27
The IEEE 802.11b/g Wireless LAN standards subcommittee formulating standards for the industry. The objective is
to enable wireless LAN hardware from different manufacturers to communicate.
Infrastructure Mode
A client setting providing connectivity to an Access Point. As compared to Ad-Hoc Mode where PCs communicate
directly with each other clients set in
Infrastructure Mode all pass data through a central Access Point. The Access Point not only mediates Wireless network
traffic in the immediate neighborhood but also pro-vides communication with the wired network. An integrated wireless
and wireless and wired LAN is called an Infrastructure configuration. Infrastructure is applicable to enterprise scale for
wireless access to central database, or wireless application for mobile workers.
Roaming
The ability to use a wireless device and be able to move from one access point range to another without losing the
connection.
RTS/CTS Threshold Value
Should remain at its default setting of 2,347. A preamble is a signal used to synchronize the transmission timing
between two or more systems. A series of transmission pulses is sent before the data to indicate that someone is about
transmit data.?This ensures that systems receiving the information correctly when the data transmission starts.
Shared Key
Is when both the sender and recipient share a secret key. Both units use this key for an extended length of time,
sometimes indefinitely. Any eavesdropper that discovers the key may decipher all packets until the key is changed.
Signal Strength
The signal level indicates the strength of the signal as received at the wireless network interface.
SSID (Service Set Identifier)
Is the unique name shared among all points in a wireless network. The SSID must be identical for all points in the
network. It is case sensitive and must not exceed 32 characters.
WEP (Wired Equivalent Privacy)
A data privacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .11 standard. The
optional cryptographic confidentiality algorithm specified by IEEE 802.11 used to provide data confidentiality that is
subjectively equivalent to the confidentiality of a wired LAN medium that does not employ cryptographic techniques to
enhance privacy.
WPA
Wi-Fi Protected Access, a specification to improve the security level of wireless networks. It uses 802.1x and EAP to
control network access. Temporal Key Integrity Protocol (TKIP) is used to secure data during transmission.
,
Summary of Contents for EP-9001-g
Page 1: ...EP 9001 g 54M WLAN USB Adapter User Manual...
Page 10: ...10 click Next Click Finish when the installation is completed...
Page 12: ...12 The following window should launch automatically Select Remove and click Next...
Page 13: ...13 Select OK to continue uninstallation...
Page 14: ...14 Click OK to finish when the uninstallation is completed 4 Configuration Utility...