue.
38
Step 7:
For Vista OS only driver are
required to install, please
click Yes to continue.
Step 8:
Setup might remind you to
connect the 11n adapter
again. Make sure the 11n
adapter was connected
before continue.
Step 9:
Start copying files until it
finishes the installation.
39
Step 10:
Click Finish to complete
installation.
40
6.2 Install Driver Manually:
Plug your USB dongle into USB interface, windows Vista will search for
compatible driver to install.
Step 1 :
Select “Locate and install the driver
software”, Windows will guide you
through the process of installing
driver software for your device.
Step 2 :
Insert the installation disc into the
CD-ROM and click “next” to continue
installation.
Step 3 :
Windows Vista search for the
software and it will be installed
successfully.
41
6.3 Connect to a Network :
Step 1 :
After installation, right click the
network icon on the Windows Vista
System Tray, and click “Connect to a
network”.
Step 2 :
Select a network to connect to and
click “Connect”.
42
Step 3 :
Click “Connect Anyway” if the
network is an unsecured network.
Step 4:
USB Dongle successfully connected
to network, Click “Close”
43
Product
WLAN 11n ISM Band Dongle
Name
Standard IEEE802.11n/b/g , 802.3, 802.3u
Frequency
2.400GHz ISM band
Band
Modulation
BPSK/QPSK/16-QAM/64-QAM
method
802.11b : DSSS (Direct Sequence Spread Spectrum)
Spread
802.11g/n : OFDM (Orthogonal Frequency Division Multiplexing)
Spectrum
270/240/180/120/90/60/54/48/36/30/24/22/18/12/11/6/5.5/
Data Rate
2/1Mbps and Maximum of 300Mbps.
Operation Ad hoc
mode Infrastructure (Access Points is needed)
Transmitter
Output < 14 dBm@11n, < 17 dBm@11b, < 14 dBm@11g
Power
Operating at 11Mbps: @ –80dBm
Receiver
Operating at 54Mbps: @ –70dBm
Sensitivity
Operating at 300Mbps: @ –64dBm
Operating
Indoor Up to 100 m, Outdoor Up to 280 m
Range
Security 64-bit, 128-bit or WEP (Wired Equivalent Privacy); TKIP, AES
44
Operating
0 ~ 50 ℃
Temperature
Storage
-10 ~ 70 ℃
Temperature
Humidity 5 ~ 90% maximum (non-condensing)
45
Symptom:
The LED is off.
Remedy:
Make sure the PC Card is inserted properly. Otherwise contact your vendor.
Symptom:
The LED is always on not blinking.
Remedy:
Make sure that you have installed the driver from attached CD. Otherwise
contact your vendor.
Symptom:
The LED is blinking but the PC Card icon does not appear in your icon tray.
Remedy:
Make sure that you have installed the Utility from the attached CD.
Symptom:
The PC Card is linking, but can’t share files with others.
Remedy:
Make sure the file and printer sharing function is enabled. You can
enable the function by checking the icon of My Computer -> Control
Panel -> Network -> file and printer sharing -> I want to be able to give
others to access to my files.
Symptom:
Slow or poor performance.
Remedy:
Try to select another channel for the communicating group or move your
device closer to the Access Point.
46
IEEE 802.11 Standard
The IEEE 802.11 Wireless LAN standards subcommittee, which is formulating
a standard for the industry.
Access Point
An internetworking device that seamlessly connects wired and wireless
networks together.
Ad Hoc
An Ad Hoc wireless LAN is a group of computers, each with a WLAN
adapter, connected as an independent wireless LAN. Ad Hoc wireless LAN
is applicable at a departmental scale for a branch or SOHO operation.
BSSID
A specific Ad Hoc LAN is called a Basic Service Set (BSS). Computers in a
BSS must be configured with the same BSSID.
DHCP
Dynamic Host Configuration Protocol - a method in which IP addresses are
assigned by server dynamically to clients on the network. DHCP is used for
Dynamic IP Addressing and requires a dedicated DHCP server on the
network.
Direct Sequence Spread Spectrum
This is the method the wireless cards use to transmit data over the frequency
spectrum. The other method is frequency hopping. Direct sequence
spreads the data over one frequency range (channel) while frequency
hopping jumps from one narrow frequency band to another many
times per second.
ESSID
An Infrastructure configuration could also support roaming capability for
mobile workers. More than one BSS can be configured as an Extended
Service Set (ESS). Users within an ESS could roam freely between BSSs
while served as a continuous connection to the network wireless stations
and Access Points within an ESS must be configured with the same ESSID
and the same radio channel.
47
Ethernet
Ethernet is a 10/100Mbps network that runs over dedicated home/office
wiring. Users must be wired to the network at all times to gain access.
Gateway
A gateway is a hardware and software device that connects two dissimilar
systems, such as a LAN and a mainframe. In Internet terminology, a gateway
is another name for a router. Generally a gateway is used as a funnel
for all traffic to the Internet.
IEEE
Institute of Electrical and Electronics Engineers
Infrastructure
An integrated wireless and wired LAN is called an Infrastructure
configuration. Infrastructure is applicable to enterprise scale for wireless
access to central database, or wireless application for mobile workers.
ISM Band
The FCC and their counterparts outside of the U.S. have set aside bandwidth
for unlicensed use in the so-called ISM (Industrial, Scientific and
Medical) band. Spectrum in the vicinity of 2.4 GHz, in particular, is being
made available worldwide. This presents a truly revolutionary opportunity
to place convenient high-speed wireless capabilities in the hands of users
around the globe.
Local Area Network (LAN)
A LAN is a group of computers, each equipped with the appropriate network
adapter card connected by cable/air, that share applications, data,
and peripherals. All connections are made via cable or wireless media,
but a LAN does not use telephone services. It typically spans a single
building or campus.
Network
A network is a system of computers that is connected. Data, files, and
messages can be transmitted over this network. Networks may be local or
wide area networks.
Protocol
A protocol is a standardized set of rules that specify how a conversation
is to take place, including the format, timing, sequencing and/ or error
checking.
48
Roaming
In an infrastructure network, this is when a wireless PC moves out of
range of the previously connected access point and connects to a newly
connected access point. Throughout the network environment where
access point is deployed, PCs can always be connected regardless of
where they are located or roam.
SSID
A Network ID unique to a network. Only clients and Access Points that
share the same SSID are able to communicate with each other. This string
is case-sensitive.
Simple Network Management Protocol (SNMP)
Simple Network Management Protocol is the network management protocol
of TCP/IP. In SNMP, agents-which can be hardware as well as software-
monitor the activity in the various devices on the network and
report to the network console workstation. Control information about
each device is maintained in a structure known as a management information
block.
Static IP Addressing
A method of assigning IP addresses to clients on the network. In networks
with Static IP address, the network administrator manually assigns an IP
address to each computer. Once a Static IP address is assigned, a computer
uses the same IP address every time it reboots and logs on to the
network, unless it is manually changed.
Temporal Key Integrity Protocol (TKIP)
The Temporal Key Integrity Protocol, pronounced tee-kip, is part of the
IEEE 802.11i encryption standard for wireless LANs. TKIP is the next
generation of WEP, the Wired Equivalency Protocol, which is used to
secure 802.11 wireless LANs. TKIP provides per-packet key mixing, a
message integrity check and a re-keying mechanism, thus fixing the
flaws of WEP.
49
Transmit / Receive
The wireless throughput in Bytes per second averaged over two seconds.
Wi-Fi Alliance
The Wi-Fi Alliance is a nonprofit international association formed in 1999
to certify interoperability of wireless Local Area Network products based
on IEEE 802.11 specification. The goal of the Wi-Fi Alliance’s members is
to enhance the user experience through product interoperability. The
organization is formerly known as WECA.
Wi-Fi Protected Access (WPA)
The Wi-Fi Alliance put together WPA as a data encryption method for
802.11 wireless LANs. WPA is an industry-supported, pre-standard version
of 802.11i utilizing the Temporal Key Integrity Protocol (TKIP),
which fixes the problems of WEP, including using dynamic keys.
Wide Area Network (WAN)
A WAN consists of multiple LANs that are tied together via telephone
services and / or fiber optic cabling. WANs may span a city, a state, a
country, or even the world.
Wired Equivalent Privacy (WEP)
Now widely recognized as flawed, WEP was a data encryption method
used to protect the transmission between 802.11 wireless clients and
APs. However, it used the same key among all communicating devices.
WEP’s problems are well-known, including an insufficient key length and
no automated method for distributing the keys. WEP can be easily
cracked in a couple of hours with off-the-shelf tools.
50