background image

DHCP:

 Dynamic Host Configuration Protocol, which is a protocol that lets network 

administrators manage and allocate Internet Protocol (IP) addresses in a network.   
Every computer has to have an IP address in order to communicate with each other in 
a TCP/IP based infrastructure network. Without DHCP, each computer must be 
entered in manually the IP address. DHCP enables the network administrators to 
assign the IP from a central location and each computer receives an IP address upon 
plugged with the Ethernet cable everywhere on the network. 

DSSS: 

Direct Sequence Spread Spectrum. DSSS generates a redundant bit pattern for 

each bit to be transmitted. This bit pattern is called a chip (or chipping code). The 
longer the chip, the greater the probability that the original data can be recovered. 
Even if one or more bits in the chip are damaged during transmission, statistical 
techniques embedded in the radio can recover the original data without the need for 
retransmission. To an unintended receiver, DSSS appears as low power wideband 
noise and is rejected (ignored) by most narrowband receivers. 

Dynamic IP Address:

 An IP address that is assigned automatically to a client 

station in a TCP/IP network by a DHCP server.

 

Encryption:

 A security method that uses a specific algorithm to alter the data 

transmitted, thus prevent others from knowing the information transmitted. 

ESS:

 ESS stands for “Extended Service Set”. More than one BSS is configured to 

become Extended Service Set. LAN mobile users can roam between different BSSs in 
an ESS. 

ESSID:

 The unique identifier that identifies the ESS. In infrastructure association, the 

stations use the same ESSID as AP’s to get connected. 

Ethernet:

 A popular local area data communications network, originally developed 

by Xerox Corp., that accepts transmission from computers and terminals.    Ethernet 
operates on a 10/100 Mbps base transmission rate, using a shielded coaxial cable or 
over shielded twisted pair telephone wire. 

Fragmentation: 

When transmitting a packet over a network medium, sometimes the 

packet is broken into several segments, if the size of packet exceeds that allowed by 
the network medium. 

Fragmentation Threshold: 

The Fragmentation Threshold defines the number of 

bytes used for the fragmentation boundary for directed messages. The purpose of 
"Fragmentation Threshold" is to increase the transfer reliability thru cutting a MAC 
Service Data Unit (MSDU) into several MAC Protocol Data Units (MPDU) in smaller 
size. The RF transmission can not allow to transmit too big frame size due to the 
heavy interference caused by the big size of transmission frame. But if the frame size 
is too small, it will create the overhead during the transmission. 

Gateway:

 a device that interconnects networks with different, incompatible 

 

18

Summary of Contents for WLVP2454-NM

Page 1: ...802 11g Wireless Network PCI Adapter USER MANUAL...

Page 2: ...Getting Start 3 2 1 LED Indicators 3 2 2 Install the 802 11g Wireless Network Adapter 3 2 2 1 Utility Installation 3 2 2 2 Driver Installation 6 3 Configuration 9 3 1 Link Information 9 3 2 Configura...

Page 3: ...most commonly used operating systems including Windows 98SE ME 200 XP 1 2 System Requirement Windows 98 98SE Millennium Edition ME 2000 and XP operating systems PC with Pentium III 600MHz system or ab...

Page 4: ...PCI slot NOTE all the snapped images of installation mentioned in this manual are based on Windows XP For other windows operating system all the procedures are the same but the screens are not the exa...

Page 5: ...3 InstallShield Wizard will automatically start Please click Next to continue 5...

Page 6: ...our PC Open the computer case and then please insert the Wireless PCI Adapter into the empty PCI slot of your computer system Once the Wireless PCI Adapter is installed place the computer case back Tu...

Page 7: ...2 Please click Continue Anyway 3 Please click Finish 7...

Page 8: ...4 To make sure if the installation is successful you could check it through the device management 8...

Page 9: ...he Utility program Status Shows the BSSID associated which can be used to identify the wireless network SSID Shows current SSID which must be the same for the wireless client and AP in order for commu...

Page 10: ...ireless network environment SSID Service Set Identifier which is a unique name shared among all clients and nodes in a wireless network The SSID must be identical for each clients and nodes in the wir...

Page 11: ...ed Long Preamble and header which interoperates with the 1 Mbit s and 2 Mbit s DSSS specification as described in IEEE Std 802 11 and an optional Short Preamble and header as described in IEEE Std 802...

Page 12: ...d it is required to select the Authentication mode from the next dropping list If WPA is selected configuration is enabled Please click the configuration The below window is pop up Then please select...

Page 13: ...gth of time Auto depend on the communication to establish and automatically use the proper authentication mode The following will only be activated to allow for configuration when Encryption is enable...

Page 14: ...t scanning for available network again Profile You can create and manage the created profiles for Home offices or public areas By double clicking on one of the created profile the setting will adapt t...

Page 15: ...15...

Page 16: ...ndependent wireless LAN network formed by a group of computers each with a network adapter AP Client One of the additional AP operating modes offered by 54Mbps Access Point which allows the Access Poi...

Page 17: ...either 0 or 1 for value is the smallest unit for data Bridge An internetworking function that incorporates the lowest 2 layers of the OSI network protocol model Browser An application program that en...

Page 18: ...er the data transmitted thus prevent others from knowing the information transmitted ESS ESS stands for Extended Service Set More than one BSS is configured to become Extended Service Set LAN mobile u...

Page 19: ...dditional AP operating modes offered by 54Mbps Access Point which allows a group of APs that consists of two or more APs to connect two or more Ethernet networks or Ethernet enabled clients together T...

Page 20: ...o a field for subnets TCP IP Transmission Control Protocol Internet Protocol The basic communication language or protocol of the Internet It can also be used as a communications protocol in a private...

Page 21: ...the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the d...

Reviews: