18
5.2 Frequently Asked Questions
Can applications be run from a remote computer over the wireless
network?
The application itself must support running over the network.
Can I play computer games with other members of the wireless network?
The game must support multiple players over a LAN (local area network).
What is IEEE 802.11 standard?
The IEEE 802.11 WLAN standards subcommittee is developing this standard for
the industry. The objective is to enable WLAN hardware from different
manufacturers to communicate. The 802.11 and 802.11b specifications apply to
wireless Ethernet LANs, and operate at frequencies in the 2.4-GHz region of the
radio spectrum.
What IEEE 802.11 features are supported?
The product supports the following IEEE 802.11 functions:
• CSMA/CA plus Acknowledge protocol
• Automatic Rate Selection
• Multi-Channel Roaming
• Power Management
• RTS/CTS feature
• Fragmentation
Can Wireless products support printer sharing?
Wireless products perform the same function as LAN products. Therefore,
Wireless products can support printer or file sharing.
What is DSSS? What is FHSS? And what are their differences?
Frequency-Hopping Spread-Spectrum (FHSS) uses a narrowband carrier that
changes frequency in a pattern that is known to both transmitter and receiver, but
not an unintended receiver. Direct-Sequence Spread-Spectrum (DSSS)
generates a redundant bit pattern for each bit to be transmitted. Even if one or
more bits in the chip are damaged during transmission, statistical techniques
embedded in the radio can recover the original data without -the need for
retransmission. To an unintended receiver, DSSS appears as low power
wideband noise and is rejected (ignored) by most narrowband receivers.
Would the information be intercepted while transmitting on air?
WLAN features two-fold protection in security. On the hardware side, as with
Direct Sequence Spread Spectrum technology, it has the inherent security
feature of scrambling. On the software side, WLAN series offer the encryption
function (WEP) to enhance security and Access Control. Users can set it up
depending upon their needs.