background image

 

 

- 26 - 

database, or wireless application for mobile workers. 
 

6.  What is BSS ID

 

A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS 
must be configured with the same BSS ID. 
 

7. What is WEP

 

WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit 
shared key algorithm, as described in the IEEE 802 .11 standard. 
 

8.  What is TKIP? 

TKIP is a quick-fix method to quickly overcome the inherent weaknesses in WEP 
security, especially the reuse of encryption keys. TKIP involves IEEE 802.11i 
WLAN security standard. 
 

9. What is AES? 

AES (Advanced Encryption Standard), a chip-based security, has been developed to 
ensure the highest degree of security and authenticity for digital information, wherever 
and however communicated or stored, while making more efficient use of hardware 
and/or software than previous encryption standards. It is also included in IEEE 802.11i 
standard. Compare with AES, TKIP is a temporary protocol for replacing WEP security 
until manufacturers implement AES at the hardware level. 
 

10. Can Wireless products support printer sharing

   

Wireless products perform the same function as LAN products. Therefore, Wireless 
products can work with Netware, Windows 2000, or other LAN operating systems to 
support printer or file sharing. 

 

11. Would the information be intercepted while transmitting on air

 

WLAN features two-fold protection in security. On the hardware side, as with Direct 
Sequence Spread Spectrum technology, it has the inherent security feature of 
scrambling. On the software side, WLAN series offer the encryption function (WEP) 
to enhance security and Access Control. Users can set it up based on their needs. 
 

12. What is DSSS

What is FHSS

And what are their differences

 

Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that 
changes frequency in a pattern that is known to both transmitter and receiver. 
Properly synchronized, the net effect is to maintain a single logical channel. To 
an unintended receiver, FHSS appears to be short-duration impulse noise. 
Direct-sequence spread-spectrum (DSSS) generates a redundant bit pattern for 
each bit to be transmitted. This bit pattern is called a chip (or chipping code). The 
longer the chip is, the greater the probability that the original data can be 
recovered. Even if one or more bits in the chip are damaged during transmission, 
statistical techniques embedded in the radio can recover the original data 
without-the need for retransmission. To an unintended receiver, DSSS appears 
as low power wideband noise and is rejected (ignored) by most narrowband 
receivers. 

Summary of Contents for SP907GK

Page 1: ...User s Manual Wireless LAN USB Adapter Model No SP907GK http www micronet info...

Page 2: ...S LAN UTILITY 11 4 1 STARTING THE WIRELESS LAN UTILITY 11 4 1 1 GENERAL 11 4 1 2 PROFILE 12 4 1 3 CONFIGURE THE PROFILE 13 4 1 3 1 BASE CONFIGURATION 13 4 1 3 2 WIRELESS NETWORK SECURITY 14 4 1 3 3 80...

Page 3: ...preferred networks that users usually connected with Security encryption can also be configured by this utility For WLAN security issues SP907GK supports 64 128 bit WEP data encryption that protects...

Page 4: ...02 1x and AES functions Range Coverage Indoor 35 100 meters Outdoor 100 300 meters Compliant with FCC Part 15 247 for US ETS 300 328 for Europe Support driver for Windows 98se Me 2000 and XP Supports...

Page 5: ...nder Windows XP Procedures are similar for Windows 98SE Me 2000 Note3 If you have installed the Micronet Wireless LAN Adapter driver utility before please uninstall the old version first Step1 Insert...

Page 6: ...on installation Please click the Contiune Anyway to continue Step6 If you are using Windows 98se or ME the system may ask for the driver CD Please click the Browse button Select your CD ROM Drive then...

Page 7: ...are using Windows 98se or ME please restart the system first before connect this wireless adapter to your computer Step9 The Found New Hardware Wizard pops up Note This wizard won t pop up in Windows...

Page 8: ...Install the software automatically and click the Next button Step12 Please wait while installing the driver The Windows logo testing warning window may pops up again Please click the Continue Anyway b...

Page 9: ...7 Step13 Click the Finish button after driver installation...

Page 10: ...guration Service 1 Double click the icon on your desktop to start the utility 2 Make sure that the Windows Zero Config checkbox is unchecked 3 1 Ad Hoc Mode An Ad Hoc mode wireless network connects tw...

Page 11: ...o configure the encryption settings in this profile to be corresponding to the other wireless adapter Please click on the Network Authentication drop list to select an authentication method and then s...

Page 12: ...an open wireless network If you are going to connect to an AP with security protection you will have to configure the encryption settings in this profile to be corresponding to your AP Please click on...

Page 13: ...wer right corner of the windows desktop You may also uncheck it to remove the utility icon from system tray Windows Zero Config Uncheck this checkbox to use native Windows XP wireless support Wireless...

Page 14: ...rent IP addresses settings for this adapter 4 1 2 Profile The Profile tab lists the preferred connections You can click the buttons beside to do configure each connection It allows you to manage the n...

Page 15: ...gnizable profile name for you to identify the different networks SSID The SSID up to 32 printable ASCII characters is the unique name identified in a WLAN The ID prevents the unintentional merging of...

Page 16: ...cted and that only authorized users may access their networks For enterprises that have already deployed IEEE 802 1x authentication WPA offers the advantage of leveraging the existing authentication d...

Page 17: ...security and authenticity for digital information and is the most advanced solution defined by IEEE 802 11i for security in the wireless network Note All devices in the network should use the same en...

Page 18: ...an EAP Request for the user s identity to the device EAP the Extensible Authentication Protocol is an authentication protocol that runs before network layer protocols transmit data over the link In t...

Page 19: ...Challenge is the easiest EAP Type It requires the wireless station to enter a set of user name and password as the identity to RADIUS Server Session Resumption Select from Disabled Reauthentication R...

Page 20: ...ority it places the issuer s self signed certificate which contains the issuer s public key into the trusted root certification authority certificate store of the host computer Intermediate or subordi...

Page 21: ...n change the connection to another AP or add one of the APs to your own profile list Refresh Click this button to rescan available networks around the adapter Add to Profile To add an available Networ...

Page 22: ...mented and transmitted Select the size from 256 to 2432 default bytes RTS Threshold Select the RTS Threshold form 0 to 2432 default Wireless Mode 802 11g b Connect to a 802 11b g network 2 4GHz 54Mbps...

Page 23: ...1 4 1 6 Status This tab shows the current connection status of this adapter 4 1 7 Statistics See this tab to show the transmission activity record Clicking the Reset button recounts the values from ze...

Page 24: ...gurations to this AP Association Table Shows the information of those devices that associated with this AP including their MAC addresses and the time that they connected with this device 4 2 2 Advance...

Page 25: ...23 4 2 3 Statistics See this tab to show the transmission activity record Clicking the Reset button recounts the values from zero...

Page 26: ...his page allows users to select the adapter for connect to public network Please click on the device that are used for connecting to public network and click the Select button and then click the Apply...

Page 27: ...d 54 Mbps optional speeds The ERP includes the modulation schemes found in 802 11b including CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps B A protection mechanism called RTS CTS...

Page 28: ...ware Windows 2000 or other LAN operating systems to support printer or file sharing 11 Would the information be intercepted while transmitting on air WLAN features two fold protection in security On t...

Page 29: ...In other words more bandwidth is consumed than in the case of narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver...

Page 30: ...FCC Rules Operation is subject to the following two conditions 1 this device may not cause harmful interference and 2 this device must accept any interference received including interference that may...

Page 31: ...EC Telecommunications Terminal Equipment and Satellite Earth Station Equipment As of April 8 2000 Safety This equipment is designed with the utmost care for the safety of those who install and use it...

Reviews: