background image

 

26 

Glossary 

For unfamiliar terms used below, look for entries elsewhere in the glossary. 

AD-HOC (IBSS) 

Ad-hoc mode does not require an AP or a wired network. Network that transmits 
wireless from computer to computer without the use of a base station (access point). 

 

Two or more wireless stations communicate directly to each other. An ad-hoc network 
may sometimes be referred to as an Independent Basic Service Set (IBSS). 

 

CHANNEL 

A radio frequency used by a wireless device is called a channel. 

 

EAP AUTHENTICATION 

EAP (Extensible Authentication Protocol) is an authentication protocol that runs on top of 
the  IEEE802.1X  transport  mechanism  in  order  to  support  multiple  types  of  user 
authentication.  By  using  EAP  to  interact  with  an  EAP-compatible  RADIUS  server,  an 
access point helps a wireless station and a RADIUS server perform authentication. 

 

ENCRYPTION 

The  reversible  transformation  of  data  from  the  original  to  a  difficult-to-interpret  format. 
Encryption is a mechanism for protecting confidentiality, integrity, and authenticity of data. 
It uses an encryption algorithm and one or more encryption keys. 

 

FRAGMENTATION THRESHOLD 

This is the maximum data fragment size that can be sent before the packet is fragmented 
into smaller packets. 

 

IEEE 802.1X 

The IEEE 802.1X standard outlines enhanced security methods for both the authentication 
of wireless stations and encryption key management. Authentication can be done using an 
external RADIUS server. 

 

INFRASTRUCTURE (BSS) 

When a number of wireless stations are connected using a single AP, you have a Basic 
Service Set (BSS). 

 

 

Summary of Contents for TEW-642EC

Page 1: ...1...

Page 2: ...to change without notice The manufacturer makes no representations or warranties with respect to the contents hereof and specifically disclaims any implied warranties of merchantability or fitness fo...

Page 3: ...ible for compliance could void the user s authority to operate this equipment This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may...

Page 4: ...ct In a domestic environment this product may cause radio interference in which case the user may be required to take adequate measures This transmitter must not be co located or operation in conjunct...

Page 5: ...ur Card 6 Package Content 7 System Requirement 8 LED Definition 7 Wireless Utility and Card Hardware Installation 8 Using the Utility to Configure Your Network 9 Link Information 10 Site Survey 11 Pro...

Page 6: ...d 128 bit WEP Wired Equivalent Privacy data encryption for network security Supports IEEE802 1x and WPA WPA2 Wi Fi Protected Access Multiple antennas design Driver support for Windows XP 2000 and Vist...

Page 7: ...d Utility STEP 1 Insert the Driver and Utility CD into CD drive STEP 2 If your CD Autorun is enabled the installation procedures will be started Otherwise open your CD folder and double click on the s...

Page 8: ...e Destination Folder for the application software If you would like you may change the destination folder to another location Click Next STEP 6 The wizard is ready to begin installation Click Install...

Page 9: ...STEP 8 Click Finish to complete the client utility installation STEP 9 At this moment please insert your Card to your Laptop after the following window pop up click Next on the Fund New Hardware Wizar...

Page 10: ...10 STEP 10 Choose Install the software automatically and click Next STEP 11 Click Continue Anyway STEP 12 Click Finish to complete the installation...

Page 11: ...ter until instructed to Step 1 Insert the Utility Driver CD ROM into your computer s CD ROM Drive and then click Install Driver Utility Step 2 Shut down the computer Step 3 Insert PC Card firmly into...

Page 12: ...12 Step 4 Click Locate and install driver software recommended...

Page 13: ...13 Step 5 Click on Next to continue Step 6 Click on Close to exit...

Page 14: ...cedure a new icon as shown below will automatically appear in the lower right tray bar Hold your mouse pointer over the icon and double click the left mouse button to open the Wireless Client Utility...

Page 15: ...me on the Profile tab SSID Displays the wireless network name Link Status Shows whether the station is associated to the wireless network Network Type The type of network the station is connected to T...

Page 16: ...A2 PSK or 802 1X Authentication Displays the authentication mode TCP IP Status IP Address Displays the computer s IP address Subnet Mask Displays subnet mask Gateway Displays gateway address 2 7 2 Sit...

Page 17: ...Profile Settings window opens to ask to create a profile for the network Follow the procedures to create profile for that network 2 7 3 Profile To add a new configuration profile click Add on the Pro...

Page 18: ...the Profile Settings screen to scan for available infrastructure and ad hoc networks On this list click Refresh to refresh the list at any time To configure a profile for Ad Hoc or Infrastructure mode...

Page 19: ...ng WPA WPA2 opens the WPA WPA2 Security Settings screen The options include TLS Transport Layer Security is a Point to Point Protocol PPP extension supporting additional authentication methods within...

Page 20: ...tunnel for the client WPA PSK WPA2 PSK Enables WPA WPA2 Passphrase security Fill in the WPA WPA2 Passphrase on Security Settings screen 802 1x Enables 802 1x security This option requires IT administr...

Page 21: ...preamble format The options include Long Short Auto RTS Threshold Value from 0 2347 FRAG Threshold Value from 256 2346 Qos Enable disable Qos After advance settings are finished the following screen...

Page 22: ...22 Using Windows Wireless Zero Configuration Step 1 Click on the balloon option One or more wireless networks are in range of this computer Step 2 Choose a network from the list...

Page 23: ...ity please supply the wireless security key Enter the wireless key in twice at the security prompt Using Windows Vista Step 1 On the bottom right hand corner of the screen right click the wireless net...

Page 24: ...24 Step 2 Select the desired network and then click Connect Step 3 Click on Continue anyway Step 4 Click on Close...

Page 25: ...install the driver 3 2 Uninstall the Client Utility Follow the steps below to remove the Client Utility from your computer Step 1 To remove the utility from the OS go to Start Control Panel Step 2 Dou...

Page 26: ...tication By using EAP to interact with an EAP compatible RADIUS server an access point helps a wireless station and a RADIUS server perform authentication ENCRYPTION The reversible transformation of d...

Page 27: ...E 802 1X and Extensible Authentication Protocol EAP to authenticate wireless clients using an external RADIUS database If you do not have an external RADIUS server use WPA PSK WPA2 PSK WPA Pre Shared...

Page 28: ...28...

Reviews: