Appendix F. User Manual
ETL Inc.
#584 Sangwhal-ri, Kanam -myon,
Yoju-kun, Kyounggi-do,
469-885, Korea 23 of 83
FCC ID : PFMTC7530
Report No:E03.0820.FCC.444N
Issue of Date: August 20, 2003
GEMPACK CO., LTD.
15” Web Base Terminal
Model: TC7530
Figure 4.8
Wireless Networks Setting
19. Check the ‘Use Windows to configure my wireless setting (recommended), then click
Refresh
to detect available access points.
20. Choose an access point then click
Configure
(
Figure 4.9
).
Figure 4.9
Access Point Setting
21. Assign a network name, SSID; the given network name should already be typed in.
22. Check if the wireless mode is used as
Ad Hoc
mode. The 802.11 standard supports
two network topologies:
Ad Hoc
and
Infrastructure
mode. A standalone Ad Hoc
network topology consists of at least two wireless stations without using access
points. This type of network is often referred to as Peer-to-Peer network because it
can be constructed quickly without much planning overhead. Ad Hoc mode LANs
are normally less expensive because they do not require a dedicated computer to
store applications and data. However, they do not perform well for large networks.
23. Check the ‘
Data Encryption’
box if the network requires
WEP
service enabled.
Wired Equivalent Privacy
is a security mechanism defined within the 802.11
standard designed to make the link integrity of the wireless medium equal to wired
cable. Data privacy mechanism based on a 40 bits (128 bit optional) shared key
algorithm, as described in the IEEE 802.11 standard.
24. Check the ‘
Network Authentication’
box if the network requires it to be in Shared
Mode. In
Open System
, the default authentication service that simply announces
the desire to associate with another station or access point. A station can
authenticate with any other station or access point using open system authentication
if the receiving station designates open system authentication. In
Share Key
, The
optional authentication that involves a more rigorous exchange of frames, ensuring