
4
Configuration
The Configuration function helps you to configure the Network and the Security.
Network: the setting of the Network mode, the SSID and the Channels.
Network Mode:
If you want to connect with an Access Point, please set to “Infrastructure” mode. If
you have more stations and just want to set them as local network, please set the
mode to “Ad-Hoc” mode.
Network SSID:
The SSID differentiates one Wireless LAN group name from another; so all access
points and all devices attempting to connect to a specific Wireless LAN group
name must use the same SSID. A device will not be permitted to join the BSS
unless it can provide the unique SSID.
If the SSID parameter is “ANY”, it will detect the strongest signal of the wireless
station.
Channel:
It shows radio channel numbers that used for Wireless LAN networking.
The channel number can be set only under the Ad-Hoc operation mode. In Ad-Hoc
mode stations, each station must have the same channel numbers and SSID.
In Infrastructure mode, the Wireless mini-PCI Adapter will automatically detect the
channel number of the Access Point.
Security: the setting of the Network Encryption.
This function is used to protect wireless communication from eavesdropping. A
secondary function of encryption is to prevent unauthorized access to a wireless
network, and it can be achieved by using the Encryption function.
Encryption Mode:
There are two kinds of encryption mode, WEP encryption and WPA-PSK.
Click the Enable Encryption to activate the security of the mini-PCI Adapter.
WEP-Key: WEP (Wired Equivalent Privacy) relies on a secret key that is
shared between a mobile station and a base station (Access Point).
WEP-Passphrase: the Passphrase in the dialog box helps you to create a
group of WEP key in the Key Setting.
Authentication Mode:
Open System: with the same WEP key between the stations, the stations
don’t need to be authenticated, and this algorithm was set to default.
Shared Key: with the same WEP key between the stations in this
Authentication algorithm, this type will use packets with encryption by
transferring a challenge text which will be acknowledge by both side of the
stations. In order to choose which authentication algorithm will be used, you
must know which one the station supports this algorithm first.