Cisco WPC54GX Скачать руководство пользователя страница 37

33

Appendix D: Glossary

Wireless-G Notebook Adapter with SRX

DTIM

 (

D

elivery 

T

raffic 

I

ndication 

M

essage) - A message included in data packets that can increase wireless 

efficiency.

Dynamic IP Address

 - A temporary IP address assigned by a DHCP server.

EAP

 (

E

xtensible 

A

uthentication 

P

rotocol) - A general authentication protocol used to control network access. 

Many specific authentication methods work within this framework.

EAP-PEAP 

(

E

xtensible 

A

uthentication 

P

rotocol-

P

rotected 

E

xtensible 

A

uthentication 

P

rotocol) - A mutual 

authentication method that uses a combination of digital certificates and another system, such as passwords.

EAP-TLS

 (

E

xtensible 

A

uthentication 

P

rotocol-

T

ransport 

L

ayer 

S

ecurity) - A mutual authentication method that 

uses digital certificates.

Encryption

 - Encoding data transmitted in a network. 

Ethernet

 - IEEE standard network protocol that specifies how data is placed on and retrieved from a common 

transmission medium.

Finger

 - A program that tells you the name associated with an e-mail address.

Firewall

 - A set of related programs located at a network gateway server that protects the resources of a 

network from users from other networks.

Firmware

 - The programming code that runs a networking device.

Fragmentation

 -Breaking a packet into smaller units when transmitting over a network medium that cannot 

support the original size of the packet. 

FTP

 (

F

ile 

T

ransfer 

P

rotocol) - A protocol used to transfer files over a TCP/IP network.

Full Duplex

 - The ability of a networking device to receive and transmit data simultaneously.

Gateway

 - A device that interconnects networks with different, incompatible communications protocols. 

Half Duplex

 - Data transmission that can occur in two directions over a single line, but only one direction at a 

time.

Hardware

 - The physical aspect of computers, telecommunications, and other information technology devices.

HTTP

 (

H

yper

T

ext 

T

ransport 

P

rotocol) - The communications protocol used to connect to servers on the World 

Wide Web.

Содержание WPC54GX

Страница 1: ...A Division of Cisco Systems Inc Model No Notebook Adapter Wireless G WPC54GX User Guide WIRELESS GHz 2 4802 11g with SRX ...

Страница 2: ...cal terms that are presented like this Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section in the Table of Contents This exclamation point means there is a caution or warning and is something that could damage your property or the Adapter word definition This c...

Страница 3: ...rdware Installation 11 Connecting the Adapter 11 Chapter 6 Using the Wireless Network Utility 12 Accessing the Utility 12 Navigating the Utility 12 Using the Utility 17 Wireless Zero Configuration 21 Appendix A Troubleshooting 23 Common Problems and Solutions 23 Frequently Asked Questions 23 Appendix B Wireless Security 27 Security Precautions 27 Security Threats Facing Wireless Networks 27 Append...

Страница 4: ...y to Install Program 9 Figure 4 7 Installing the Software 10 Figure 4 8 Setup Wizard Complete 10 Figure 5 1 How the Adapter installs into your notebook 11 Figure 6 1 Wireless Network Utility Icon 12 Figure 6 2 Main Screen 12 Figure 6 3 Properties 14 Figure 6 4 Profile Editor 18 Figure 6 5 Advanced Profile Settings 20 Figure 6 6 Passphrase Entry 20 Figure 6 7 Choose a Wireless Network 21 Figure 6 8...

Страница 5: ...connected you can keep in touch with your e mail access the Internet and share files and other resources such as printers and network storage with other computers on the network At home you can surf the web or use instant messaging to chat with friends while sitting out on the patio Your wireless connection is protected by up to 128 bit WEP encryption You ll also be able to connect with any of the...

Страница 6: ...r shows you how to connect the Adapter to your PC Chapter 6 Using the Wireless Network Utility This chapter show you how to use the Adapter s Wireless Network Utility Appendix A Troubleshooting This appendix describes some problems and solutions as well as frequently asked questions regarding installation and use of the Adapter Appendix B Wireless Security This appendix discusses security issues r...

Страница 7: ... Notebook Adapter with SRX Appendix G Regulatory Information This appendix supplies the Adapter s regulatory information Appendix H Contact Information This appendix provides contact information for a variety of Linksys resources including Technical Support ...

Страница 8: ...the effective wireless transmission range for two wireless adapter PCs Since an access point is able to forward data within a network the effective transmission range in an infrastructure network can be doubled Roaming Infrastructure mode also supports roaming capabilities for mobile users Roaming means that you can move your wireless PC within your network and the access points will pick up the w...

Страница 9: ...ess routers are compatible with 802 11a 802 11b and 802 11g adapters such at the PC Cards for your laptop computers PCI Card for your desktop PC and USB Adapters for when you want to enjoy USB connectivity Wireless products will also communicate with the wireless PrintServer When you wish to connect your wired network with your wireless network network ports on access points and wireless routers c...

Страница 10: ...RX Chapter 3 Getting to Know the Wireless G Notebook Adapter The LED Indicators The Network Adapter s LEDs display information about network activity Power Green The Power LED lights up when the Adapter is powered on Link Green The Link LED lights up when the Adapter has an active connection Figure 3 1 Front Panel ...

Страница 11: ...s not click the Start button and choose Run In the field that appears enter D setup msi if D is the letter of your CD ROM drive On the Welcome screen you have the following choices Click the Click Here to Start button to start the Setup Wizard installation process User Guide Click the User Guide button to open the PDF file of this User Guide Exit Click the Exit button to exit the Setup Wizard The ...

Страница 12: ...e Customer Information screen appears next Enter the User Name and name of your organization in the fields Then choose who will be permitted access to the Utility For all users select Anyone who uses this computer all users or for the specified user select Only for me Marketing Click the Next button to continue Click the Back button if you want if you want to return to the previous screen Click th...

Страница 13: ...ion and install the Utility in a different location click Custom Click the Next button to continue Click the Back button if you want to return to the previous screen Click the Cancel button to cancel the installation 6 When the Ready to Install the Program screen appears click the Install button Click the Back button if you want to return to the previous screen Click the Cancel button to cancel th...

Страница 14: ...ebook Adapter with SRX 7 A screen will appear during installation 8 This screen will appear after the software has been successfully installed Click the Finish button to exit the Wizard Proceed to Chapter 5 Hardware Installation Figure 4 7 Installing the Software Figure 4 8 Setup Wizard Complete ...

Страница 15: ...r LED should light up when the Adapter is installed correctly 5 Windows will begin copying the driver files to your computer If Windows asks you for the original Windows CD ROM insert the CD ROM and direct Windows to its correct location e g D The installation of the Wireless G Notebook Adapter with SRX is complete If you want to check the link information search for available wireless networks or...

Страница 16: ...tility icon s right click menu options Show Opens the Wireless Network Utility window Radio On Off Turns the Adapter radio on or off Help Opens the online help system About Displays information that may be helpful for technical support Exit Exits the Wireless Network Utility To restart the Utility after exiting you must use the Start menu Navigating the Utility Top Display Status Indicates whether...

Страница 17: ...l the working networks within radio range of your Adapter The following information is presented Icon Column Description SSID Name of the network associated SSID Name of the network not associated Signal quality Signal strength as a percentage Four solid green bars 60 or greater Signal quality Signal strength as a percentage Three solid green bars one hollow green 40 60 Signal quality Signal stren...

Страница 18: ...nding To change the sort order click the column header again Add or remove columns Right click on the column header and select or deselect columns Reorder columns Drag the column headers to reorder the columns Properties Displays network details Select one or more networks and click Properties to open the Properties window All APs for the selected networks are displayed Properties BSSID IDs of the...

Страница 19: ...ng profiles see Working with Profiles SSID Name of the network Signal quality Quality of the radio signal Security Type of active security Type Infrastructure or ad hoc network Profile Operations Add Button Click Add to open the Profile Editor to create a new profile Remove Button Click Remove to eliminate a network from the Configured Networks list Edit Button Click Edit to edit the selected netw...

Страница 20: ...smitted from your PC to the access point Transmit Bytes Number of bytes of data transmitted since your Adapter was last enabled Mode 802 11 radio frequency band used for communications Authentication Method of client identification Receive Rate Current connection rate for data received by your PC from the access point Receive Bytes Number of bytes of data received since the Adapter was last enable...

Страница 21: ...rrently configured networks the Adapter attempts to connect to the AP with the best signal quality open authentication and no encryption If all the connection options fail or if you want to connect to a different available network you can create a profile for the network with appropriate security parameters This adds the network to the Configured Networks list and makes it available for automatic ...

Страница 22: ... of network arrangement Infrastructure Refers to an existing wireless network usually with an interface to a wired network for Internet and email access file sharing and print and other services Ad Hoc Refers to a temporary wireless network that has been set up by another user Start Ad Hoc Network Permits you to set up a new ad hoc network to communicate with other PCs without using an access poin...

Страница 23: ...ect WEP as the encryption type enter encryption key information 3 Click OK The Profile window closes and the newly created profile appears in the Site Survey list in the main window You can edit any profile in the list including the active one If you edit and apply the active profile the system temporarily drops the network connection while implementing the changes When the configuration change is...

Страница 24: ...o the right of the Profile Name opens the Advanced Profile Settings window The settings in this window enable you to take advantage of the enhanced performance features of the Adapter It is recommended that you retain the default Automatic settings for power usage You may adjust the slide to the left for less power and least performance and to the right for more power and best performance Passphra...

Страница 25: ...s To use WZC to configure security settings 1 Select Use Windows to configure my wireless networks in the Utility main window 2 Click OK Now use WZC to configure security settings 1 Right click the wireless icon on the system tray 2 Select View Available Wireless Networks The appearance of the next dialog box depends upon whether your computer has Windows XP Service Pack 1 or Service Pack 2 instal...

Страница 26: ...those of the access point to which you are connecting Enter a network key if required 5 If you selected AES for data encryption open the Authentication tab and select the EAP type appropriate to your network 6 Click OK as needed to close the WZC windows NOTE To revert to using the Utility to manage the network you must clear the Use Windows to configure my wireless network settings checkbox shown ...

Страница 27: ...otebook or desktop is powered on Make sure that the Wireless G Notebook Adapter is configured with the same SSID and WEP settings as the other computers in the Infrastructure configuration Frequently Asked Questions Can I run an application from a remote computer over the wireless network This will depend on whether or not the application is designed to be used over a network Consult the applicati...

Страница 28: ...ing data Achieving these functions simultaneously requires a dynamic RF networking technology that links access points and nodes In such a system the user s end node undertakes a search for the best possible access to the system First it evaluates such factors as signal strength and quality as well as the message load currently being carried by each access point and the distance of each access poi...

Страница 29: ... net effect is to maintain a single logical channel To an unintended receiver FHSS appears to be short duration impulse noise Direct Sequence Spread Spectrum DSSS generates a redundant bit pattern for each bit to be transmitted This bit pattern is called a chip or chipping code The longer the chip the greater the probability that the original data can be recovered Even if one or more bits in the c...

Страница 30: ...26 Appendix A Troubleshooting Frequently Asked Questions Wireless G Notebook Adapter with SRX ...

Страница 31: ... Change the WEP encryption keys periodically Security Threats Facing Wireless Networks Wireless networks are easy to find Hackers know that in order to join a wireless network wireless networking products first listen for beacon messages These messages can be easily decrypted and contain much of the network s information such as the network s SSID Service Set Identifier Here are the steps you can ...

Страница 32: ...ss your network with a random MAC Address WEP Encryption Wired Equivalent Privacy WEP is often looked upon as a cure all for wireless security concerns This is overstating WEP s ability Again this can only provide enough security to make a hacker s job more difficult There are several ways that WEP can be maximized 1 Use the highest level of encryption possible 2 Use Shared Key authentication 3 Ch...

Страница 33: ...to the Router or other device WPA Radius offers two encryption methods TKIP and AES with dynamic encryption keys RADIUS WEP used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the Router or other device Implementing encryption may have a negative impact on your network s performance but if you are transmitting sensitive data over your network enc...

Страница 34: ...structions or protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizing s...

Страница 35: ...of a wireless network Adapter A device that adds network functionality to your PC Ad hoc A group of wireless devices communicating directly with each other peer to peer without the use of an access point AES Advanced Encryption Standard A method that uses up to 256 bit key encryption to secure data Backbone The part of a network that connects most of the systems and networks together and handles t...

Страница 36: ...e hosting of a website FTP server or e mail server with a fixed domain name e g www xyz com and a dynamic IP address Default Gateway A device that forwards Internet traffic from your local area network DHCP Dynamic Host Configuration Protocol A networking protocol that allows administrators to assign temporary IP addresses to network computers by leasing an IP address to a user for a limited amoun...

Страница 37: ...on and retrieved from a common transmission medium Finger A program that tells you the name associated with an e mail address Firewall A set of related programs located at a network gateway server that protects the resources of a network from users from other networks Firmware The programming code that runs a networking device Fragmentation Breaking a packet into smaller units when transmitting ov...

Страница 38: ... The computers and networking products that make up your local network LEAP Lightweight Extensible Authentication Protocol A mutual authentication method that uses a username and password system MAC Media Access Control Address The unique address that a manufacturer assigns to each networking device Mbps MegaBits Per Second One million bits per second a unit of measurement for data transmission mI...

Страница 39: ...connection that provides authentication username and password in addition to data transport PPTP Point to Point Tunneling Protocol A VPN protocol that allows the Point to Point Protocol PPP to be tunneled through an IP network This protocol is also used as a type of broadband connection in Europe Preamble Part of the wireless signal that synchronizes network traffic RADIUS Remote Authentication Di...

Страница 40: ...size of the network Switch 1 A data switch that connects computing devices to host computers allowing a large number of devices to share a limited number of ports 2 A device for making breaking or changing the connections in an electrical circuit TCP Transmission Control Protocol A network protocol for transmitting data that requires acknowledgement from the recipient of data sent TCP IP Transmiss...

Страница 41: ...rity measure to protect data as it leaves one network and goes to another over the Internet WAN Wide Area Network The Internet WEP Wired Equivalent Privacy A method of encrypting network data transmitted on a wireless network for greater security WINIPCFG A Windows 98 and Me utility that displays the IP address for a particular networking device WLAN Wireless Local Area Network A group of computer...

Страница 42: ...less G Protocols 802 11b CCK QPSK BPSK 802 11g OFDM Security Features WEP AES TKIP 802 1x WEP Key Bits 64 128 Bit Dimensions 4 80 x 2 13 x 0 39 122 mm x 54 mm x 10 0 mm Unit Weight 1 76 oz 0 05 kg Certifications FCC IC 03 CE Operating Temp 32ºF to 140ºF 0ºC to 60ºC Storage Temp 13ºF to 149ºF 20ºC to 65ºC Operating Humidity 15 95 Maximum Non Condensing Storage Humidity 95 Maximum Non Condensing ...

Страница 43: ...TATIONS AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered except by Lin...

Страница 44: ...relocate the receiving antenna Increase the separation between the equipment or devices Connect the equipment to an outlet other than the receiver s Consult a dealer or an experienced radio TV technician for assistance FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operated...

Страница 45: ...ellisten vaatimusten ja sitä koskevien näiden direktiivien muiden ehtojen mukainen Linksys Group déclare la Passerelle ADSL sans fil B est conforme aux conditions essentielles et aux dispositions relatives à la directive 1999 5 EC Belgique Dans le cas d une utilisation privée à l extérieur d un bâtiment au dessus d un espace public aucun enregistrement n est nécessaire pour une distance de moins d...

Страница 46: ...networking with Linksys products Give our advice line a call at 800 546 5797 LINKSYS Or fax your request in to 949 261 8868 If you experience problems with any Linksys product you can call us at 800 326 7114 Don t wish to call You can e mail us at support linksys com If any Linksys product proves defective during its warranty period you can call the Linksys Return Merchandise Authorization departm...

Отзывы: