Can I run an application from a remote computer over the wireless network?
This will depend on whether or not the application is designed to be used over a network. Consult
the
application’s documentation to determine if it supports operation over a network.
What is the IEEE 802.11g standard?
It is one of the IEEE standards for wireless networks. The 802.11g standard allows wireless
networking hardware
from different manufacturers to communicate, provided that the hardware complies with the
802.11g standard.
The 802.11g standard states a maximum data transfer rate of 54Mbps and an operating frequency
of 2.4GHz.
What IEEE 802.11b features are supported?
The product supports the following IEEE 802.11b functions:
• CSMA/CA plus Acknowledge protocol
• Multi-Channel Roaming
• Automatic Rate Selection
• RTS/CTS feature
• Fragmentation
• Power Management
What is ad-hoc mode?
When a wireless network is set to ad-hoc mode, the wireless-equipped computers are configured
to
communicate directly with each other. The ad-hoc wireless network will not communicate with any
wired
network.
What is infrastructure mode?
When a wireless network is set to infrastructure mode, the wireless network is configured to
communicate with a
wired network through a wireless access point.
What is roaming?
Roaming is the ability of a portable computer user to communicate continuously while moving
freely throughout
an area greater than that covered by a single access point. Before using the roaming function, the
workstation
must make sure that it is the same channel number with the access point of dedicated coverage
area.
To achieve true seamless connectivity, the wireless LAN must incorporate a number of different
functions. Each
node and access point, for example, must always acknowledge receipt of each message. Each
node must
maintain contact with the wireless network even when not actually transmitting data. Achieving
these functions
simultaneously requires a dynamic RF networking technology that links access points and nodes.
In such a
system, the user’s end node undertakes a search for the best possible access to the system. First,
it evaluates
such factors as signal strength and quality, as well as the message load currently being carried by
each access
point and the distance of each access point to the wired backbone. Based on that information, the
node next
selects the right access point and registers its address. Communications between end node and
host computer
can then be transmitted up and down the backbone.
As the user moves on, the end node’s RF transmitter regularly checks the system to determine
whether it is in