background image

 

7

 

 

6.  What is BSS ID

 

A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be 
configured with the same BSS ID. 
 

7.  What is WEP

 

WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key 
algorithm, as described in the IEEE 802 .11 standard. 
 

8.  What is TKIP? 

TKIP is a quick-fix method to quickly overcome the inherent weaknesses in WEP security, 
especially the reuse of encryption keys. TKIP is involved in the IEEE 802.11i WLAN security 
standard, and the specification might be officially released by early 2003. 
 

9. What 

is 

AES? 

AES (Advanced Encryption Standard), a chip-based security, has been developed to ensure the 
highest degree of security and authenticity for digital information, wherever and however 
communicated or stored, while making more efficient use of hardware and/or software than 
previous encryption standards. It is also included in IEEE 802.11i standard. Compare with AES, 
TKIP is a temporary protocol for replacing WEP security until manufacturers implement AES at 
the hardware level. 
 

10.  Can Wireless products support printer sharing

   

Wireless products perform the same function as LAN products. Therefore, Wireless products can 
work with Netware, Windows 2000, or other LAN operating systems to support printer or file 
sharing. 

 

11.  Would the information be intercepted while transmitting on air

 

WLAN features two-fold protection in security. On the hardware side, as with Direct Sequence 
Spread Spectrum technology, it has the inherent security feature of scrambling. On the software 
side, WLAN series offer the encryption function (WEP) to enhance security and Access Control. 
Users can set it up depending upon their needs. 
 

12.  What is DSSS

What is FHSS

And what are their differences

 

Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that changes frequency 
in a pattern that is known to both transmitter and receiver. Properly synchronized, the net effect 
is to maintain a single logical channel. To an unintended receiver, FHSS appears to be 
short-duration impulse noise. Direct-sequence spread-spectrum (DSSS) generates a redundant 
bit pattern for each bit to be transmitted. This bit pattern is called a chip (or chipping code). The 
longer the chip is, the greater the probability that the original data can be recovered. Even if one 
or more bits in the chip are damaged during transmission, statistical techniques embedded in the 
radio can recover the original data without-the need for retransmission. To an unintended 
receiver, DSSS appears as low power wideband noise and is rejected (ignored) by most 
narrowband receivers. 
 
 
 

Summary of Contents for EW-7326Ig

Page 1: ...8 80 02 2 1 11 1g g W Wi ir re el le es ss s L LA AN N P PC CI I C Ca ar rd d User Manual Version 1 0 August 2005...

Page 2: ...arranties merchantability or fitness for any particular purpose Any software described in this manual is sold or licensed as is Should the programs prove defective following their purchase the buyer a...

Page 3: ...Increase the separation between the equipment and receiver 3 Connect the equipment into an outlet on a circuit different from that to which the receiver is connected 4 Consult the dealer or an experi...

Page 4: ...of those who install and use it However special attention must be paid to the dangers of electric shock and static electricity when working with electrical equipment All guidelines of this and of the...

Page 5: ...IGURATION UTILITY 9 3 1 Utility Overview 9 3 2 Available Network 10 3 3 General 12 3 4 Profile 13 3 4 1 Configure the Profile 14 3 4 2 Enable WPA in Windows XP 16 3 5 Advanced 19 3 6 Status 1 3 7 Stat...

Page 6: ...stomizes the way of saving the power from his her portable or handheld devices This card is cost effective together with the versatile features it is the best solution for you to build your wireless n...

Page 7: ...1 F 0 55 C Humidity Max 95 NonCondensing Certification FCC CE 1 3 Package Contents Before you begin the installation please check the items of your package The package should include the following ite...

Page 8: ...e card E Turn on the computer II Install the Driver Before you proceed with the installation please notice following descriptions Note1 The following installation was operated under Windows XP Procedu...

Page 9: ...older select the folder based on your computer s OS system and the system will start install the driver D The Hardware Installation screen is popped up Click Continue Anyway to continue E The system i...

Page 10: ...5 F Click Finish to complete the driver installation III Install the Utility A Execute Utility Setup exe from the installation CD B The InstallShield Wizard is displayed Click Next...

Page 11: ...icon in your desktop and an icon in the system tray IV Use the Configuration Utility To start configuring the card double click the icon in the system tray For Windows XP there is a Windows Zero Confi...

Page 12: ...ty of the card is displayed and it alerts you that you are in the Windows Zero Configuration mode Click Ok C Uncheck Windows Zero Config to enable the utility of the card Second Way A Right click the...

Page 13: ...8 C Uncheck Use Windows to configure my wireless network settings to enable the utility for the card...

Page 14: ...u can open it by double click on the icon In the Desktop In the System Tray Right click the icon in the system tray there are some items for you to operate the configuration utility Open Config Utilit...

Page 15: ...of the card If the radio is turned off the card will not work Windows Zero Config To configure the card from Windows XP Zero Configuration check the item It is the status bar that displays the current...

Page 16: ...on Signal and etc If you want to connect to any network on the list double click the selected network Refresh Click Refresh to update the available networks list It is recommended that refresh the lis...

Page 17: ...oint All communication is done via the Access Point or Router IBSS Select this mode if you want to connect to another wireless stations in the Wireless LAN network without through an Access Point or R...

Page 18: ...s connection You can add remove edit duplicate the preferred networks or set one of the networks as the default connection Add Remove Edit Button Click these buttons to add delete edit the selected pr...

Page 19: ...for the card and then only the device with the same SSID can interconnect to the card This is a computer to computer ad hoc network wireless access points are not used There are two kinds of network...

Page 20: ...om joining the network while encrypting the data traveling between authorized devices The encryption method supported by the card is TKIP Data Encryption Disabled Disable the WEP Data Encryption WEP E...

Page 21: ...ses the level of data protection encryption and access control authentication for existing and future wireless LAN systems The technical components of WPA include Temporal Key Integrity Protocol TKIP...

Page 22: ...ess Configure button to configure the WPA function for the current network 1 From here right click the icon to select View Available Wireless Networks 2 Press Advanced button from Wireless Network Con...

Page 23: ...ll as in each PC on the wireless network WPA takes over automatically from that point keeping unauthorized users that don t have the matching password from joining the network while encrypting the dat...

Page 24: ...nents of the card are still alive In this mode the power consumption is larger than Max mode Max Enable the card in the power saving mode when it is idle Wireless Mode 802 11 b This card can be compat...

Page 25: ...to the country user located by firmware before importing Fragment Threshold The value defines the maximum size of packets any packet size larger than the value will be fragmented If you have decreased...

Page 26: ...and link status If you don t ensure the status of the card and the network you are connecting please go to the screen for more details 3 7 Statistics You can get the real time information about the p...

Page 27: ...characters is the unique name identified in a WLAN The ID prevents the unintentional merging of two co located WLANs The default SSID of the AP is ANY Wireless cards connect to the AP should set up t...

Page 28: ...efer to Section 3 4 1 for the setting of the parameters for AP Note that Ad Hoc mode is not enabled for AP Note The operating frequency channel will be restricted to the country user located by firmwa...

Page 29: ...selected the AP will auto switch the preamble mode depending on the wireless cards Data Rate There are several options including Auto 1 2 5 5 11Mbps for you to select When the Auto is selected the AP...

Page 30: ...Statistics You can get the real time information about the packet transmission and receiving status during wireless communication from the screen If you want to recount the statistics value please cl...

Page 31: ...P includes the modulation schemes found in 802 11b including CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps B A protection mechanism called RTS CTS that governs how 802 11g device...

Page 32: ...ith Netware Windows 2000 or other LAN operating systems to support printer or file sharing 11 Would the information be intercepted while transmitting on air WLAN features two fold protection in securi...

Page 33: ...other words more bandwidth is consumed than in the case of narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver kno...

Reviews: