background image

Wireless Network Access Point

What is Spread Spectrum?

Spread Spectrum technology is a wideband radio frequency technique devel-
oped by the military for use in reliable, secure, mission-critical communica-
tions systems. It is designed to trade off bandwidth efficiency for reliability,
integrity, and security. In other words, more bandwidth is consumed than in the
case of narrowband transmission, but the trade-off produces a signal that is, in
effect, louder and thus easier to detect, provided that the receiver knows the
parameters of the spread-spectrum signal being broadcast. If a receiver is not
tuned to the right frequency, a spread-spectrum signal looks like background
noise. There are two main alternatives, Direct Sequence Spread Spectrum
(DSSS) and Frequency Hopping Spread Spectrum (FHSS).

What is DSSS? What is FHSS? And what are their differences?

Frequency Hopping Spread Spectrum (FHSS) uses a narrowband carrier that
changes frequency in a pattern that is known to both transmitter and receiver.
Properly synchronized, the net effect is to maintain a single logical channel. To
an unintended receiver, FHSS appears to be short-duration impulse noise.
Direct Sequence Spread Spectrum (DSSS) generates a redundant bit pattern for
each bit to be transmitted. This bit pattern is called a chip (or chipping code).
The longer the chip, the greater the probability that the original data can be
recovered. Even if one or more bits in the chip are damaged during transmis-
sion, statistical techniques embedded in the radio can recover the original data
without the need for retransmission. To an unintended receiver, DSSS appears
as low power wideband noise and is rejected (ignored) by most narrowband
receivers. 

Would the information be intercepted while transmitting on air?

Instant Wireless products feature two-fold protection in security. On the hard-
ware side, as with Direct Sequence Spread Spectrum technology, it has the
inherent security feature of scrambling. On the software side, Instant Wireless
products offer the encryption function (WEP) to enhance security and access
control. Users can set it up depending upon their needs.

Can Instant Wireless products support file and printer sharing?

Instant Wireless products perform the same function as LAN products.
Therefore, Instant Wireless products can work with NetWare, Windows
NT/2000, or other LAN operating systems to support printer or file sharing.

What is WEP?

WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40/64
bit shared key algorithm, as described in the IEEE 802.11 standard. 

33

Instant Wireless

®

Series

What is infrastructure mode?

When a wireless network is set to infrastructure mode, the wireless network is
configured to communicate with a wired network through a wireless access
point.

What is roaming?

Roaming is the ability of a portable computer user to communicate continu-
ously while moving freely throughout an area greater than that covered by a
single wireless network access point. Before using the roaming function, the
workstation must make sure that it is the same channel number as the wireless
network access point of the dedicated coverage area. 

To achieve true seamless connectivity, the wireless LAN must incorporate a
number of different functions. Each node and wireless network access point,
for example, must always acknowledge receipt of each message. Each node
must maintain contact with the wireless network even when not actually trans-
mitting data. Achieving these functions simultaneously requires a dynamic RF
networking technology that links wireless network access points and nodes. In
such a system, the user’s end node undertakes a search for the best possible
access to the system. First, it evaluates such factors as signal strength and qual-
ity, as well as the message load currently being carried by each wireless net-
work access point and the distance of each wireless network access point to the
wired backbone. Based on that information, the node next selects the right
wireless network access point and registers its address. Communications
between end node and host computer can then be transmitted up and down the
backbone.

As the user moves on, the end node’s RF transmitter regularly checks the sys-
tem to determine whether it is in touch with the original wireless network
access point or whether it should seek a new one. When a node no longer
receives acknowledgment from its original wireless network access point, it
undertakes a new search. Upon finding a new wireless network access point, it
then re-registers, and the communication process continues.

What is ISM band?

The FCC and their counterparts outside of the U.S. have set aside bandwidth
for unlicensed use in the ISM (Industrial, Scientific and Medical) band.
Spectrum in the vicinity of 2.4 GHz, in particular, is being made available
worldwide. This presents a truly revolutionary opportunity to place convenient
high speed wireless capabilities in the hands of users around the globe. 

32

Summary of Contents for Instant Broadband Series

Page 1: ...Instant Wireless Series Wireless Network Access Point Use this guide to install WAP11 ver 2 6 User Guide ...

Page 2: ...there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which is found by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equi...

Page 3: ...EC and or the CEPT recommendation Rec 70 03 For more details on legal combinations of power levels and antennas contact Linksys Corporate Compliance Linksys Group vakuuttaa täten että Instant Wireless Network Access Point tyyppinen laite on direktiivin 1999 5 EY direktiivin 89 336 EEC ja direktiivin 73 23 EEC oleellisten vaatimusten ja sitä koskevien näiden direktiivien muiden ehtojen mukainen Lin...

Page 4: ...statistic tools ensure that you ll always be in control The Wireless Access Point is easy to install and easy to use just plug it in and you re ready to go When all of these features come together in one compact lightweight and power efficient unit you have the ultimate in flexible networking the Linksys Wireless Access Point High Speed Data Transfer Rates of up to 11Mbps Interoperable with IEEE 8...

Page 5: ...ed networks wireless networks have two different modes in which they may be set up infrastructure and ad hoc An infrastructure configura tion is a WLAN and wired LAN communicating to each other through an access point An ad hoc configuration is wireless equipped computers com municating directly with each other Choosing between these two modes depends on whether or not the wireless network needs t...

Page 6: ...on for approximately ten seconds or use the Password tab of the Access Point s Web based Utility 4 T Power Red The Power LED lights up when the Access Point is powered on ACT Green If the LED is flickering the Access Point is actively sending or receiving data to or from one of the devices on the wireless network LINK Orange The LINK LED serves two purposes If the LED is continuously lit up the Ac...

Page 7: ...e it in a position which can best cover your wireless network Normally the higher you place the antenna the better the performance will be The antenna s position enhances the receiving sensitivity Both antennas should be perpendicular to the ground and parallel to each other 3 Connect the included Category 5 Ethernet network cable to the Access Point Then connect the other end of the Ethernet cabl...

Page 8: ...ton to continue or No to exit the Setup Wizard 5 On the Enter Network Password screen enter the default password admin in the Password field Then click the OK button For added security remember to change this password later through the Web based Utility s Password screen Figure 5 3 Instant Wireless Series 3 You can configure the Access Point through any PC connected to your Ethernet network Make s...

Page 9: ...th your network settings All points in your wireless network must use the same channel in order to function correctly 11 Instant Wireless Series 6 As shown in Figure 5 5 the IP Settings screen will appear next Enter an IP Address and Subnet Mask appropriate to your network Then enter a unique name in the AP Name field Click the Next button to continue or Back to return to the previous page IP Addr...

Page 10: ...al characters are 0 9 and A F 13 Instant Wireless Series 8 The Security Settings screen Figure 5 7 will appear next From this screen you will set the Wired Equivalent Privacy WEP encryption for your wireless network Select a WEP configuration method and a passphrase Click the Next button to continue or Back to return to the pre vious page WEP Disable 64 bit 10 hex digits 128 bit 26 hex digits In o...

Page 11: ...ress the Enter key and the following screen shown in Figure 6 1 will appear Leave the User Name field blank The first time you open the Web based Utility use the default password admin You can set a new password on the Password screen shown in Figure 6 7 The first screen that appears shown in Figure 6 2 is the Setup tab This allows you to change the Access Point s general settings Change these set...

Page 12: ...EP encryption to use and set the Passphrase for that encryption From the pull down menu at the top of the screen select 64 bit or 128 bit WEP encryption The Mode pull down menu will allow you to set the Passphrase in hexadecimal or ASCII characters Hexadecimal characters on your keyboard are the letters A through F and the numbers 0 through 9 while ASCII characters are any character on your keyboa...

Page 13: ... Access Point you must reset it to Access Point mode The two modes are mutually exclusive Figure 6 5 There are two ways to create WEP encryption keys The first method is by typ ing a Passphrase into that field and clicking the Generate button This will generate WEP encryption keys based upon that passphrase A second method is to manually enter the WEP encryption keys in the available fields Click ...

Page 14: ...n LAN 2 and LAN 3 to Wireless Bridge and have them look for the MAC address of the access point in LAN 1 Only one of the access points must be in Point to MultiPoint mode For all other bridged access points select the Wireless Bridge option and enter the Remote LAN MAC Address of the Access Point set to Point to MultiPoint Backup and Restore Clicking the Backup button will store the Access Point s...

Page 15: ...splayed here Send and Recv The Send and Recv fields display the number of success ful or dropped packets that have been sent or received Some packet loss is normal in wireless networking 23 Instant Wireless Series The Status tab shown in Figure 6 8 will display current information on the Access Point its settings and its performance Firmware Version This displays the current version of the Access ...

Page 16: ... you will need an active Internet connection To download from the CD ROM click the Start but ton and select Run Type D Acrobat if D is the letter of your CD ROM drive 25 Instant Wireless Series To view a log of the Access Point s activity select the Log tab shown in Figure 6 9 To enable permanent logging activity click the Enable radio button beside Access Log The default setting for this function...

Page 17: ... file 6 Click the Upgrade button and follow the on screen instructions Click the Cancel button to cancel the firmware upgrade To access the Filter tab first click the Advanced tab The Filter tab shown in Figure 6 11 allows you to control which computers may or may not commu nicate with the Access Point depending on their MAC addresses To enable filtering of computers by their MAC Addresses click t...

Page 18: ...en the Access Point has buffered broadcast or multicast messages for associated clients it sends the next DTIM with a DTIM Interval value Access Point Clients hear the beacons and awaken to receive the broadcast and multicast messages Basic Rates The basic rate is the minimum speed at which a wireless client is allowed to connect to the Access Point Transmission Rates The transmission rates should...

Page 19: ...ed to be used over a network Consult the application s user guide to determine if it supports oper ation over a network Can I play multiplayer games with other users of the wireless network Yes as long as the game supports multiple players over a LAN local area net work Refer to the game s user guide for more information What is the IEEE 802 11b standard It is one of the IEEE standards for wireles...

Page 20: ... or file sharing What is WEP WEP is Wired Equivalent Privacy a data privacy mechanism based on a 40 64 bit shared key algorithm as described in the IEEE 802 11 standard 33 Instant Wireless Series What is infrastructure mode When a wireless network is set to infrastructure mode the wireless network is configured to communicate with a wired network through a wireless access point What is roaming Roa...

Page 21: ...your computer s network operating system for further assistance Check with your network administrator for your TCP IP settings The directions below provide general guidelines for coming up with IP address es and subnet masks Check with your network administrator to see if you need to use specific IP addresses or DHCP settings First each computer on the network will require an IP address which is a...

Page 22: ...ng instructions are provided as examples for reference only For complete instructions on installing and troubleshooting TCP IP consult your Windows operating system documentation 1 Click the Start button and select Settings Open the Control Panel Inside the Control Panel double click the Network icon 2 If the TCP IP Protocol is listed for your network adapter go to step five Otherwise click the Ad...

Page 23: ...basis communicating directly with each other without the use of an access point Ad hoc mode is also referred to as an Independent Basic Service Set IBSS or as peer to peer mode and is useful at a departmental scale or SOHO operation Backbone The part of a network that connects most of the systems and net works together and handles the most data Bandwidth The transmission capacity of a given facili...

Page 24: ...buffer and the algorithms for moving data into and out of the buffer need to be considered by the buffer designer Like a cache a buffer is a midpoint holding place but exists not so much to accelerate the speed of an activity as to sup port the coordination of separate activities CSMA CA Carrier Sense Multiple Access Collision Avoidance In local area networking this is the CSMA technique that comb...

Page 25: ...ce such as a network adapter that allows the network to identify it at the hardware level Mbps MegaBits Per Second One million bits per second unit of measure ment for data transmission Multicasting Sending data to a group of nodes instead of a single destination 10 Mbps Forms the underlying transport vehicle used by several upper level protocols including TCP IP and XNS FHSS Frequency Hopping Spr...

Page 26: ...mber of devices to share a limited number of ports 2 A device for making breaking or changing the connections in an electrical cir cuit TCP Transmission Control Protocol A method protocol used along with the IP Internet Protocol to send data in the form of message units datagram 45 Instant Wireless Series Network A system that transmits any combination of voice video and or data between users Node...

Page 27: ...ly TCP and IP Throughput The amount of data moved successfully from one place to anoth er in a given time period Topology A network s topology is a logical characterization of how the devices on the network are connected and the distances between them The most common network devices include hubs switches routers and gateways Most large networks contain several levels of interconnection the most im...

Page 28: ...HE PRICE PAID FOR THE PROD UCT FROM DIRECT INDIRECT SPECIAL INCIDENTAL OR CONSEQUENTIAL DAM AGES RESULTING FROM THE USE OF THE PRODUCT ITS ACCOMPANYING SOFT WARE OR ITS DOCUMENTATION LINKSYS OFFERS NO REFUNDS FOR ITS PROD UCTS Linksys makes no warranty or representation expressed implied or statutory with respect to its products or the contents or use of this documentation and all accom panying so...

Page 29: ...numbers listed on the Technical Support insert or one of the Internet addresses below E mail Europe europe support linksys com United Kingdom Ireland uks linksys com Latin America latam soporte linksys com U S and Canada support linksys com For unlisted regions or the most up to date contact information please visit the website below Web http www linksys com international ...

Page 30: ... Copyright 2003 Linksys All Rights Reserved http www linksys com ...

Reviews: