background image

Wireless-B Notebook Adapter

34

33

Driver

- A workstation or server software module that provides an interface

between a network interface card and the upper-layer protocol software running
in the computer; it is designed for a specific NIC, and is installed during the
initial installation of a network-compatible client or server operating system.

DSSS

(

D

irect-

S

equence

S

pread

S

pectrum) - DSSS generates a redundant bit

pattern for all data transmitted. This bit pattern is called a chip (or chipping
code).  Even if one or more bits in the chip are damaged during transmission,
statistical techniques embedded in the receiver can recover the original data
without the need for retransmission. To an unintended receiver, DSSS appears
as low power wideband noise and is rejected (ignored) by most narrowband
receivers.  However, to an intended receiver (i.e. another wireless LAN end-
point), the DSSS signal is recognized as the only valid signal, and interference
is inherently rejected (ignored).

Encryption

- A security method that applies a specific algorithm to data in

order to alter the data's appearance and prevent other devices from reading the
information. 

ESS

(

E

xtended

S

ervice 

S

et) - A set of more than two or more BSSs (multiple

access points) forming a single network.

Ethernet

- IEEE standard network protocol that specifies how data is placed

on and retrieved from a common transmission medium. Has a transfer rate of
10 Mbps. Forms the underlying transport vehicle used by several upper-level
protocols, including TCP/IP and XNS.

FHSS

(

F

requency 

H

opping

S

pread

S

pectrum) - FHSS continuously changes

(hops) the carrier frequency of a conventional carrier several times per second
according to a pseudo-random set of channels. Because a fixed frequency is not
used, and only the transmitter and receiver know the hop patterns, interception
of FHSS is extremely difficult.

Fragmentation

- Breaking a packet into smaller units when transmitting over

a network medium that cannot support the original size of the packet. 

Gateway

- A device that interconnects networks with different, incompatible

communications protocols. 

Hardware

- Hardware is the physical aspect of computers, telecommunica-

tions, and other information technology devices. The term arose as a way to dis-
tinguish the "box" and the electronic circuitry and components of a computer

Instant Wireless

®

Series

sion multiplexing with carrier sense multiple access/collision detection
(CSMA/CD) to avoid having collisions occur a second time. This works best if
the time allocated is short compared to packet length and if the number of sit-
uations is small.

Database

- A database is a collection of data that is organized so that its con-

tents can easily be accessed, managed, and updated. 

Default Gateway

- The routing device used to forward all traffic that is not

addressed to a station within the local subnet.

DHCP

(

D

ynamic

H

ost

C

onfiguration 

P

rotocol) - A protocol that lets network

administrators manage centrally and automate the assignment of Internet
Protocol (IP) addresses in an organization's network. Using the Internet's set of
protocol (TCP/IP), each machine that can connect to the Internet needs a
unique IP address. When an organization sets up its computer users with a con-
nection to the Internet, an IP address must be assigned to each machine.
Without DHCP, the IP address must be entered manually at each computer and,
if computers move to another location in another part of the network, a new IP
address must be entered. DHCP lets a network administrator supervise and dis-
tribute IP addresses from a central point and automatically sends a new IP
address when a computer is plugged into a different place in the network. 

DHCP uses the concept of a "lease" or amount of time that a given IP address
will be valid for a computer. The lease time can vary depending on how long a
user is likely to require the Internet connection at a particular location. It's espe-
cially useful in education and other environments where users change fre-
quently. Using very short leases, DHCP can dynamically reconfigure networks
in which there are more computers than there are available IP addresses. 

DHCP supports static addresses for computers containing Web servers that
need a permanent IP address. 

DNS

- The domain name system (DNS) is the way that Internet domain name

are located and translated into Internet Protocol (IP) addresses. A domain name
is a meaningful and easy-to-remember "handle" for an Internet address. 

Domain

- A subnetwork comprised of a group of clients and servers under the

control of one security database. Dividing LANs into domains improves per-
formance and security.

Содержание WPC11

Страница 1: ...Instant Wireless Series User Guide Wireless B Notebook Adapter Use this Guide to install WPC11 ...

Страница 2: ...orme NMB 003 du Canada The use of this device in a system operating either partially or completely outdoors may require the user to obtain a license for the system according to the Canadian regulations EC DECLARATION OF CONFORMITY EUROPE Linksys Group declares that the Instant Wireless Series products included in the Instant Wireless Seriesconform to the specifications listed below following the p...

Страница 3: ...n 9 Chapter 6 Driver Installation and Configuration for Windows XP 10 Overview 10 Driver Installation for Windows XP 10 Windows XP Wireless Zero Configuration 12 Chapter 7 Using the WLAN Monitor for Windows 98SE Me and 2000 14 Overview 14 Accessing the WLAN Monitor 14 Link Information 15 Site Survey 17 Profiles 19 Creating a New Profile 21 Appendix A Troubleshooting 27 Common Problems and Solution...

Страница 4: ...notebook communicate with the popular 802 11b wireless network standard 802 11b wireless net works are commonly found in corporate environments and are used in homes for household Internet connectivity without the need for running cables They re also popping up all over the country in coffee shops airports hotels convention centers and other public spaces offering on the go connectivity to mobile ...

Страница 5: ...ter s LEDs Instant Wireless Series If the wireless network is relatively small and needs to share resources only with the other computers on the wireless network then the ad hoc mode can be used See Figure 2 2 Ad hoc mode allows computers equipped with wire less transmitters and receivers to communicate directly with each other elimi nating the need for an access point The drawback of this mode is...

Страница 6: ...adio but ton if you want multiple wireless computers to network directly with each other Figure 4 2 Chapter 4 Using the Setup Wizard to Configure Windows 98SE Me and 2000 The Adapter s Setup Wizard will guide you through the installation procedure for Windows 98SE Me and 2000 The Setup Wizard will install the WLAN Monitor and driver as well as configure the PC Card Insert the Setup Wizard CD ROM i...

Страница 7: ...r all devices in the network The default set ting is linksys all lower case Click the Next but ton or click the Back but ton to return to the previ ous page 4 If you chose Infrastructure Mode go to Step 5 now If you chose Ad Hoc Mode the screen shown in Figure 4 4 will appear and you will need to select the correct operating channel for your network from the Channel drop down menu Click the Next b...

Страница 8: ...C Card completely into the PC Card slot 4 Restart your note book PC 5 Windows will begin copying the driver files to your computer Windows 2000 users may see a digital signature screen This is normal Click Yes to continue and then click the Finish button to end the hardware detection process If Windows asks you for the original Windows CD ROM insert the CD ROM and direct Windows to its proper loca...

Страница 9: ...e network you want If this network has WEP encryption enabled go to step 3 If this network does not have WEP encryption enabled then the screen in Figure 6 4 will appear Check the box next to Allow me to connect to the selected wireless network even though it is not secure Then click the Connect button and go to step 4 ForWindows XP users Windows XP has a built in configuration tool Use Windows XP...

Страница 10: ...tion about the current wireless connection To search for available wireless net works click the Site Survey tab To perform configuration changes click the Profiles tab Figure 7 1 Figure 7 2 Accessing the WLAN Monitor Overview Instant Wireless Series 3 The screen in Figure 6 5 will appear Enter the WEP key of your wire less network in the Network key field and re enter it in the Confirm network key...

Страница 11: ...ique name of the wireless network Wireless Mode The mode of the wireless network currently in use Transfer Rate The data transfer rate of the current connection Channel The channel to which the wireless network devices are set WEP The status of the WEP encryption security feature MAC The MAC address of the wireless network s device you connect to TCP IP Setting IP Address The Adapter s IP Address ...

Страница 12: ...es The Site Survey screen shown in Figure 7 5 displays a list of infrastructure and ad hoc networks available for connection SSID The SSID or unique name of the wireless network Signal The percentage of signal strength from 0 to 100 Site Information Wireless Mode The mode of the wireless network currently in use Channel The channel to which the wireless network devices are set WEP The status of th...

Страница 13: ... import or export profiles The default profile holds the initial configuration saved when you ran the Setup Wizard Profile Name of the setting profile SSID The wireless network s unique name as set in the connection profile Profile Information Network Type The mode of the wireless network currently in use Transfer Rate The data transfer rate of the connection In Auto mode the Adapter dynamically s...

Страница 14: ...ack button to return to the previous screen Infrastructure Mode This mode allows wireless and wired networks to communicate through an access point Ad Hoc Mode This mode allows wireless equipped computers to com municate directly with each other No access point is used 22 1 On the Profiles screen shown in Figure 7 10 click the New button to cre ate a new profile 2 When the Create connection profil...

Страница 15: ... to continue or click the Back button to return to the previous screen Then go to Step 5 If your network does not have a DHCP server click the radio button next to Specify the IP address Enter an IP Address Subnet Mask Default Gateway and DNS appropriate for your network Enter each address in this format xxx xxx xxx xxx the x s represent the numbers that make up each address You must specify the I...

Страница 16: ...tch the WEP key of your wireless net work If you are using 64 bit WEP encryption then the key must consist of exactly 10 hexadecimal characters If you are using 128 bit WEP encryp tion then the key must consist of exactly 26 hexadecimal characters Valid hexadecimal characters are 0 to 9 and A to F Key Index The default transmit key number is 1 If your network s access point or wire less router use...

Страница 17: ...reless LAN An Ad hoc wireless LAN is applica ble at a departmental scale for a branch or SOHO operation Frequently Asked Questions Instant Wireless Series Appendix A Troubleshooting This chapter provides solutions to problems usually occurring during the instal lation and operation of the Adapter Read the description below to solve your problems If you can t find an answer here check the Linksys w...

Страница 18: ... On the software side the WLAN series offers the encryp tion function WEP to enhance security and access control Users can set it up depending upon their needs Instant Wireless Series What is Infrastructure An integrated wireless and wired LAN is called an Infrastructure configura tion Infrastructure is applicable to enterprise scale for wireless access to a cen tral database or wireless applicati...

Страница 19: ...r 1 used in the binary numbering system Also the smallest form of data BSS Basic Service Set An infrastructure network connecting wireless devices to a wired network using a single access point Buffer A buffer is a shared or assigned memory area used by hardware devices or program processes that operate at different speeds or with different sets of priorities The buffer allows each device or proce...

Страница 20: ...evices The term arose as a way to dis tinguish the box and the electronic circuitry and components of a computer Instant Wireless Series sion multiplexing with carrier sense multiple access collision detection CSMA CD to avoid having collisions occur a second time This works best if the time allocated is short compared to packet length and if the number of sit uations is small Database A database ...

Страница 21: ...wo network nodes IEEE The Institute of Electrical and Electronics Engineers The IEEE describes itself as the world s largest technical professional society promoting the development and application of electrotechnology and allied sciences for the benefit of humanity the advancement of the profession and the well being of our members The IEEE fosters the development of standards that often become n...

Страница 22: ... hubs switches routers and gateways Most large networks contain several levels of interconnection the most impor tant of which include edge connections backbone connections and wide area connections WAN Wide Area Network A communications network that covers a rela tively large geographic area consisting of two or more LANs Broadband com munication over the WAN is often through public networks such...

Страница 23: ...ate with each other wirelessly 39 Appendix C Specifications Standards IEEE 802 11b Channels 11 Channels US Canada 13 Channels Europe 14 Channels Japan LEDs Power Link Transmit Power 3 3V Protocols CCK QPSK BPSK WEP key bits 64 Bit and 128 Bit Dimensions 4 5 x 2 1 x 0 3 115 mm x 54 mm x 7 5 mm Unit Weight 1 65 oz 47g Power 5V DC 275mATx 225mA Rx 200mA Standby Certifications FCC Class B CE Mark Tele...

Страница 24: ...BE SURE TO HAVE YOUR PROOF OF PURCHASE AND A BARCODE FROM THE PRODUCT S PACKAGING ON HAND WHEN CALLING RETURN REQUESTS CANNOT BE PROCESSED WITHOUT PROOF OF PURCHASE IN NO EVENT SHALL LINKSYS LIABILITY EXCEED THE PRICE PAID FOR THE PRODUCT FROM DIRECT INDIRECT SPECIAL INCIDEN TAL OR CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OF THE PRODUCT ITS ACCOMPANYING SOFTWARE OR ITS DOCU MENTATION LINKSYS D...

Страница 25: ... Copyright 2003 Linksys All Rights Reserved http www linksys com ...

Отзывы: