background image

 

18

 

 

6.  What is Infrastructure

?

 

An integrated wireless and wireless and wired LAN is called an Infrastructure configuration. 

Infrastructure is applicable to enterprise scale for wireless access to central database, or 

wireless application for mobile workers. 

 

7.  What is BSS ID

?

 

A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be 

configured with the same BSS ID. 

 

8.  What is WEP

?

 

WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key 

algorithm, as described in the IEEE 802 .11 standard. 

 

9.  What is TKIP? 

TKIP is a quick-fix method to quickly overcome the inherent weaknesses in WEP security, 

especially the reuse of encryption keys. TKIP is involved in the IEEE 802.11i WLAN security 

standard, and the specification might be officially released by early 2003. 

 

10.  What is AES? 

AES (Advanced Encryption Standard), a chip-based security, has been developed to ensure the 

highest degree of security and authenticity for digital information, wherever and however 

communicated or stored, while making more efficient use of hardware and/or software than 

previous encryption standards . It is also included in IEEE 802.11i standard. Compare with AES, 

TKIP is a temporary protocol for replacing WEP security until manufacturers implement AES at 

the hardware level. 

 

11.  Can Wireless products support printer sharing

?

   

Wireless products perform th e same function as LAN products. Therefore, Wireless products can 

work with Netware, Windows 2000, or other LAN operating systems to support printer or file 

sharing. 

 

12.  Would the information be intercepted while transmitting on air

?

 

WLAN features two-fold protection in security. On the hardware side, as with Direct Sequence 

Spread Spectrum technology, it has the inherent security feature of scrambling. On the software 

side, WLAN series offer the encryption function (WEP) to enhance security and Access Control. 

Users can set it up depending upon their needs. 

 

13.  What is DSSS

?

What is FHSS

?

And what are their differences

?

 

Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that changes frequency 

in a pattern that is known to both transmitter and receiver. Properly synchronized, the net effect 

is to maintain a single logical channel. To an unintended receiver, FHSS appears to be 

short-duration impulse noise. Direct-sequence spread-spectrum (DSSS) generates a redundant 

bit pattern for each bit to be transmitted. This bit pattern is called a chip (or chipping code). The 

longer the chip is, the greater the probability that the original data can be recovered. Even if one 

or more bits in the chip are damaged during transmission, statistical techniques embedded in the 

radio can recover the original data without-the need fo r retransmission. To an unintended 

Содержание HWU54G

Страница 1: ......

Страница 2: ...arly on the outside of the package and include your original proof of purchase IN NO EVEN SHALL HAWKING TECHNOLOGY S LIABILTY EXCEED THE PRICE PAID FOR THE PRODUCT FROM DIRECT INDIRECT SPECIAL INCIDE...

Страница 3: ...paration between the equipment and receiver 3 Connect the equipment into an outlet on a circuit different from that to which the receiver is connected 4 Consult the dealer or an experienced radio tech...

Страница 4: ...9 1999 on radio equipment and telecommunication terminal Equipment and the mutual recognition of their conformity R TTE The R TTE Directive repeals and replaces in the directive 98 13 EEC Telecommunic...

Страница 5: ...3 Package Contents 2 2 INSTALLATION PROCEDURE 3 3 CONFIGURATION UTILITY 7 3 1 General 7 3 1 1 Preference Setting 9 3 1 2 Site Survey 9 3 2 Profiles 10 3 2 1 Configure the Profile 12 3 2 2 Enable WPA...

Страница 6: ...egrity Protocol technologies With theWPA feature users are required to authenticate themselves before accessing APs or AP Routers The data transmitted within the network is encrypted decrypted by asec...

Страница 7: ...16 dBm Temperature 32 131 F 0 55 C Humidity Max 95 NonCondensing Certification FCC CE 1 3 Package Contents Before you begin the installation please check the items of your package The package should i...

Страница 8: ...r A Insert the Installation CD into your CD ROM driver B Insert the USB adapter to the USB port of your laptop or desktop PC C Choose the selection Install from a list or specific location Advanced an...

Страница 9: ...he Utility A Executethe Utility setup exe program from the installation CD B The InstallShield Wizard box will appear click Next to continue C Choose the selection I accept the terms in the license ag...

Страница 10: ...the destination folder click Change or click Next to continue F There is no different among the three setup types Click Next directly G The wizard will install the driver automatically Click Finish to...

Страница 11: ...6 III Using the Utility Go to Start All Programs Envara Configuration Utility and select EnvaraGui This will load the Wireless Utility...

Страница 12: ...upport 11bwhen connected to a USB 1 1 1 0 port on your computer 2 This adapter will onlywork in 11b 11Mbps modew hen Ad Hoc mode has been selected as the network type Defined by the Wi Fi organization...

Страница 13: ...connection profile Radio Status This field shows the transmitter s status On or Off Enable Radio Button This button is used to enable and disable radio transmission Link Quality The higher the percent...

Страница 14: ...values click Defaults 3 1 2 Site Survey This screenshows all wireless networks nearby If you want to connect to any network on the list double click the item on the list or click Connect and the adapt...

Страница 15: ...tWEP security setting you can click this button to update the settings of the adapter Note that the WEP setting has to be the same with the network You can also right click the connection network and...

Страница 16: ...nnect to the additional profiles in the list automatically If you want to change the connection to one of the profiles double click the profile or select the profile and click Connect You can click Ne...

Страница 17: ...of two co located WLANs You may specify a SSID for the adapter so that it will only connect to a network when that specific SSID is present Network Mode Infrastructure This operation mode requires the...

Страница 18: ...inue setting the WEP Key Length and the encryption keys Use 802 1x This function is not activated yet It will not implement if you enable it Encryption Key Key1 Key4 Select the default encryption key...

Страница 19: ...y Integrity Protocol TKIP fordynamic key exchange and 802 1xfor authentication WPA function is enabled in the following software system 1 Windows XP Service Pack 1 with Windows XP Support Patch for Wi...

Страница 20: ...network WPAtakes over automatically from that point keeping unauthorized users that don t have the matching password from joining the network while encrypting the data traveling between authorized dev...

Страница 21: ...ut By choosing this option you can view basic informationsuch as the Driver Firmware and Utility Version And you can click the hyperlink to connect the website for the information of the wireless chip...

Страница 22: ...802 11 Medium Access Control MAC in the 2 4 GHz frequency band known as the extended rate PHY ERP The ERP adds OFDM as a mandatory new coding scheme for 6 12 and 24 Mbps mandatory speeds and 18 36 48...

Страница 23: ...nt AES at the hardware level 11 Can Wireless products support printer sharing Wireless products perform th e same function as LAN products Therefore Wireless products can work with Netware Windows 200...

Страница 24: ...efficiency for reliability integrity and security In other words more bandwidth is consumed than in the case of narrowband transmission butthe trade off produces a signal that is in effect louder and...

Отзывы: