Appendix
Appendix
Before Using the Optional Wireless LAN
This manual describes the procedures required to properly set up and configure the optional
integrated Wireless LAN Mini-PCI device (referred to as "WLAN device" in the rest of the
manual). Before using the WLAN device, read this manual carefully to ensure its correct
operation. Keep this manual in a safe place for future reference.
Wireless LAN Devices Covered by this Document
This document is applicable to systems containing the following device:
•
Intel® Dual Band Wireless-AC 8265 – 11a/b/g/n/11ac
Characteristics of the WLAN Device
•
The WLAN devices are PCI Express Mini cards attached to the main board of the mobile computer.
•
The WLAN devices operate in license-free RF bands, eliminating the need to procure
an FCC operating license. The WLAN operates in the 2.4GHz Industrial, Scientific,
and Medical (ISM) RF band and the lower, middle, and upper bands of the 5GHz
Unlicensed National Information Infrastructure (UNII) bands.
•
The WLAN device is Wi-Fi certified and operates (as applicable) at the maximum data rate
of 867 Mbps in IEEE802.11ac mode, 450 Mbps in IEEE802.11n mode (300 Mbps in this
configuration); 54 Mbps in IEEE802.11g mode; and 11 Mbps in IEEE802.11b mode.
•
The WLAN devices support the following encryption methods - WEP,
TKIP, CKIP, and AES encryption.
•
The Wireless LAN devices are compliant with the following standards: WPA,
WPA2, CCX1.0, CCX2.0, CCX3.0, and CCX4.0.
Wireless LAN Modes Using this Device
Ad Hoc Mode
"Ad Hoc Mode" refers to a wireless network architecture where wireless network connectivity
between multiple computers is established without a central wireless network device, typically
known as Access Point(s). Connectivity is accomplished using only client devices in a peer-to-peer
fashion. That is why Ad Hoc networks are also known as peer-to-peer networks. Ad Hoc
networks are an easy and inexpensive method for establishing network connectivity between
multiple computers. Ad Hoc mode requires that the SSID, network authentication, and encryption
key settings are identically configured on all computers in the Ad Hoc network.
1
09
Fujitsu