background image

15

14

Encryption (WEP) can be Disabled, or set to 64-bit or 128-bit encryption as
a hexadecimal number for each key that you wish to encrypt.  Make sure that
the values entered in these fields for WEP is identical to the encryption keys
used on the other wireless devices on the network. 

Once enabled, you can create an encryption key by using a Passphrase, or by
entering the key manually. The Passphrase can be any text string with a max-
imum of 31 alphanumeric characters.  

If you select to Create Keys Manually, enter a hexadecimal number for each
key that you wish to encrypt.  Make sure that the values entered in these fields
for WEP are identical to the encryption keys used on the other wireless devices
on the network. 

Once you have chosen your key encryption method and entered either the
Passphrase or manual key, click the Apply button to save your changes or
Undo to delete them. To save your changes and close the Configuration Utility,
click the OK button.

LINK

The Link screen provides information about the current link between the
Network CF Card and the wireless network.

The  State field displays information on the Access Point with which the
Network CF Card is communicating.

The Current Channel field shows to what channel the Network CF Card is set.

The Current Tx Rate field shows the transfer rate in megabits per second.

Clicking the Rescan button refreshes the information displayed.

The Throughput fields show the rate at which data is transferred and received
in bytes per second.

The Link Quality field will display a bar indicating the percentage, between 0
and 100 percent, of the quality of the link.  The higher the percentage, the bet-
ter the link. 

Wireless Network CF Card

Note:

Creating and using the passphrase is recommended for easy WEP con-

figuration and security purposes.

ENCRYPTION

The 64-bit or 128-bit WEP keys can be generated here from a user-defined
passphrase or entered manually.

An acronym for Wired Equivalent Privacy, WEP is an encryption scheme used
to protect your wireless data communications. WEP uses a combination of 64-
bit or 128-bit keys to provide access control to your network and encryption
security for every data transmission. To decode a data transmission, each point
in a network must use an identical 64-bit or 128-bit key.   Higher encryption
levels mean higher levels of security, but, due to the complexity of the encryp-
tion, they may mean decreased network performance. 

Instant Wireless

TM

Series

Summary of Contents for WCF11 - Wireless CompactFlash Card Type II

Page 1: ...Instant WirelessTM Series Wireless Network CF Card User Guide Use this Guide to install WCF11 ...

Page 2: ...TION LINKSYS DOES NOT OFFER REFUNDS FOR ANY PRODUCT Linksys makes no warranty or representation expressed implied or statuto ry with respect to its products or the contents or use of this documentation and all accompanying software and specifically disclaims its quality performance mer chantability or fitness for any particular purpose Linksys reserves the right to revise or update its products so...

Page 3: ...Low Interference and High Sensitivity to Guarantee Reliable Performance User Friendly Software Provides Hassle Free Installation and Configuration Plug and Play Operation Provides Easy Setup Built in Antenna with Link LED Works with Virtually All Standard Internet Applications Interoperable with IEEE 802 11b DSSS 2 4GHz Compliant Equipment Capable of up to 128 Bit WEP Encryption Free Software Driv...

Page 4: ... Point is able to forward data within its BSS the effective transmission range in an infrastructure LAN is doubled The use of a unique ID in a Basic Service Set is essential The Wireless LAN Infrastructure configuration is appropriate for enterprise scale wireless access to a central database or as a wireless application for mobile users Infrastructure mode also supports roaming capabilities for m...

Page 5: ...not the wireless network needs to share data or peripherals with a wired network or not If the computers on the wireless network need to be accessible by a wired net work or need to share a peripheral such as a printer with the wired network computers the wireless network should be set up in the Infrastructure mode The basis of Infrastructure mode centers around an access point which serves as the...

Page 6: ... and select the appropriate folder Wireless Network CF Card 2 The first tab across the top of the screen labeled Install should now be high lighted Click the Install button The following screen should appear indi cating that Windows is preparing the installation If for whatever reason you need to abort or terminate the installation click the Cancel button at any time during the installation Otherw...

Page 7: ...e following screen appears choose either Infrastructure mode or Ad Hoc mode depending on your needs If you are unsure whether to choose Infrastructure or Ad Hoc refer to the next section for more infor mation Once you have made your choice click the Next button 7a If you chose Infrastructure Mode go on to Step 7b now If you chose Ad Hoc Mode choose the correct operating channel that applies to you...

Page 8: ...low the steps requested by your PDA Once this is done or if none are requested click the OK button 11 Once the installation wizard is complete click the Finish button 12 The following screen will also appear on your PDA showing that the device has been successfully installed When you see this click the OK button Note Check your network setting to set IP Address 11 10 Wireless Network CF Card Insta...

Page 9: ...tically adjust the transfer speed for best perform ance and longest range Power Saving Enabled allows your PDA to enter sleep mode if your network connection experiences more than 1 second of no network activity This depends on PDA power saving mode The Ad Hoc Channel setting specifies the channel used in wireless communi cation and should be set to the same channel as the other points in the wire...

Page 10: ...he Access Point with which the Network CF Card is communicating The Current Channel field shows to what channel the Network CF Card is set The Current Tx Rate field shows the transfer rate in megabits per second Clicking the Rescan button refreshes the information displayed The Throughput fields show the rate at which data is transferred and received in bytes per second The Link Quality field will...

Page 11: ...figuration Utility Version and Firmware Version 17 Wireless Network CF Card The Signal Strength field will display a bar indicating the percentage between 0 and 100 percent of the strength of the signal The higher the percentage the stronger the signal Instant WirelessTM Series 16 ...

Page 12: ...sys tem to determine whether it is in touch with the original Access Point or whether it should seek a new one When a node no longer receives acknowl edgment from its original Access Point it undertakes a new search Upon find ing a new Access Point it then reregisters and the communication process con tinues What is BSS ID A specific Ad hoc LAN is called a Basic Service Set BSS Computers in a BSS ...

Page 13: ... the hands of users around the globe What is Spread Spectrum Spread Spectrum technology is a wideband radio frequency technique devel oped by the military for use in reliable secure mission critical communica tions systems It is designed to trade off bandwidth efficiency for reliability integrity and security In other words more bandwidth is consumed than in the case of narrowband transmission but...

Page 14: ...m that cannot support the original size of the packet Unlike e mail programs in which graphics and program files have to be attached FTP is designed to handle binary files directly and does not add the overhead of encoding and decoding the data Wireless Network CF Card Glossary Ad hoc Network An ad hoc network is a wireless network or other small net work in which some of the network devices are p...

Page 15: ...liability integrity and security In other words more bandwidth is con Wireless Network CF Card Hardware Hardware is the physical aspect of computers telecommunica tions and other information technology devices The term arose as a way to dis tinguish the box and the electronic circuitry and components of a computer from the program you put in it to make it do things The program came to be known as ...

Page 16: ... louder and thus easier to detect provided that the receiver knows the parameters of the spread spectrum signal being broadcast If a receiver is not tuned to the right frequency a spread spectrum signal looks like background noise There are two main alternatives Direct Sequence Spread Spectrum DSSS and Frequency Hopping Spread Spectrum FHSS Storage The semi permanent or permanent holding place for...

Page 17: ...ON HAND WHEN CALLING RETURN REQUESTS CANNOT BE PROCESSED WITHOUT PROOF OF PURCHASE IN NO EVENT SHALL LINKSYS LIABILITY EXCEED THE PRICE PAID FOR THE PRODUCT FROM DIRECT INDIRECT SPECIAL INCIDEN TAL OR CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OF THE PRODUCT ITS ACCOMPANYING SOFTWARE OR ITS DOCU MENTATION LINKSYS DOES NOT OFFER REFUNDS FOR ANY PROD UCT LINKSYS OFFERS CROSS SHIPMENTS A FASTER PRO...

Page 18: ... Copyright 2001 Linksys All Rights Reserved http www linksys com ...

Reviews: