background image

 

14 

 

Appendix A: FAQ about WLAN 

 

1.  What is Spread Spectrum? 

Spread Spectrum technology is a wideband radio frequency technique developed by the military 

for use in reliable, secure, mission-critical communications systems. It is designed to trade off 

bandwidth efficiency for reliability, integrity, and security. In other words, more bandwidth is 

consumed than in the case of narrowband transmission, but the trade-off produces a signal that is, 

in effect, louder and thus easier to detect, provided that the receiver knows the parameters of the 

spread-spectrum signal being broadcast. If a receiver is not tuned to the right frequency, a 

spread-spectrum signal looks like background noise. There are two main alternatives, Direct 

Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS). 

 

2.  What is DSSS? What is FHSS? And what are their differences? 

Frequency-Hopping Spread-Spectrum (FHSS) uses a narrowband carrier that changes frequency 

in a pattern that is known to both transmitter and receiver. Properly synchronized, the net effect is 

to maintain a single logical channel. To an unintended receiver, FHSS appears to be 

short-duration impulse noise. Direct-Sequence Spread-Spectrum (DSSS) generates a redundant 

bit pattern for each bit to be transmitted. This bit pattern is called a chip (or chipping code). The 

longer the chip, the greater the probability that the original data can be recovered. Even if one or 

more bits in the chip are damaged during transmission, statistical techniques embedded in the 

radio can recover the original data without the need for retransmission. To an unintended receiver, 

DSSS appears as low power wideband noise and is rejected (ignored) by most narrowband 

receivers. 

 

3.  Would the information be intercepted while transmitting on air? 

WLAN features two-fold protection in security. On the hardware side, as with Direct Sequence 

Spread Spectrum technology, it has the inherent security feature of scrambling. On the software 

side, WLAN offers the encryption function (WEP) to enhance security and access control. 

 

4.  What is WEP? 

WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 64-bit or 128-bit shared 

key algorithm, as described in the IEEE 802.11 standard.   

 

5.  What is infrastructure mode? 

When a wireless network is set to infrastructure mode, the wireless network is configured to 

communicate with a wired network through a wireless access point. 

 

Summary of Contents for DNUA-P75

Page 1: ...ment No part of this publication may be reproduced stored in a retrieval system or transmitted in any form or by any means whether electronic mechanical photocopying recording or otherwise without the prior writing of the publisher Pentium is trademark of Intel All copyright reserved ...

Page 2: ...eceiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment This device complies with Part 15 of the FCC Rules Operatio...

Page 3: ...ystems ii the maximum antenna gain permitted for devices in the bands 5250 5350 MHz and 5470 5725 MHz shall comply with the e i r p limit and iii the maximum antenna gain permitted for devices in the band 5725 5825 MHz shall comply with the e i r p limits specified for point to point and non point to point operation as appropriate iv Users should also be advised that high power radars are allocate...

Page 4: ...auser du brouillage et ou des dommages aux dispositifs LAN EL Radiation Exposure Statement This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operated with minimum distance 20cm between the radiator your body Déclaration d exposition aux radiations Cet équipement est conforme aux limites d exposition aux rayonn...

Page 5: ...odulation techniques Harmonized EN covering the essential requirements of article 3 2 of the R TTE Directive EN 301 893 V1 7 1 2012 06 Broadband Radio Access Networks BRAN 5 GHz high performance RLAN Harmonized EN covering the essential requirements of article 3 2 of the R TTE Directive EN 301 489 1 V1 9 2 2011 Electromagnetic compatibility and Radio spectrum Matters ERM ElectroMagnetic Compatibil...

Page 6: ...se de equipo cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999 5 CE Ελληνική Greek ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ name of manufacturer ΔΗΛΩΝΕΙ ΟΤΙ type of equipment ΣΥΜΜΟΡΦΩΝΕΤΑΙ ΠΡΟΣ ΤΙΣ ΟΥΣΙΩΔΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ ΛΟΙΠΕΣ ΣΧΕΤΙΚΕΣ ΔΙΑΤΑΞΕΙΣ ΤΗΣ ΟΔΗΓΙΑΣ 1999 5 ΕΚ Français French Par la présente nom du fabricant déclare que l appareil type d appare...

Page 7: ...nowieniami Dyrektywy 1999 5 EC Português Portuguese Nome do fabricante declara que este tipo de equipamento está conforme com os requisitos essenciais e outras disposições da Directiva 1999 5 CE Slovensko Slovenian Ime proizvajalca izjavlja da je ta tip opreme v skladu z bistvenimi zahtevami in ostalimi relevantnimi določili direktive 1999 5 ES Slovensky Slovak Meno výrobcu týmto vyhlasuje že typ ...

Page 8: ...電機之使用不得影響飛航安全及干擾合法通信 經發現有干擾現象 時 應立即停用 並改善至無干擾時方得繼續使用 前項合法通信 指依電信法規定作業之無線電通信 低功率射頻電機須忍受合法通信或工 業 科學及醫療用電波輻射性電機設備之干擾 無線傳輸設備 UNII 在 5 25 5 35 秭赫頻帶內操作之無線資訊傳輸設備 限於室內使用 4 7 5 無線資訊傳輸設備忍受合法通信之干擾且不得干擾合法通信 如造成干擾 應立即停用 俟無干擾之虞 始得繼續使用 4 7 6 無線資訊傳設備的製造廠商應確保頻率穩定性 如依製造廠商使用手冊上所述正常操作 發射的信號應維持於操作頻帶中 4 7 7 ...

Page 9: ... 2 DRIVER UTILITY INSTALLATION UNINSTALLATION 9 3 CONNECTING TO AN EXISTING NETWORK 9 4 MODIFYING A WIRELESS NETWORK 10 4 1 MODIFYING GENERAL SETTINGS 10 4 2 MODIFYING SECURITY SETTINGS 11 5 SPECIFICATIONS 13 APPENDIX A FAQ ABOUT WLAN 14 ...

Page 10: ... function without installing driver or utility 3 Connecting to an Existing Network 1 Use the remote control that came with your TV to access the network configuration settings page 2 Select the scanning wireless network function The system starts to scan for available network On this list click Refresh to refresh the list at any time 3 Select the network you want to connect to 4 If the chosen netw...

Page 11: ...e settings below for your network Profile Name Identifies the configuration wireless network profile This name must be unique Profile names are not case sensitive Client Name Identifies the client machine Use this profile for Access Point mode Configures station to operate in Access Point mode Network Names SSIDs The IEEE 802 11 wireless network name This field has a maximum limit of 32 characters...

Page 12: ...ions include EAP FAST EAP TLS EAP TTLS EAP SIM PEAP EAP GTC PEAP EAP MSCHAP V2 LEAP WPA WPA2 Passphrase Enables WPA WPA2 Passphrase security Click on the Configure button and fill in the WPA WPA2 Passphrase 802 1x Enables 802 1x security This option requires IT administration Choosing 802 1x opens the 802 1x EAP type drop down menu The options include EAP FAST EAP TLS EAP TTLS EAP SIM PEAP EAP GTC...

Page 13: ...ich means no time limit is imposed for finding the domain controller Note The authentication process times out whenever the authentication timer times out or the time for finding the domain controller is reached Group Policy Delay Specify how much time elapses before the Windows logon process starts group policy Group policy is a Windows feature used by administrators to specify configuration opti...

Page 14: ... US Canada Taiwan 11 1 11 Major European country 13 1 13 France 4 10 13 Japan 11b 14 1 13 11g 13 1 13 China 13 1 13 802 11na 1 US Canada Taiwan 12 non overlapping channels 36 40 44 48 52 56 60 64 100 104 108 112 116 120 124 128 132 136 140 149 153 157 161 165 2 Europe 19 non overlapping channel 36 40 44 48 52 56 60 64 100 104 108 112 116 120 124 128 132 136 140 3 Japan 19 non overlapping channels ...

Page 15: ...ded receiver FHSS appears to be short duration impulse noise Direct Sequence Spread Spectrum DSSS generates a redundant bit pattern for each bit to be transmitted This bit pattern is called a chip or chipping code The longer the chip the greater the probability that the original data can be recovered Even if one or more bits in the chip are damaged during transmission statistical techniques embedd...

Page 16: ...logy that links access points and nodes In such a system the user s end node undertakes a search for the best possible access to the system First it evaluates such factors as signal strength and quality as well as the message load currently being carried by each access point and the distance of each access point to the wired backbone Based on that information the node next selects the right access...

Reviews: