background image

 

37

5. Would the information be intercepted while transmitting on air? 

WLAN features two-fold protection in security. On the hardware side, as with Direct 

Sequence Spread Spectrum technology, it has the inherent security feature of 

scrambling. On the software side, WLAN offers the encryption function (WEP) to 

enhance security and access control. 

 

6. What is WEP? 

WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 64-bit or 

128-bit shared key algorithm, as described in the IEEE 802.11 standard.   

 

7. What is infrastructure mode? 

When a wireless network is set to infrastructure mode, the wireless network is 

configured to communicate with a wired network through a wireless access point. 

 

8. What is roaming? 

Roaming is the ability of a portable computer user to communicate continuously 

while moving freely throughout an area greater than that covered by a single access 

point. Before using the roaming function, the workstation must make sure that it is the 

same channel number with the access point of dedicated coverage area. 

 

To achieve true seamless connectivity, the wireless LAN must incorporate a number 

of different functions. Each node and access point, for example, must always 

acknowledge receipt of each message. Each node must maintain contact with the 

wireless network even when not actually transmitting data. Achieving these functions 

simultaneously requires a dynamic RF networking technology that links access points 

and nodes. In such a system, the user’s end node undertakes a search for the best 

possible access to the system. First, it evaluates such factors as signal strength and 

quality, as well as the message load currently being carried by each access point and 

the distance of each access point to the wired backbone. Based on that information, 

the node next selects the right access point and registers its address. Communications 

between end node and host computer can then be transmitted up and down the 

backbone. As the user moves on, the end node’s RF transmitter regularly checks the 

system to determine whether it is in touch with the original access point or whether it 

should seek a new one. When a node no longer receives acknowledgment from its 

original access point, it undertakes a new search. Upon finding a new access point, it 

then re-registers, and the communication process continues. 

 

 

Summary of Contents for DNMA-H92

Page 1: ...WLAN 802 11a b g n MiniPCI module User Manual Version 1 0 Nov 2009...

Page 2: ...n a retrieval system or transmitted in any form or by any means whether electronic mechanical photocopying recording or otherwise without the prior writing of the publisher Windows XP Vista are tradem...

Page 3: ...or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Co...

Page 4: ...e this end product is installed and operated The end user has to be informed that the FCC radio frequency exposure guidelines for an uncontrolled environment can be satisfied The end user has to also...

Page 5: ...4 must accept any interference received including interference that may cause undesired operation...

Page 6: ...AL SETUP PROCESSES 13 2 3 UNINSTALLATION 14 3 Connecting to an Existing Network 17 4 Creating an Ad Hoc New Network 23 5 Modifying a Wireless Network 26 5 1 INFRASTRUCTURE MODE AND AD HOC MODE 26 5 2...

Page 7: ...ess networking This User Manual contains detailed instructions in the operation of this product Please keep this manual for future reference System Requirements z A laptop PC contains 50 MB of free ha...

Page 8: ...ver please first uninstall the previously installed driver See Chapter 2 3 Uninstallation in this User Manual Follow the steps below to complete the driver utility installation 1 Install you card in y...

Page 9: ...8 4 Choose this option to install the driver and client utilities and click Next...

Page 10: ...9 5 Click Next to continue or click Browse to choose a destination folder 6 Click Next to continue or change the name of the program folder...

Page 11: ...10 7 Click Next 8 Choose the configuration tool for your client card and click Next to continue or...

Page 12: ...11 9 Click Yes to continue 10 Click OK to continue 11 Installing process...

Page 13: ...12 12 Reboot your computer...

Page 14: ...oftware installation procedure each operating system may prompt different specific options 1 Windows 2000 XP Vista Select Install the software automatically when the window with this option appears an...

Page 15: ...all running programs 1 Click Start Programs Control Panel Install uninstall program Atheros client installation program 2 Choose Remove Click Next 3 Choose Uninstall the previous installation and clic...

Page 16: ...15 5 Click Yes to remove the profiles and click No to remove your profiles...

Page 17: ...16 6 Click Finish and reboot your computer The Uninstall is now completed...

Page 18: ...isting Network 1 Double click the shortcut icon of Atheros Client Utility on the desktop and the Configuration window appears 2 Click Profile Management tab 3 Click Scan 4 Choose which AP you want to...

Page 19: ...18 5 Give a Profile name for the SSID and Click OK 6 Give a Profile name for the SSID and Click OK...

Page 20: ...e Smart Selection Any displays in Profile List 7 If the chosen network has security enabled the Security tab displays Select the security option used by the network Contact the network administrator f...

Page 21: ...20 8 Once connected you can check the signal strength from the following icon in the Windows System Tray...

Page 22: ...the signal strength using colors Hold the mouse cursor over the tray icon to display the current configuration profile name and association as well as transmit and receive speed and the wireless adap...

Page 23: ...ive configuration profile Auto Profile Selection Shows whether auto profile selection is enabled Connection Status Displays whether the adapter is connected to a wireless network Link Quality Lists th...

Page 24: ...rol Panel and double click Network Connections 2 Right click Wireless Network Connection of WLAN a b g n mini card Module and select Properties 3 Select Wireless Networks tab and uncheck the check box...

Page 25: ...nction specified by FCC The software will not let you to use ad hoc under 802 11a 1 In the Profile Management tab click New 2 In the Profile Management window click Advance tab and choose Ad Hoc in th...

Page 26: ...25 4 Give a Profile name for the SSID and Click OK to save the settings 5 Click the Security tab If not using security select None Please refer to the chap 5 for the security setting...

Page 27: ...ther by first going through an Access Point AP Wireless devices can communicate with each other or can communicate with a wired network When one AP is connected to wired network and a set of wireless...

Page 28: ...licking the shortcut icon on the desktop Note If there s no network name listed in the Profile List click Refresh button and double click a Network Name from Available Networks The chosen Network Name...

Page 29: ...e Identifies the configuration profile This name must be unique Profile names are not case sensitive Client Name Identifies the client machine Network Names SSIDs The IEEE 802 11 wireless network name...

Page 30: ...of security mode the station is using The options include the following WPA WPA2 CCKM WPA WPA2 Passphrase 802 1x Pre Shared Key Static WEP None These options define the unique encryption key for netwo...

Page 31: ...er is associating to has WEP set to Optional and the client has WEP enabled make sure that Allow Association to Mixed Cells is checked on the Security Tab to allow association Pre Shared Key Static WE...

Page 32: ...check box which means no time limit is imposed for finding the domain controller Note The authentication process times out whenever the authentication timer times out or the time for finding the domai...

Page 33: ...editable Power Save Mode Specify Maximum mode causes the access point to buffer incoming messages for the wireless adapter The adapter periodically polls the access point to see if any messages are wa...

Page 34: ...is selection specifies the which channel with the adapter starts the ad hoc network with The wireless adapter must match the wireless mode and channel of the clients it associates to 802 11 Authentica...

Page 35: ...e settings and click OK to save the settings If the network uses DHCP server choose Obtain an IP address automatically If the network does not use DHCP server choose Use the following IP address to se...

Page 36: ...reless Network Connection of WLAN a b g n mini card Module and make sure this connection is Enabled 3 Right click the Wireless Network Connection of WLAN a b g n mini card Module and then click Proper...

Page 37: ...he parameters of the spread spectrum signal being broadcast If a receiver is not tuned to the right frequency a spread spectrum signal looks like background noise There are two main alternatives Direc...

Page 38: ...ectivity the wireless LAN must incorporate a number of different functions Each node and access point for example must always acknowledge receipt of each message Each node must maintain contact with t...

Reviews: