background image

35

Subnet Mask - The method used for splitting IP networks into a series of sub-
groups, or subnets. The mask is a binary pattern that is matched up with the IP
address to turn part of the host ID address field into a field for subnets. 

TCP (Transmission Control Protocol) - A method (protocol) used along with
the IP (Internet Protocol) to send data in the form of message units (datagram)
between network devices over a LAN or WAN. While IP takes care of handling
the actual delivery of the data (routing), TCP takes care of keeping track of the
individual units of data (called packets) that a message is divided into for effi-
cient delivery over the network. TCP is known as a "connection oriented" pro-
tocol due to requiring the receiver of a packet to return an acknowledgment of
receipt to the sender of the packet resulting in transmission control.

TCP/IP (Transmission Control Protocol/Internet Protocol) - The basic com-
munication language or set of protocols for communications over a network
(developed specifically for the Internet).  TCP/IP defines a suite or group of
protocols and not only TCP and IP.

Throughput - The amount of data moved successfully from one place to
another in a given time period.

Topology - A network's topology is a logical characterization of how the
devices on the network are connected and the distances between them. The
most common network devices include hubs, switches, routers, and gateways.
Most large networks contain several levels of interconnection, the most impor-
tant of which include edge connections, backbone connections, and wide-area
connections.

WAN (Wide  Area  Network)- A communications network that covers a rela-
tively large geographic area, consisting of two or more LANs.  Broadband com-
munication over the WAN is often through public networks such as the tele-
phone (DSL) or cable systems, or through leased lines or satellites.  In its most
basic definition, the Internet could be considered a WAN.

WEP (Wired Equivalent Privacy) - A data privacy mechanism based on a 64-
bit or 128-bit shared key algorithm, as described in the IEEE 802.11 standard. 

WLAN (Wireless Local Area Network) - A group of computers and associat-
ed devices that communicate with each other wirelessly.

34

Wireless Notebook Adapter

Appendix C: Specifications

Standards

IEEE 802.11b

Channels

11 Channels (USA)
13 Channels (Europe)
14 Channels (Japan) 

Transmit

18 dBm

Receive Sensitivity

-82 dBm

Modulation

BPSK, QPSK, CCK

LEDs

Power, ACT

Dimensions 

2.13" x .20" x 4.13" 
(54 mm x 5 mm x 105 mm)

Unit Weight

1.52 oz. (0.04 kg)

Power

3.3V DC

Certifications

FCC Part 15, Class B & Class C, Wi-Fi, WHQL XP

Operating Temp.

32ºF to 104ºF (0ºC to 40ºC)

Storage Temp.

-4ºF to 158ºF (-20ºC to 70ºC)

Operating Humidity

1

0% to 85%, Non-Condensing

Storage Humidity

5% to 90%, Non-Condensing

Environmental

Network Everywhere

Series

Содержание NWP11B

Страница 1: ......

Страница 2: ...ETWORK EVERYWHERE OFFERS NO REFUNDS FOR ITS PRODUCTS Network Everywhere makes no warranty or repre sentation expressed implied or statutory with respect to its products or the contents or use of this...

Страница 3: ...by step Then just slide it into your notebook s PC Card slot and enjoy network access with your notebook computer while retaining true mobility Once you re connected you can keep in touch with your e...

Страница 4: ...ad hoc configuration is wireless equipped computers com municating directly with each other Choosing between these two modes depends on whether or not the wireless network needs to share data or peri...

Страница 5: ...or the Exit button to close this screen You opened this User Guide by clicking the User Guide button Before You Start Figure 3 1 Important forWindows XP users Do NOT run theWireless Notebook Adapter s...

Страница 6: ...play the Network Everywhere End User License Agreement Read this and click the Next button to pro ceed or the Cancel button to close the Setup Wizard 3 When the screen shown in Figure 3 3 appears you...

Страница 7: ...pter into your computer you will install the driver and configure the Adapter 1 Windows XP will automatically detect the Adapter Insert the Setup Wizard CD ROM into your CD ROM drive Click the radio b...

Страница 8: ...creen to configure the Adapter See Chapter 4 Driver Installation and Configuration for Windows XP Starting the WLAN Monitor Overview 10 Network Everywhere Series 2 The screen that appears Figure 4 4 w...

Страница 9: ...ion from 0 to 100 Click the X Close button in the upper right corner to exit the WLAN Monitor Figure 5 3 Network Everywhere Series The Link Information screen graphically displays the Adapter s curren...

Страница 10: ...Rate The data transfer rate of the current connection 1Mbps 2Mbps 1 or 2Mbps 5 5Mbps 11Mbps or Auto in Auto mode the Adapter dynamically shifts to the fastest data transfer rate possible at any given...

Страница 11: ...er to exit the WLAN Monitor Figure 5 8 Figure 5 9 Note If you want to export more than one profile you have to export them one at a time Network Everywhere Series Connect To connect to a wireless netw...

Страница 12: ...does not have a DHCP server click the radio button next to Specify the IP address Then enter the following information IP Address This IP Address must be unique to your network Enter the IP Address i...

Страница 13: ...ecimal characters are 0 to 9 and A to F 6 The Confirm New Settings screen shown in Figure 5 14 will appear next To save the new settings click the Yes button To cancel the settings and return to the P...

Страница 14: ...detected prop erly If you see a yellow question mark the resources are conflicting Right click on My Computer and select Properties Select the device man ager and click the Network Adapter You will f...

Страница 15: ...main taining a continuous connection to the wireless network stations and Wireless Network Access Points What is ISM band The FCC and their counterparts outside of the U S have set aside bandwidth for...

Страница 16: ...liable secure mission critical communica tions systems It is designed to trade off bandwidth efficiency for reliability integrity and security In other words more bandwidth is consumed than in the cas...

Страница 17: ...is extremely difficult 29 Boot To cause the computer to start executing instructions Personal comput ers contain built in instructions in a ROM chip that are automatically executed on startup These i...

Страница 18: ...aking a packet into smaller units when transmitting over a network medium that cannot support the original size of the packet Hardware Hardware is the physical aspect of computers telecommunica tions...

Страница 19: ...ook Adapter Network Everywhere Series and at meetings A notebook computer sometimes called a laptop computer typically weighs less than five pounds and is three inches or less in thickness Packet A un...

Страница 20: ...k are connected and the distances between them The most common network devices include hubs switches routers and gateways Most large networks contain several levels of interconnection the most impor t...

Страница 21: ...PACKAGING ON HAND WHEN CALLING RETURN REQUESTS CANNOT BE PROCESSED WITHOUT PROOF OF PURCHASE IN NO EVENT SHALL NETWORK EVERYWHERE S LIABILITY EXCEED THE PRICE PAID FOR THE PRODUCT FROM DIRECT INDI RE...

Страница 22: ...Copyright 2002 Network Everywhere All rights reserved http www NetworkEverywhere com...

Отзывы: