5
The Gigaset USB Stick 108
Gigaset USB Stick 108 / englisch / A31008-M1038-R101-1-7619 / introduction.fm / 02.06.2005
Sc
hablone 2
004_
12_2
7
Ad-hoc network
In an ad-hoc network, PCs communicate with each other via wireless peer-to-peer
connections. An ad-hoc network is set up by participants as and when required. All the
PCs must have a wireless network adapter, e.g. a Gigaset USB Stick 108, a Gigaset USB
Adapter 108 or a Gigaset PC Card 108. Ad-hoc networks are used wherever
communications networks have to be set up quickly and without any existing network
infrastructure and where the participants are on the move.
Infrastructure network
In an infrastructure network, connections between network participants are set up via
an Access Point (or several Access Points). The Access Point provides the basis for the
wireless network. It controls the connections between the participants and can also
establish the connection from the mobile stations of a wireless network to a wired LAN
(Ethernet) or the Internet.
Roaming
Several Access Points can be installed to extend the range of a wireless network.
Participants in the wireless network can move freely between the various Access Points
without losing contact to the network. As soon as there is a risk of losing contact, the
PC automatically looks for another Access Point with a stronger signal. All Access Points
and wireless network adapters must have the same SSID. All Access Points must be
connected to the same Ethernet network.
Security in wireless networks: encryption
Any network, be it wired or wireless, is exposed to the risk of eavesdropping.
Connecting your local network to the public network exposes your data and applications
to not inconsiderable risks. As with an individual connection, you should always protect
your network PCs against external attacks, e.g. via emails, with a virus scanner.
These virus scanners, however, do not provide any protection against unauthorised
access from outside (hackers). To counter this risk, Gigaset data products offer various
encryption procedures that largely rule out unauthorised access (hacking) to your
wireless network.