background image

 

 

6.  What is BSS ID

 

A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be 

configured with the same BSS ID. 

 

7.  What is WEP

 

WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key 

algorithm, as described in the IEEE 802 .11 standard. 

 

8.  What is TKIP? 

TKIP is a quick-fix method to quickly overcome the inherent weaknesses in WEP security, 

especially the reuse of encryption keys. TKIP is involved in the IEEE 802.11i WLAN security 

standard, and the specification might be officially released by early 2003. 

 

9. What 

is 

AES? 

AES (Advanced Encryption Standard), a chip-based security, has been developed to ensure the 

highest degree of security and authenticity for digital information, wherever and however 

communicated or stored, while making more efficient use of hardware and/or software than 

previous encryption standards. It is also included in IEEE 802.11i standard. Compare with AES, 

TKIP is a temporary protocol for replacing WEP security until manufacturers implement AES at 

the hardware level. 

 

10.  Can Wireless products support printer sharing?   

Wireless products perform the same function as LAN products. Therefore, Wireless products can 

work with Netware, Windows 2000, or other LAN operating systems to support printer or file 

sharing. 

 

11.  Would the information be intercepted while transmitting on air 

WLAN features two-fold protection in security. On the hardware side, as with Direct Sequence 

Spread Spectrum technology, it has the inherent security feature of scrambling. On the software 

side, WLAN series offer the encryption function (WEP) to enhance security and Access Control. 

Users can set it up depending upon their needs. 

 

12.  What is DSSS

What is FHSS

And what are their differences

 

Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that changes frequency 

in a pattern that is known to both transmitter and receiver. Properly synchronized, the net effect 

is to maintain a single logical channel. To an unintended receiver, FHSS appears to be 

short-duration impulse noise. Direct-sequence spread-spectrum (DSSS) generates a redundant 

bit pattern for each bit to be transmitted. This bit pattern is called a chip (or chipping code). The 

longer the chip is, the greater the probability that the original data can be recovered. Even if one 

or more bits in the chip are damaged during transmission, statistical techniques embedded in the 

radio can recover the original data without-the need for retransmission. To an unintended 

receiver, DSSS appears as low power wideband noise and is rejected (ignored) by most 

narrowband receivers. 

 

 

 

 

31

 

Summary of Contents for HWPG1

Page 1: ......

Page 2: ...ipment must be installed and operated in accordance with provided instructions and a minimum 20 cm spacing must be provided between computer mounted antenna and person s body excluding extremities of...

Page 3: ...r to obtain a Return Authorization number Warranty is for repair or replacement only Hawking Technology does not issue any refunds BE SURE TO HAVE YOUR PROOF OF PURCHASE RETURN REQUESTS CAN NOT BE PRO...

Page 4: ...y 10 3 2 Profile 11 3 2 1 Configure the Profile 12 3 2 1 0 Configuration 12 3 2 1 1 Authentication vs Security 15 3 2 1 2 802 1x Setting Certification 18 3 2 1 3 802 1x Setting CA Server 20 3 3 Link S...

Page 5: ...dvanced solution defined by IEEE 802 11i for security in wireless networks The power consumption of the card is also very low Furthermore this card provides several levels of power saving modes allowi...

Page 6: ...Bm 1Mbps BPSK 8 PER 92dBm Dimension 19 H x 130 W x 121 D mm Temperature 32 131 F 0 55 C Humidity Max 95 NonCondensing Certification FCC CE IC 1 3 Package Contents Before you begin the installation ple...

Page 7: ...Windows 98SE Me 2000 Note2 If you have installed a Wireless PCI Card driver utility before please uninstall them first before continuing with the HWPG1 software installation Software Installation A I...

Page 8: ...C Click Yes to process the installation if you accept the license agreement D Choose Hawking Configuration Tool and click next 4...

Page 9: ...E The system will automatically detect the card and display Hardware Installation screen Click Continue Anyway to continue F Please wait while the HWPG1 is configuring your software installation 5...

Page 10: ...re this card to the rear of the computer chassis and put back the cover D Secure the antenna to the antenna connector of the card E Restart your computer Software Installation Continue A After you hav...

Page 11: ...C Now you have completed the software installation Select Finish 7...

Page 12: ...utomatically This card will auto connect to wireless device which has better signal strength and no wireless security setting The Configuration Utility appears as an icon on the system tray of Windows...

Page 13: ...ect Exit to close the Configuration Utility tool In Windows XP there is a Windows Zero Configuration Tool for you to setup wireless clients By default this Windows Zero Configuration Tool is enabled I...

Page 14: ...Configuration Utility the system will scan all wireless channels to find all access points stations within the accessible range of your card and automatically connect to the wireless device with the...

Page 15: ...etworks on the list double click the item on the list and the card will automatically connect to the selected network Rescan Button Click Rescan button to collect the information of all the wireless n...

Page 16: ...escription Profile Name Define a recognizable profile name for you to identify the different networks SSID The SSID up to 32 printable ASCII characters is the unique name identified in a WLAN The ID p...

Page 17: ...nother wireless station in the Wireless LAN network without going through an Access Point or Router Peer to Peer Transmit Power If you wish to lower the transmit power of the card to save the power of...

Page 18: ...t is transmitted directly to the wireless network Select a setting within a range of 0 to 2312 bytes Minor change is recommended Fragment Threshold The value defines the maximum size of packets any pa...

Page 19: ...prises small businesses and home users that data will remain protected and that only authorized users may access their networks For enterprises that have already deployed IEEE 802 1x authentication WP...

Page 20: ...tandard WEP security AES AES has been developed to ensure the highest degree of security and authenticity for digital information and it is the most advanced solution defined by IEEE 802 11i for the s...

Page 21: ...n Protocol EAP a method of authentication that has been in use for a number of years on networks that provide Point to Point Protocol PPP support as many internet service providers and enterprises do...

Page 22: ...APv2 PAP and EAP MD5 PEAP specifies that an EAP compliant authentication protocol must be used this card supports EAP MSCHAP v2 EAP TLS Smart card and Generic Token Card The client certificate is opti...

Page 23: ...ficate Store and made available to the RADIUS server for certification Parameter Description Tunnelled Authentication Protocol When the authentication type is PEAP or TTLS select a protocol to be used...

Page 24: ...3 2 1 3 802 1x Setting CA Server 3 3 Link Status From the Link Status option you can view all the information of the network you are connecting to 20...

Page 25: ...Status from the system tray The icon in your system tray will display different colors to help you distinguish the status of your wireless network Follow the table to the right to understand what eac...

Page 26: ...with its Tx counts Tx success Tx error RTS Success and RTS Failed and its Rx counts Rx success Rx error You may reset the counters by clicking Reset Counter 3 5 Advanced This option enables you to con...

Page 27: ...Turbo Mode Turbo Mode enables the card to deliver the better throughput in the same period and environment 23...

Page 28: ...24...

Page 29: ...l 3 7 Setting Up A Static IP Address Generally your IP settings will be assigned automatically However if your network doesn t support this capability please enter in the appropriate IP settings The I...

Page 30: ...b Go to your Control Panel Select Network Connections Right click on the Wireless Connection Properties 2 Select Internet Protocol TCP IP and Properties 26...

Page 31: ...ress 3 8 Turbo Mode This card supports specific ways to increase the data transfer rate at a time compress the data and decrease the waiting time to send the next data to the Routers or APs this featu...

Page 32: ...rofile of the IEEE 802 11e extensions for 802 11 networks will help to define the priorities of the data traffics by the data categories to provide enhanced multimedia support When the card is connect...

Page 33: ...B Click Configure C Select Advanced page enable the WMM Capable 29...

Page 34: ...es the modulation schemes found in 802 11b including CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps B A protection mechanism called RTS CTS that governs how 802 11g devices and 80...

Page 35: ...h Netware Windows 2000 or other LAN operating systems to support printer or file sharing 11 Would the information be intercepted while transmitting on air WLAN features two fold protection in security...

Page 36: ...her words more bandwidth is consumed than in the case of narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver knows...

Reviews: