background image

Section 5 

Glossary

 

5-8  

WN825

PING 

A network utility that tests host reachability by sending a small 
packet to the host and waiting for a reply. If you PING a computer 
IP address and receive a reply, you know the computer is 
reachable over the network. It also stands for “Packet Internet 
Groper.” 

Port Triggering 

A mechanism that allows incoming communication with specified 
applications.  

PPP 

Point-to-Point Protocol is used to transport other protocols, 
typically for simple links over serial lines. It is most commonly 
used to access the Internet with a dial-up modem. 

PPPoE 

Point-to-Point Protocol over Ethernet.  Used by many DSL 
Internet Service Providers for broadband connection. 

PPTP 

Point-to-Point Tunneling Protocol encapsulates other protocols. It 
is a new technology to create VPNs developed jointly by several 
vendors. 

Private IP Address 

An IP address assigned to a computer on the LAN by the DHCP 
server for a specified lease time. Private IP addresses are 
invisible to devices on the Internet. See also 

Public IP Address

Protocol 

A formal set of rules and conventions for exchanging data. 
Different computer types (for example PC, UNIX

®

, or mainframe) 

can communicate if they support common protocols. 

Public IP Address 

The IP address assigned by the service provider. A public IP 
address is visible to devices on the Internet. See also 

Private IP 

Address

RJ-11 

The most common type of connector for household or office 
phones. 

RJ-45 

An 8-pin modular connector; the most common connector type for 
10Base-T or 100Base-T Ethernet networks. 

 

Summary of Contents for WN825

Page 1: ...User Guide WN825 Wireless Notebook Adapters WN825G and WN825GP WN825G WN825GP ...

Page 2: ...PA 19044 1 215 323 1000 declares under sole responsibility that the WN825G and WPCI810G comply with 47 CFR Parts 2 and 15 of the FCC Rules as a Class B digital device This device complies with Part 15 of FCC Rules Operation of the device is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference that may cause undesire...

Page 3: ...tions Copyright 2004 Motorola Inc All rights reserved No part of this publication may be reproduced in any form or by any means or used to make any derivative work such as translation transformation or adaptation without written permission from Motorola Inc Motorola reserves the right to revise this publication and to make changes in content from time to time without obligation on the part of Moto...

Page 4: ...ation Icon Description 3 2 Enabling the Motorola Wireless Configuration Utility 3 3 Connecting to an Existing Wireless Network 3 4 Configuring a New Wireless Network 3 5 Modifying Properties for a Configured Wireless Network 3 9 Performance Enhancement 3 11 Controlling the Radio 3 12 Preferred Networks Setting up the Connection Order 3 13 Move Up and Move Down buttons 3 14 Advanced Selection Rules...

Page 5: ... My computer is experiencing difficulty connecting to the wireless network 4 1 I would like to test if my Internet connection is live 4 2 Software Solutions 4 3 How do I enable LEAP for my corporate network 4 3 I am unable to roam with WDS enabled 4 3 What if Pass Phrase isn t supported What do I enter for my security 4 4 Section 5 Glossary ...

Page 6: ...nstalling the adapter card you ll have the ability to wirelessly connect to your network to send and receive emails to print documents or game online from your PC The WN825GP comes loaded with Performance Enhancement technology that accelerates your wireless network and your fun This new technology boosts wireless performance among compatible Motorola devices up to 35 faster than over standard 802...

Page 7: ... with the latest specifications Understanding Your User Guide The User Guide is subdivided into the following sections Overview Describes the WN825 and its functions the technology used and recommended practices for using it Installation Provides instructions for installing the hardware and setting up the firmware to get your adapter up and running Configuration and Status Describes the Configurat...

Page 8: ...1 I f yo u ne ed as si s t a nce ca l l 1 8 77 4 66 86 46 7 da ys a w ee k 2 4 hou rs a day Y o u can al s o che ck f or t h e l a t e st d eve l o pmen t s a t w w w mot oro l a co m broa dba nd n et w o rki n g Qu ic k S tart Gu id e G e t t i n g S t a r t e d 1 2 3 4 M o t o r o l a W N 8 2 5 G W i r el e s s N o t e b o o k A d a p t e r C h e c k t h a t y o u r b o x c o n t a i n s t h e s...

Page 9: ...eed and the frequency spectrum used designated by the lower case letter after the standard For example your adapter card can work with both the b and g specifications The 802 11b specification transmits data rates up to 11 Mbps while the 802 11g specification transmits data rates up to 54 Mbps Both standards operate in the 2 4 GHz range These are theoretical speeds so your performance may vary A W...

Page 10: ...op of the WN825 LINK POWER HIGH PERFORMANCE 54 Mbits s DATA RATE DRAFT 802 11G COMPLIANT HIGH PERFORMANCE DATA RATE UP TO 54 Mbps 802 11g COMPATIBLE 1 2 The WN825 has the following features Feature Description 1 Power LED Indicates that the card is powered 2 Link LED Indicates the activity of the wireless network traffic ...

Page 11: ...del WN825G FCC ID F2NWN825G With FCC Standards For Home Or Office Use Tested To Comply Made in Taiwan S N PPPPMMYJJJSSSSSCAABBCCCC PART NUMBER 498518 001 00 MODEL WN825G The following describes the features on the bottom of the WN825 Feature Description Label Includes the model number part number serial number and MAC Address MAC Address Location of the adapter card s MAC Address ...

Page 12: ...g information from your network administrator Network names SSID of the specific wireless networks to which you are going to connect WPA Wi Fi Protected Access wireless network key information may include network authentication type encryption type network key for any WPA enabled networks to which you want to connect WEP Wired Equivalent Privacy wireless network key information network key for any...

Page 13: ...y technology for wireless local area networks the subset of the future IEEE Std 802 11i standard that encrypts data sent over radio waves The WPA protocol was developed to overcome the weaknesses of the WEP Wired Equivalent Privacy protocol Both protocols require the use of network key information and either protocol can be enabled or disabled depending on the type of network connection being made...

Page 14: ...ast secure WEP A network key used TKIP A network key used more secure WPA The network operates in IEEE 802 1x authentication mode This mode is for environments with a Remote Access Dial In User Service RADIUS infrastructure This environment requires heavy technical support to set up and maintain and is used by large corporations In a RADIUS environment various Extensible Authentication Protocols E...

Page 15: ...ts proper location for example D WIN98 3 Locate an empty CardBus slot on your notebook computer 4 With the adapter card product label and LEDs facing up insert the adapter card into the CardBus slot 5 Complete the installation instructions supplied on the CD ROM Device Configuration Setup After installing the adapter card and software you will need to connect to a network Refer to Section 3 Config...

Page 16: ...ion to Discover available wireless networks Setup operation modes Create connectivity profiles Set up security Monitor the wireless network environment Perform diagnostic discovery The screenshots shown may look slightly different from the ones in your version of the software ...

Page 17: ...eless Networks tab There are no networks available The signal strength is Very Low The signal strength is Low The signal strength is Good The signal strength is Very Good The signal strength is Excellent The small bars on either side of the antenna indicate network activity The bar on the left indicates receive and the bar on the right indicates transmit Wireless Network Icons The infrastructure n...

Page 18: ...the network To enable the Motorola Wireless Configuration Utility 1 Right click the antenna icon in the system tray and select Open Utility The Motorola Wireless Configuration Utility window is displayed 2 Check Let this tool manage your wireless settings if not enabled 3 Unless you are using Windows XP do not clear Let this tool manage your wireless settings If using Windows XP you can use the Wi...

Page 19: ...works identify themselves with their Network Name SSID as seen in the Available networks field in the example below To quickly connect to an existing wireless network 1 Click the antenna icon The Connect to Wireless Network window is displayed The window displays any current wireless networks 2 Highlight the Available network you want to access 3 If the Network key background area turns white ente...

Page 20: ...you want to connect to a wireless network that is not in the Available networks field you can configure a network profile 1 Right click the antenna icon in the system tray and select Open Utility 2 The Motorola Wireless Configuration Utility window is displayed 3 Click Add ...

Page 21: ...Enter information for the new wireless network based on the descriptions in the following table Field Description Network name SSID Enter a Network Name SSID of no more than 32 alphanumeric characters This is the SSID for a particular wireless network The Network Name SSID is case sensitive ...

Page 22: ...be required to enter further information on the Authentication tab Ask your network administrator for additional information Data Encryption Select the type of security encryption algorithm used The available types of encryption are based on the type of the authentication selected Disabled No encryption Available only with Open and Shared authentication WEP Deselect Network Key is provided for me ...

Page 23: ...ter to computer ad hoc network Select if the network you are creating or accessing is a computer to computer ad hoc network If you are attempting to connect to an infrastructure network then do not select this setting 6 After entering the information for this network click OK The Wireless Network window is displayed and the new network is listed in the Preferred networks area 7 Your computer is co...

Page 24: ...s network 1 Right click the antenna icon in the system tray and select Open Utility 2 The Motorola Wireless Configuration Utility window displays Your computer automatically connects to the network displayed at the top of the Preferred networks list 3 In the Preferred networks list highlight the network you want to configure and click Properties ...

Page 25: ...hentication tab Match the setting used by the network 6 If the network requires Data Encryption select the type of encryption required Match the setting used by the network 7 If using WPA PSK enter the Pass Phrase in the Network key field In the example above the network is configured for WPA PSK for Authentication and TKIP for Encryption 8 For additional information about the fields on this windo...

Page 26: ...wireless network can still support non Performance Enhanced client devices including standard 802 11g and or 802 11b devices Under these conditions the network steps down to support full backward compatibility but the WN825GP will still function normally 1 Click Start click Settings and then click Control Panel 2 Click System and select the Hardware tab 3 Click Device Manager 4 Click Network adapt...

Page 27: ...y with restrictions prohibiting the emission of radio signals for example while onboard a commercial aircraft 1 To disable the radio using the antenna icon right click the antenna icon in the system tray and click Disable Radio 2 To enable the radio right click the antenna icon and click Enable Radio ...

Page 28: ...ed Networks Setting up the Connection Order There are two ways to specify the order that the adapter uses to connect to an available network in your Preferred networks list Using the Move Up and Move Down buttons Using Advanced Selection Rules ...

Page 29: ...s network in the order you specify in the Preferred networks list To move a network within the list 1 Highlight the network you want to move 2 Click either the Move up or Move down button depending on where you want the selected network to appear in the list In the example above the 2nd network is selected and the Move up button is active showing that you can move that network up when the button i...

Page 30: ...ed The Advanced window displays 2 Choose one of the three ways to display and choose networks from the list Choosing Access point networks only or Computer to computer networks only limits the number of networks in your preferred list 3 Selecting Automatically connect to non preferred networks allows you to connect to any network your utility can find For example this is useful if you are travelin...

Page 31: ...red network list 1 Right click the antenna icon in the system tray and select Open Utility The Motorola Wireless Configuration Utility window displays 2 In the Preferred networks list highlight the network you want to remove 3 Click Remove The network is removed from your preferred network list 4 Click Apply or OK to save the change ...

Page 32: ... Site Monitor tab The Visible Networks list provides information about all of the detected networks the Network Name SSID Channel Signal Strength and Security 3 In the Selected Network area of the window highlight a network to get more information about that network This area provides information about which wireless transmission standard is used on the network a graphic representation of the sign...

Page 33: ...etwork click Advanced The Advanced Site Monitor window displays This window provides detailed information about the network selected 5 To start a log of network activity click Start Log The Save log file as window displays 6 Select a drive and directory to store the networks log file ...

Page 34: ... log file The information is sent to the file approximately every six seconds The log is a comma delimited list that can be imported to a spreadsheet to enable you to view the activity on the network over a specific time period 8 Click Stop Log to stop the log information from being sent to the networks log file 9 To freeze the display click Freeze ...

Page 35: ...w link status 1 Right click the antenna icon in the system tray and select Open Utility The Motorola Wireless Configuration Utility window displays 2 Click the Link Status tab The Link Status tab provides information about the currently connected wireless network ...

Page 36: ...tics for the network you are connected to 1 Right click the antenna icon in the system tray and select Open Utility The Motorola Wireless Configuration Utility window displays 2 Click the Statistics tab The Statistics tab provides information about the selected wireless network ...

Page 37: ...ect Open Utility The Motorola Wireless Configuration Utility window displays 2 Click the Diagnostics tab 3 Various diagnostic tests are available Select a test to learn more about it 4 Click the desired test to enable and click Run The results Passed or Failed are displayed in the next column 5 Click the desired test to view individual results which appear in the Recommendations field ...

Page 38: ...for the adapter installed in your PC 1 Right click the antenna icon in the system tray and select Open Utility The Motorola Wireless Configuration Utility window displays 2 Click the Information tab The Information tab provides the firmware version number and hardware and software details about the adapter card ...

Page 39: ...u encounter problems removing the device then follow the steps below To remove the adapter 1 Locate the Device Eject icon located in your system tray In the illustration below it is the third icon from the left the picture of a card and a left pointing arrow 2 Double click the Device Eject icon The Unplug or Eject Hardware window displays ...

Page 40: ... The Stop a Hardware device window is displayed An example illustrating the WN850G is shown below 5 Confirm that the device listed in the window is the device you want to stop 6 Click OK After you receive a message telling you the device is stopped you can safely remove the Wireless Adapter ...

Page 41: ...d select the Hardware tab 3 Click Device Manager 4 Click Network adapters 5 Click Motorola Wireless Network Adapter WN825 and select the Advanced tab An example of the Advanced tab is shown below your screen may differ slightly 6 To change the value for any of the listed properties click the Property 7 Change the value in the Value box by either clicking the Value arrow and selecting a new value o...

Page 42: ... for IBSS Channel Number to 12 13 or 14 Location Allows you to match the regulatory permissions of the country in which you are using the Adapter Match the country in which you are using the adapter Performance Enhancement WN825GP Only This toggles the feature on or off The default is enabled If Performance Enhancement is enabled it is recommended that Frame Bursting also remain enabled Frame Burs...

Page 43: ...adapter and access point radio signal is enabled Review your access point s documentation for further instructions Ensure that your wireless adapter for your PC and the wireless access point have the same security settings that will allow your computer to access the wireless network Refer to the Configuration section of the documentation that came with your access point Verify that the Access Cont...

Page 44: ...ed by the Router s IP address and press Enter For example type ping 192 168 10 1 The router s IP address is most likely the default gateway If you receive a reply the first word will be Reply then your computer is connected to the router Proceed to Step 4 If you do NOT receive a reply repeat steps 1 4 on a different computer to verify that the first computer is not the cause of the problem 5 In th...

Page 45: ...further details 3 Add a new network refer to Section 3 for details 4 In the Preferred networks area highlight the network you want to configure 5 In the Available networks area click Configure or in the Preferred networks area click Properties 6 Select the type of authentication required in this case CCX Match the authentication used by the access point 7 Click the Authentication tab to enter furt...

Page 46: ...e or Motorola s Pass Phrase algorithm which means you have to enter the entire Key Content found in the appropriate Key field So using the WEP example from above if using Key 1 you would enter 03F32226A etc into the Network Key field of the example Network Adapter seen below Ensure that the Key index matches what is selected on the wireless network ...

Page 47: ...session The clients communicate directly to each other and not through an established such as through a router Also known as IBSS Independent Basic Service Set ASCII The American Standard Code for Information Interchange refers to alphanumeric data for processing and communication compatibility among various devices normally used for asynchronous transmission B Bandwidth The transmission capacity ...

Page 48: ...r long distances CPE Customer Premise Equipment typically computers printers etc that are connected to the gateway at the subscriber location CPE can be provided by the subscriber or the cable service provider Also called a client Crossover Cable A crossover cable is a cable that is used to interconnect two computers by crossing over reversing their respective pin contacts A crossover cable is som...

Page 49: ...rnet to download files from a server to a computer Driver Software that enables a computer to interact with a network or other device For example there are drivers for printers monitors graphics adapters modems Ethernet USB HPNA and many others DSL Digital Subscriber Line DSSS Direct Sequence Spread Spectrum DSSS is a transmission technology used in WLAN transmissions where a data signal at the se...

Page 50: ...erated by a device to inform an operator or the network management system that something has occurred F Firewall A security software system on some devices that enforces an access control policy between the Internet and the LAN for protection Firmware Code written onto read only memory ROM or programmable read only memory PROM Once firmware has been written onto the ROM or PROM it is retained even...

Page 51: ... computer I ICMP Internet Control Message Protocol is a protocol used for error problem and informational messages sent between IP hosts and gateways ICMP messages are processed by the IP software and are not usually apparent to the end user IEEE The Institute of Electrical and Electronics Engineers Inc http www ieee org is an organization that produces standards technical papers and symposiums fo...

Page 52: ...he most widely used LAN standard LEAP Lightweight Extensible Authentication Protocol LEAP is an authentication implementation of 802 1X by Cisco which provides a challenge response authentication mechanism and dynamic WEP key assignment M MAC Address The Media Access Control address is a unique 48 bit value permanently saved in the ROM at the factory to identify each Ethernet network device It is ...

Page 53: ...some security because the IP addresses of LAN computers are invisible on the Internet Network Two or more computers connected to communicate with each other Networks have traditionally been connected using some kind of wiring NIC A Network Interface Card converts computer data to serial data in a packet format that it sends over the LAN A NIC is installed in an expansion slot or can be built in Ev...

Page 54: ... connection PPTP Point to Point Tunneling Protocol encapsulates other protocols It is a new technology to create VPNs developed jointly by several vendors Private IP Address An IP address assigned to a computer on the LAN by the DHCP server for a specified lease time Private IP addresses are invisible to devices on the Internet See also Public IP Address Protocol A formal set of rules and conventi...

Page 55: ...e on a computer Routing Table A table listing available routes that is used by a router to determine the best route for a packet RTS Request To Send S Server In a client server architecture a dedicated computer that supplies files or services such as file transfer remote login or printing to clients Also see client Service Provider A company providing Internet connection services to subscribers SM...

Page 56: ...kets if requested TCP IP The Transmission Control Protocol Internet Protocol suite provides standards and rules for data communication between networks on the Internet It is the worldwide Internetworking standard and the basic communications protocol of the Internet Tunnel To place packets inside other packets to send over a network The protocol of the enclosing packet is understood by each endpoi...

Page 57: ...ed circuit for each line VoIP enables calls to travel as discrete data packets on shared lines VoIP is an important part of the convergence of computers telephones and television into a single integrated information network VPN A virtual private network is a private network that uses virtual connections tunnels routed over a public network usually the Internet to provide a secure and fast connecti...

Page 58: ...uthenticate a client before it can transfer data to another client WEP is part of IEEE 802 11b Wi Fi Wireless fidelity pronounced why fy brand name applied to products supporting IEEE 802 11b g WLAN Wireless LAN WPA Wi Fi Protected Access A security regimen developed by IEEE for protection of data on a WLAN WWW World Wide Web An interface to the Internet that you use to navigate and hyperlink to i...

Page 59: ...MGBI 516591 001 7 04 Visit our website at www motorola com broadband ...

Reviews: