background image

 

 

6.  What is BSS ID

 

A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be 

configured with the same BSS ID. 

 

7.  What is WEP

 

WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key 

algorithm, as described in the IEEE 802 .11 standard. 

 

8.  What is TKIP? 

TKIP is a quick-fix method to quickly overcome the inherent weaknesses in WEP security, 

especially the reuse of encryption keys. TKIP is involved in the IEEE 802.11i WLAN security 

standard, and the specification might be officially released by early 2003. 

 

9. What 

is 

AES? 

AES (Advanced Encryption Standard), a chip-based security, has been developed to ensure the 

highest degree of security and authenticity for digital information, wherever and however 

communicated or stored, while making more efficient use of hardware and/or software than 

previous encryption standards. It is also included in IEEE 802.11i standard. Compare with AES, 

TKIP is a temporary protocol for replacing WEP security until manufacturers implement AES at 

the hardware level. 

 

10.  Can Wireless products support printer sharing

   

Wireless products perform the same function as LAN products. Therefore, Wireless products can 

work with Netware, Windows 2000, or other LAN operating systems to support printer or file 

sharing. 

 

11.  Would the information be intercepted while transmitting on air

 

WLAN features two-fold protection in security. On the hardware side, as with Direct Sequence 

Spread Spectrum technology, it has the inherent security feature of scrambling. On the software 

side, WLAN series offer the encryption function (WEP) to enhance security and Access Control. 

Users can set it up depending upon their needs. 

 

12.  What is DSSS

What is FHSS

And what are their differences

 

Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that changes frequency 

in a pattern that is known to both transmitter and receiver. Properly synchronized, the net effect 

is to maintain a single logical channel. To an unintended receiver, FHSS appears to be 

short-duration impulse noise. Direct-sequence spread-spectrum (DSSS) generates a redundant 

bit pattern for each bit to be transmitted. This bit pattern is called a chip (or chipping code). The 

longer the chip is, the greater the probability that the original data can be recovered. Even if one 

or more bits in the chip are damaged during transmission, statistical techniques embedded in the 

radio can recover the original data without-the need for retransmission. To an unintended 

receiver, DSSS appears as low power wideband noise and is rejected (ignored) by most 

narrowband receivers. 

 

 

 

27

 

Summary of Contents for WL-3565

Page 1: ...802 11g Wireless PCMCIA Adapter WL 3565 User s Manual...

Page 2: ...turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures 1 Reorient or relocate the receiving antenna 2 Increase the separati...

Page 3: ...es Iceland Liechtenstein Norway and Switzerland WEEE regulation To avoid the potential effects on the environment and human health as a result of the presence of hazardous substances in electrical and...

Page 4: ...6 3 1 Site Survey 7 3 2 Profile 7 3 2 1 Configure the Profile 9 3 2 1 1 Configuration 9 3 2 1 2 Authentication and Security 11 3 2 1 3 802 1x Setting Certification 13 3 2 1 4 802 1x Setting CA Server...

Page 5: ...mption of the WL 3565 is also very low It provides several levels of power saving modes allowing user customizes the way of saving the power from his her portable or handheld devices 1 1 Features z 2...

Page 6: ...ity Operating 10 to 90 Non Condensing Storage 5 to 95 Non Condensing Dimensions 118 x 54 x 5 mm L x W x H Weight 30g Certifications FCC CE 1 3 Package Contents Before you begin the installation please...

Page 7: ...e completed a menu screen will appear 3 Click the Configuration Utility hyperlink in the WL 3565 field to initiate the installation procedure Note If the menu screen does not appear click Start at the...

Page 8: ...You can see the installation progress in this screen 8 The system will automatically detect the card and display Found New Hardware Wizard screen Click Install the Software Automatically to continue...

Page 9: ...9 When the Hardware Installation screen appears click Continue Anyway to proceed 10 Click Finish to complete Found New Hardware Wizard 11 Click Finish to complete PLANET WL 3565 Setup 5...

Page 10: ...on Utility appears as an icon on the system tray of Windows while the card is running You can open the utility by double click on the icon Right click the icon there are some items for you to operate...

Page 11: ...networks within range of your card It also displays the information of the networks including the SSID BSSID Signal Strength Channel Encryption Authentication and Network Type If you want to connect...

Page 12: ...c This sign indicates the activated profile is been connecting This sign indicates the activated profile is not been connecting Add Delete Edit Button Click these buttons to add delete edit the select...

Page 13: ...nd then only the device with the same SSID can interconnect to the card If you want to add the network nearby to the profile list pull down the menu all the networks will be listed for you to add one...

Page 14: ...ate the wireless connection mode for the Ad Hoc networ 802 11 B only This card can be compatible with both 802 11g and 802 11b wireless stations If there are only 802 11b wireless stations in the netw...

Page 15: ...hared Only wireless devices using a shared key WEP Key This setting h the card intends to connect Open No authentication is S identified are allowed to connecting each other uthentication Type EAP LEA...

Page 16: ...known as Pre Shared Key the user manually enters the starting password in their access point gateway as well as in each wireless stations in the network WPA PSK takes over automatically from that poi...

Page 17: ...luding a z and 0 9 as the encryption keys For example 0123456aef or test1 1 range or 13 digit ASCII characters including a z and 0 9 as the encryption keys For example 01234567890123456789abcdef o 2 1...

Page 18: ...authentication protocols this card has supported are included as follows This setting has to be consistent with the wireless APs or Routers that the card intends to connect PEAP TTLS PEAP and TTLS are...

Page 19: ...t status Identity Enter the name as the identity for the server Password Enter the password as the identity for the server Use Client Certificate A client certificate is required for TLS and is option...

Page 20: ...s an issuer as a trusted root authority by placing the issuer s self signed certificate which contains the issuer s public key into the trusted root certification authority certificate store of the ho...

Page 21: ...e network the card is connecting to Extra Info Display the link status Channel Display the number of the radio channel and the frequency used for the networking Link Speed Mbps Display the transmissio...

Page 22: ...ignal been received by the card This indicator helps to find the proper position of the wireless device for quality network operation Noise Level Display the noise level in the wireless environment 3...

Page 23: ...ere are only 802 11b wireless stations in the network you can set the card to this mode 802 11 G only This card can be compatible with both 802 11g and 802 11b wireless stations If there are only 802...

Page 24: ...B only the maximum data rate is 11Mbps 11b so that there are only Auto 1 2 5 5 11Mbps options you can select Tx BURST Tx Burst enables the card to deliver the better throughput in the same period and...

Page 25: ...int configured to provide Wireless Domain Services WDS takes the place of the RADIUS server and authenticates the client so quickly that there is no perceptible delay in voice or other time sensitive...

Page 26: ...ce over Internet Protocol VoIP phones televisions VCRs and MP3 players IEEE 802 11e Quality of Service QoS The Wi Fi Alliance defined WMM as a profile of the IEEE 802 11e extensions for 802 11 network...

Page 27: ...B Right Click the Wireless Network Connection and select Properties C Click Configure 23...

Page 28: ...on Description AdHoc Wireless Mode Select B G mixed or Pure B mode Auto Channel Select Not applicable on WL 3565 Auto Reconnect Mode Auto connecting to AP when disconnected B G protection To avoid col...

Page 29: ...ll not write to EEPROM It is only used in run time Network Type Selecting Infrastructure or AdHoc mode Power Saving Mode Selecting different power mode Radio On Off RF switching RTS threshold To preve...

Page 30: ...es the modulation schemes found in 802 11b including CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps B A protection mechanism called RTS CTS that governs how 802 11g devices and 80...

Page 31: ...h Netware Windows 2000 or other LAN operating systems to support printer or file sharing 11 Would the information be intercepted while transmitting on air WLAN features two fold protection in security...

Page 32: ...her words more bandwidth is consumed than in the case of narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver knows...

Reviews: