background image

 

 

6.  What is BSS ID

 

A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be 

configured with the same BSS ID. 

 

7.  What is WEP

 

WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key 

algorithm, as described in the IEEE 802 .11 standard. 

 

8.  What is TKIP? 

TKIP is a quick-fix method to quickly overcome the inherent weaknesses in WEP security, 

especially the reuse of encryption keys. TKIP is involved in the IEEE 802.11i WLAN security 

standard, and the specification might be officially released by early 2003. 

 

9. What 

is 

AES? 

AES (Advanced Encryption Standard), a chip-based security, has been developed to ensure the 

highest degree of security and authenticity for digital information, wherever and however 

communicated or stored, while making more efficient use of hardware and/or software than 

previous encryption standards. It is also included in IEEE 802.11i standard. Compare with AES, 

TKIP is a temporary protocol for replacing WEP security until manufacturers implement AES at 

the hardware level. 

 

10.  Can Wireless products support printer sharing

   

Wireless products perform the same function as LAN products. Therefore, Wireless products can 

work with Netware, Windows 2000, or other LAN operating systems to support printer or file 

sharing. 

 

11.  Would the information be intercepted while transmitting on air

 

WLAN features two-fold protection in security. On the hardware side, as with Direct Sequence 

Spread Spectrum technology, it has the inherent security feature of scrambling. On the software 

side, WLAN series offer the encryption function (WEP) to enhance security and Access Control. 

Users can set it up depending upon their needs. 

 

12.  What is DSSS

What is FHSS

And what are their differences

 

Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that changes frequency 

in a pattern that is known to both transmitter and receiver. Properly synchronized, the net effect 

is to maintain a single logical channel. To an unintended receiver, FHSS appears to be 

short-duration impulse noise. Direct-sequence spread-spectrum (DSSS) generates a redundant 

bit pattern for each bit to be transmitted. This bit pattern is called a chip (or chipping code). The 

longer the chip is, the greater the probability that the original data can be recovered. Even if one 

or more bits in the chip are damaged during transmission, statistical techniques embedded in the 

radio can recover the original data without-the need for retransmission. To an unintended 

receiver, DSSS appears as low power wideband noise and is rejected (ignored) by most 

narrowband receivers. 

 

 

 

29

 

Summary of Contents for SP906GK

Page 1: ...User s Manual Wireless LAN PCI Adapter Model No SP906GK http www micronet info...

Page 2: ...Utility 4 3 CONFIGURATION UTILITY 7 3 1 Site Survey 9 3 2 Profile 10 3 2 1Configure the Profile 11 3 2 1 1 Configuration 11 3 2 1 2 Authentication and Security 13 3 2 1 3 802 1x Setting Certification...

Page 3: ...ers are required to authorize before accessing to APs or AP Routers and the data transmitted in the network is encrypted decrypted by a dynamically changed secret key Furthermore this adapter supports...

Page 4: ...E Me 2000 XP Supports 32 bit PCI interface 1 2 Specifications Standard IEEE 802 11b g Interface 32 bit PCI Frequency Band 2 4000 2 4835GHz Industrial Scientific Medical Band Modulation OFDM with BPSK...

Page 5: ...lease check the items of your package The package should include the following items Wireless LAN PCI Adapter Quick installation guide Driver and Manual CD Detachable Antenna If any of the above items...

Page 6: ...lease uninstall the old version completely first I Install the Hardware A Turn off your computer and remove its cover B Insert the PCI adapter to an available PCI slot firmly C Secure this adapter to...

Page 7: ...rt the supplied CD to your CD ROM Drive Execute the Setup exe program C Click Yes to process the installation if you accept the license agreement D The system starts to install the software of the ada...

Page 8: ...E The system will automatically detect the adapter and display Hardware Installation screen Click Continue Anyway to continue F Please click Finish to complete the installation 6...

Page 9: ...ation Utility appears as an icon on the system tray of Windows while the adapter is running You can open the utility by double click on the icon Right click the icon there are some items for you to op...

Page 10: ...e the Utility for the adapter please follow one of the ways as below First Way Right click the icon in the system tray and select Use RaConfig as Configuration Utility Second Way A Right click the ico...

Page 11: ...ou open the Configuration Utility the system will scan all the channels to find all the access points stations within the accessible range of your adapter and automatically connect to the wireless dev...

Page 12: ...works on the list double click the item on the list and the adapter will automatically connect to the selected network Rescan Button Click Rescan button to collect the new information of all the wirel...

Page 13: ...activated the adapter will be initially connected to the profile 3 2 1 Configure the Profile 3 2 1 1 Configuration Parameter Description Profile Name Define a recognizable profile name for you to ide...

Page 14: ...reless Mode When the adapter is set in Ad Hoc Peer to Peer Mode you can designate the wireless connection mode for the Ad Hoc network 802 11 B only This adapter can be compatible with both 802 11g and...

Page 15: ...d this value and experience high packet error rates you can increase it again but it will likely decrease overall network performance Select a setting within a range of 256 to 2346 bytes Minor change...

Page 16: ...ucture WPA PSK It is a special mode designed for home and small business users who do not have access to network authentication servers In this mode known as Pre Shared Key the user manually enters th...

Page 17: ...evices in the network should use the same encryption method to ensure the communication WPA Pre Shared Key The WPA PSK key can be from 8 to 64 characters and can be letters or numbers This same key mu...

Page 18: ...otocol PPP support as many internet service providers and enterprises do When an AP acting as an authenticator detects a wireless station on the LAN it sends an EAP Request for the user s identity to...

Page 19: ...PEAP specifies that an EAP compliant authentication protocol must be used this adapter supports EAP MSCHAP v2 EAP TLS Smart adapter and Generic Token Adapter The client certificate is optional require...

Page 20: ...ntication type is PEAP or TTLS select a protocol to be used to build the encrypted tunnel Identity This is the protected user EAP Identity used for authentication The identity specified may contain up...

Page 21: ...e which contains the issuer s public key into the trusted root certification authority certificate store of the host computer Intermediate or subordinate certification authorities are trusted only if...

Page 22: ...eception rate of the network The maximum transmission rate is 54Mbps Throughput Kbits sec Display the speed of data transmitted and received Link Quality This bar indicates the quality of the link The...

Page 23: ...evel in the wireless environment 3 4 Statistics This option enables you to view the statistic information of the connection including transmit statistics and receive statistics You may reset the count...

Page 24: ...mpatible with both 802 11g and 802 11b wireless stations If there are only 802 11g wireless stations in the network you can set the adapter to this mode Select Your Country Region Code The available c...

Page 25: ...adapter to deliver the better throughput in the same period and environment Parameter Description Enable TCP Window Size The TCP Window is the amount of data a sender can send on a particular connecti...

Page 26: ...plications Enable Radio Measurement When this parameter is enabled the Cisco AP can run the radio monitoring through the associated CCX compliant clients to continuously monitor the WLAN radio environ...

Page 27: ...nction In addition to the Turbo Mode this adapter also supports WMM function When you use the devices such as Voice over Internet Protocol VoIP phones televisions VCRs and MP3 players IEEE 802 11e Qua...

Page 28: ...B Right Click the Wireless Network Connection and select Properties C Click Configure 26...

Page 29: ...D Select Advanced page enable the WMM Capable 27...

Page 30: ...es the modulation schemes found in 802 11b including CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps B A protection mechanism called RTS CTS that governs how 802 11g devices and 80...

Page 31: ...h Netware Windows 2000 or other LAN operating systems to support printer or file sharing 11 Would the information be intercepted while transmitting on air WLAN features two fold protection in security...

Page 32: ...her words more bandwidth is consumed than in the case of narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver knows...

Reviews: