background image

 

27

Glossary 

For unfamiliar terms used below, look for entries elsewhere in the glossary. 

A

D

-H

OC

 (IBSS) 

Ad-hoc mode does not require an AP or a wired network. A network that transmits wireless 
from computer to computer without the use of a base station (access point). 

 

Two or more wireless stations communicate directly to each other. An ad-hoc network may 
sometimes be referred to as an Independent Basic Service Set (IBSS). 

C

HANNEL 

A radio frequency used by a wireless device is called a channel. 

E AP  A

UTHENTICATION 

EAP (Extensible Authentication Protocol) is an authentication protocol that runs on top of the 
IEEE802.1X transport mechanism in order to support multiple types of user authentication. By 
using EAP to interact with an EAP-compatible RADIUS server, an access point helps a wireless 
station and a RADIUS server perform authentication. 

E

NCRYPTION 

The reversible transformation of data from the original to a difficult-to-interpret format. Encryp-
tion is a mechanism for protecting confidentiality, integrity, and authenticity of data. It uses an 
encryption algorithm and one or more encryption keys. 

F

RAGMENTATION 

T

HRESHOLD 

This is the maximum data fragment size that can be sent before the packet is fragmented into 
smaller packets. 

IEEE 802.1X 

The IEEE 802.1X standard outlines enhanced security methods for both the authentication of 
wireless stations and encryption key management. Authentication can be done using an external 
RADIUS server. 

I

NFRASTRUCTURE 

(BSS) 

When a number of wireless stations are connected using a single AP, you have a Basic Ser-
vice Set (BSS). 

R

OAMING 

In an infrastructure network, wireless stations are able to switch from one BSS to another as 
they move between the coverage areas. During this period, the wireless stations maintain 
uninterrupted connection to the network. This is roaming. As the wireless station moves from 
place to place, it is responsible for choosing the most appropriate AP depending on the signal 
strength, network utilization among other factors. 

Summary of Contents for EZ Connect N SMCWPCI-N

Page 1: ...USER GUIDE SMCWPCI N EZ Connect N Draft 11n Wireless PCI Adapter...

Page 2: ...e initial warranty whichever is longer SMC is not responsible for any custom software or firmware configuration information or memory data of Customer contained in stored on or integrated with any pro...

Page 3: ...H DAMAGES SOME STATES DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES OR THE LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES FOR CONSUMER PRODUCTS SO THE ABOVE LIMITATIONS AND EXCLUSIONS MAY NOT AP...

Page 4: ...which the receiver is connected Consult the dealer or an experienced radio TV technician for help FCC Caution To assure continued compliance example use only shielded interface cables when connecting...

Page 5: ...Security 11 Chapter 3 Hardware and Wireless Utility 13 About Your Draft 11n Wireless PCI Adapter 13 Package Content 13 System Requirement 13 LED Definition 13 Hardware and Wireless Utility Installatio...

Page 6: ...ng Wireless Security to operate and enjoy the SMCWPCI N It is included for your reference only The following conventions are used in this manual THE NOTE SYMBOL INDICATES ADDITIONAL INFORMATION ON THE...

Page 7: ...ually increases the transmission data rate again until it reaches the highest available transmission rate Types of Wireless Networks Wireless LAN networking works in either of the two modes ad hoc and...

Page 8: ...8 Independent Basic Service Set IBSS To set up an ad hoc network configure all the stations in ad hoc mode Use the same SSID and channel for each station...

Page 9: ...9 When a number of wireless stations are connected using a single access point you have a Basic Service Set BSS...

Page 10: ...w communication is done through the access points which relay data packets to other wireless stations or devices connected to the wired network Wireless stations can then access resources such as a pr...

Page 11: ...with the most secure EAP Extensible Authentication Protocol is used for authentication and utilizes dynamic WEP key exchange EAP requires interaction with a RADIUS Remote Authentication Dial In User...

Page 12: ...e two ways to create WEP keys in your SMCWPCI N Automatic WEP key generation based on a password phrase called a passphrase The passphrase is case sensitive You must use the same passphrase for all WL...

Page 13: ...encryption EZ Installation Wizard for easy installation Supports Windows 2000 XP WLAN management utility Three external antennas for maximum speed and coverage Package Content EZ Connect N Wireless PC...

Page 14: ...nnect N Wireless PCI Adapter until instructed 1 Put the EZ Installation Documentation CD in to your CD ROM drive The CD will auto run If the CD does not auto run browse to your CD drive double click t...

Page 15: ...less you are an advanced user To change the installation folder click the Browse button and specify a new location Click Next to continue 5 The wizard is ready to begin installation Click Install 6 A...

Page 16: ...done by pulling the antennas from the base 10 Once the EZ Connect N Wireless PCI Adapter is inserted screw on the larger 5dBi antenna to the connector marked with a green sticker If you had to remove...

Page 17: ...17 14 A Hardware Installation warning may appear click Continue Anyway 15 Click Finish to complete the Driver Utility installation...

Page 18: ...in the lower right tray bar Hold your mouse pointer over the icon and double click the left mouse button to open the Wireless Client Utility The Wireless Client Utility window as shown below will app...

Page 19: ...work Network Type The type of network the station is connected to The options include Infrastructure access point Ad Hoc Wireless Mode Displays the wireless mode 802 11g 11b or 11n Transmit Rate Displ...

Page 20: ...ress Displays the computer s IP address Subnet Mask Displays subnet mask Gateway Displays gateway address DNS Server Display DNS server address Site Survey Click the Site Survey tab to see available i...

Page 21: ...the Profile Settings window opens to ask to create a profile for the network Follow the procedures to create profile for that network Profile To add a new configuration profile click Add on the Profil...

Page 22: ...the Profile Settings screen to scan for available infrastructure and ad hoc networks On this list click Refresh to refresh the list at any time To configure a profile for Ad Hoc or Infrastructure mode...

Page 23: ...Bit 128 Bit modes support Passphrase WPA WPA2 Enables the use of Wi Fi Protected Access WPA Choosing WPA WPA2 opens the WPA WPA2 Security Settings screen The options include TLS Transport Layer Secur...

Page 24: ...d via a secure TLS tunnel for the client LEAP Lightweight and Efficient Application Protocol is the general framework for a set of high performance efficient protocols which are ideal for mobile and w...

Page 25: ...Continuous Access Mode z Maximum Power Saving z Fast Power Saving 802 11b Preamble Displays the 802 11b preamble format The options include z Long z Short z Auto RTS Threshold Value from 0 2347 FRAG T...

Page 26: ...install the driver Uninstall the Client Utility Follow the steps below to remove the Client Utility from your computer Step 1 To remove the utility from the OS go to Start Control Panel Step 2 Double...

Page 27: ...e original to a difficult to interpret format Encryp tion is a mechanism for protecting confidentiality integrity and authenticity of data It uses an encryption algorithm and one or more encryption ke...

Page 28: ...that only requires a single identical password entered into each access point wireless gateway and wireless client As long as the passwords match clients will be granted access to a WLAN WEP WEP Wire...

Page 29: ...ISH En www smc com Ud podr encontrar la informaci n relativa a servicios de soporte t cnico DUTCH Technische ondersteuningsinformatie beschikbaar op www smc com PORTUGUES Informa es sobre Suporte T cn...

Reviews: