Global Sun Technology GL242201-MT0 Wireless 22Mbps PC Card User Manual Manual Part 2

Global Sun Technology Inc Wireless 22Mbps PC Card Manual Part 2

Contents

Manual Part 2

21APPENDIX A: TROUBLESHOOTINGThis chapter provides solutions to frequently encountered problems that can occurduring the installation and operation of the 22Mbps Wireless Network PC Card.Please read through the following to solve your problems.1. The wireless clients cannot access the network in the infrastructure mode.¾ Check that the wireless network device is being installed and workingproperly.Go to “Start” >Right mouse clickon “My Computer”> “Properties”
22Go to “DeviceManager”Go to “Hardware”
23Right mouse clickon the wirelessnetwork adapter22Mbps WLAN AdapterGo to “Properties”22Mbps WLAN Adapter
242. What is the difference between 22Mbps and 11Mbps wireless products?What’s the benefit of 22Mbps Wireless Access Point?The 22Mbps is made possible by the new modulation method called PBCCdeveloped by TI, which is different from the current CCK modulation methodfor 11Mbps. The 22Mbps Wireless Access Point offers double data rate than thatof 11Mbps with 20% more distance coverage. The 22Mbps wireless productsalso operate in the 2.4GHz ISM band and they are backward compatible with11Mbps wireless products.3. What is Roaming?Roaming is the ability of portable computers, e.g., Packet PC and notebook, tohave consistent and continuous data transmission/reception throughout an areacovered by more than one Wireless Access Point.    In order to achieve seamlessconnectivity, all the wireless clients and Access Points must be set to use thesame SSID.    When a user walked out of the coverage area of one AP intoanother, the wireless client network device will automatically reestablishconnection with the new AP.4. What is a MAC Address?The Media Access Control (MAC) address is a unique number assigned by themanufacturer to any Ethernet networking devices, e.g. a network adapter, thatCheck and makesure that thenetwork adapter isworking properly22Mbps WLAN Adapter
25allows the network to identify it at the hardware level.    Unlike IP addresses,which can be changed or dynamically assigned by the network, the MACaddress of a networking device is permanent.5. What is WEP?Wired Equivalent Privacy (WEP) is a type of data encryption mechanismdescribed in the IEEE 802.11 standard. The 22Mbps Wireless Access Pointsupports 64/128/256 bit shared key for WEP.6. Would the information be transmitted securely in the air?WLAN offers two layers of protection for security. First layer is on the hardwarelevel.    As with Direct Sequence Spread Spectrum (DSSS) technology, it has theinherent security feature of scrambling. Second of all, on the software level, thesecurity control is made possible by Wired Equivalent Privacy (WEP) for accesscontrol.7. What is ISM band?The FCC and their counterparts outside of the U.S. have set aside bandwidth forunlicensed use in the ISM (Industrial, Scientific and Medical) band. The 2.4GHzunlicensed ISM band is available worldwide, which presents the opportunity forthe global market of 802.11b high speed wireless products.
26APPENDIX B: NETWORKING BASISThis chapter will help you learn the basics of home networking.Using the Windows XP Network Setup WizardGo to Start menu >Control Panel >Network ConnectionsIn the menu on the leftside of the window,select “Set up a homeor small officenetwork”Click “Next” toproccedClick “Next” tocontinue
27Select the optionthat best describeshow you connectyour computer to theInternet.In the case of usingrouter in thenetwork, choose thesecond option.Click “Next” tocontinue.1. Enter a shortdescription for yourcomputer.2. Enter a name foryour computer to berecognized amongthe network.3. Click “Next” tocontinue.
28Enter “Workgroupname” for yourhome network.Click “Next” tocontinue”Click “Next” andwait for the wizardto apply the settings.
29You may create anetwork setup diskwhich saves you thetrouble of having toconfigure every PCsin your network.Select the firstchoice, and insert afloppy disk intoyour disk driveClick “Next” tocontinue.
30Click “FormatDisk” if you wish toformat the disk.Click “Next” tocopy the necessaryfiles to the disk.Click “Next” tocontinue with theNetwork SetupWizard
31!Note: Now you may use the Network Setup Disk you just created in any PCs in yournetwork that you wish to setup.    Simply insert the Network Setup Disk into the diskdrive of a PC, and open to browse the content of the disk with “My Computer” or“Windows File Manager”.    Double-click and run the file “netsetup” for the programto handle the rest.Click “Finish” tocomplete theNetwork SetupWizard.System will nowhave to restart inorder for the newsettings to beeffective.Click “Ye s ” torestart the computer
32Checking IP Address of Your Computer In Windows XPSometimes you will need to know the IP address of the computer that you are using.For example, when you want to make sure that your computer is in the same networkdomain as that of your Access Point for you can configure and access the AP.When the command prompt window appears, type command “ipconfig /all” and pressEnter.    This command will display the IP addresses of all the network adapters inyour computer.In this case, the IP address of your network adapter is 192.168.0.23, which meansyour Access Point must have an IP address of 192.168.0.xxx in order for you to beable to access it.If the IP address is assigned by DHCP server on the network, there are chances youmight have to release the IP and acquire it from DHCP server again.    Here is howyou do it.Go to Start menu >Run > type“command”Click “OK”
33Type command, “ipconfig /renew” in the command prompt window and press Enter.This command releases the current IP address and acquire it from the network, i.e.DHCP server, once more.In this case, the IP address that we acquired is the same as previous one, 192.168.0.23.    However, it’s often that the acquired IP address of the network adaptermight would not be the same.!Note:    To renew IP under Windows 98 and Windows ME, you will have to go to theStart menu > Run > type winipcfg and click “OK”.    The Windows IPConfiguration Menu window would appear, where you first click “release” button torelease the current IP address, followed by clicking of “Renew” to acquire a new IPaddress from network.If the above methods for IP renew fail, you will have to try and restart the computer,which will reinitializes the network adapter settings during startup including renewingIP address.    If you still have problems getting an IP address after computer restarts,you will have to consult with your MIS in your office or call computer and networktechnicians.Go to Start menu >Run > type“command”Click “OK”
34Dynamic IP Address V.S. Static IP AddressBy definition Dynamic IP addresses are the IP addresses that are being automaticallyassigned to a network device on the network.  These Dynamically assigned IPaddresses will expire and may be changed over time.Static IP addresses are the IP addresses that users manually enter for each of thenetwork adapters.!Note: There might be two or more Local Area Connection to choose from. You mustselect the one that you will use to connect to the network.Go to Start menu > ControlPanel > NetworkConnections > Right-click onthe active Local Areaconnection > Select“Properties”
35Dynamically Assigned IP AddressThe TCP/IP Properties windowappears.Select “Obtain an IP addressautomatically” if you are on aDHCP enabled network.Click “OK” to close the windowwith the changes madeThe Local Area ConnectionProperties would appear.Select “Internet Protocol(TCP/IP)” and Click“Properties” to continue.22Mbps WLAN Adapter
36Static IP Address!Note:    The IP address must be within the same range as the wireless route or AccessPoint.Wireless Network in Windows 2000Select “Use the following IPaddress”Enter the IP address and subnetmask fields.Enter the IP address of the Routerin the Default gateway field.Enter the IP address of the Routerin the DNS server fieldClick “Ok” to close the windowGo to Start menu > Settings >Network and Dial-upConnections > Double-click onthe Local Area ConnectionSelect “Internet Protocol(TCP/IP)” and click“Properties”22Mbps WLAN Adapter
37The TCP/IP Properties windowappears.Select “Obtain an IP addressautomatically” if you are on aDHCP enabled network.Click “OK” to close the windowwith the changes madeSelect “Use the following IPaddress”Enter the IP address and subnetmask fields.Enter the IP address of the Routerin the Default gateway field.Enter the IP address of the Routerin the DNS server fieldClick “Ok” to close the window
38Wireless Network In Windows 98 and Windows METhe TCP/IP Properties windowappears.Select “Obtain an IP addressautomatically” if you are on aDHCP enabled network.Click “OK” to close the windowwith the changes madeGo to Start menu > Settings >Control Panel > Double-click onNetworkSelect TCP/IP of the networkdeviceClick “Properties” to continue22Mbps WLAN Adapter
39Select “Use the following IPaddress”Enter the IP address and subnetmask fields.Enter the IP address of the Routerin the Default gateway field.Enter the IP address of the Routerin the DNS server fieldClick “Ok” to close the window
40APPENDIX C: 802.1x Authentication SetupThere are three essential components to the 802.1x infrastructure: (1) Supplicant, (2)Authenticator and (3) Server.    The 802.1x security supports both MD5 and TLSExtensive Authentication Protocol (EAP).    The 802.1x Authentication is acomplement to the current WEP encryption used in wireless network.    The currentsecurity weakness of WEP encryption is that there is no key management and nolimitation for the duration of key lifetime.    802.1x Authentication offers keymanagement, which includes key per user and key per session, and limits the lifetimeof the keys to certain duration.    Thus, key decryption by unauthorized attackerbecomes extremely difficult, and the wireless network is safely secured.    We willintroduce the 802.1x Authentication infrastructure as a whole and going into details ofthe setup for each essential component in 802.1x authentication.802.1x Authentication InfrastructureThe Infrastructure diagram showing above illustrates that a group of 802.11 wirelessclients is trying to form a 802.11 wireless network with the Access Point in order to802.11 WirelessAccess Points Support 802.1XRADIUSServerAuthentication RequestInternet/IntranetAuthentication Success802.11 WirelessClients Support 802.1XPublic802.11WirelessNetworks
41have access to the Internet/Intranet. In 802.1x authentication infrastructure, each ofthese wireless clients would have to be authenticated by the Radius server, whichwould grant the authorized client and notified the Access Point to open up acommunication port to be used for the granted client. There are 2 ExtensiveAuthentication Protocol (EAP) methods supported: (1) MD5 and (2) TLS.MD5 authentication is simply a validation of existing user account and password thatis stored in the server with what are keyed in by the user. Therefore, wireless clientuser will be prompted for account/password validation every time when he/she istrying to get connected. TLS authentication is a more complicated authentication,which involves using certificate that is issued by the Radius server, for authentication.TLS authentication is a more secure authentication, since not only the Radius serverauthenticates the wireless client, but also the client can validate the Radius server bythe certificate that it issues. The authentication request from wireless clients and replyby the Radius Server and Access Point process can be briefed as follows:1. The client sends an EAP start message to the Access Point2. The Access Point replies with an EAP Request ID message3. The client sends its Network Access Identifier (NAI) – its user name – to theAccess Point in an EAP Respond message.4. The Access Point forwards the NAI to the RADIUS server with a RADIUSAccess Request message.5. The RADIUS server responds to the client with its digital certificate.6. The client validates the digital certificate, and replies its own digitalcertificate to the RADIUS server.7. The RADIUS server validates client’s digital certificate.8. The client and RADIUS server derive encryption keys.9. The RADIUS server sends the access point a RADIUS ACCEPT message,including the client’s WEP key.10. The Access Point sends the client an EAP Success message along with thebroadcast key and key length, all encrypted with the client’s WEP key.Supplicant: Wireless Network PC CardHere is the setup for the Wireless Network PC Card under Windows XP, which is theonly Operating System that our driver supports for 802.1x.    Microsoft is planning onsupporting 802.1x security in all common Windows Operating System includingWin98SE/ME/2000 by releasing Service Pack in 2003.
42Please note that the setup illustration is based on our 22Mbps wireless PC Card.1. Go to Start > Control Panel2. double-click on “Network Connections”3. right-click on the Wireless Network Connection that you use with our 22Mbpswireless PC Card.4. Click “Properties” to open up the Properties setting window.
435. Click on the “Wireless Network” tab.
446. Click “Properties” of the available wireless network, which you wish toconnect or configure.Please note that if you are going to change to a different 802.1x authenticationEAP method, i.e. switch from using MD5 to TLS, , you must remove the currentexisting wireless network from your Preferred networks first, and add it inagain.To configure for using TLS authentication method, please follow steps 7 ~ 25.Please follow steps 26 ~ for using MD5 authentication method.
45TLS Authentication7. Select “The key is provided for me automatically” option8. Click “OK” to close the Wireless Network Properties window.
469. Click “Authentication” tab10. Select “Enable network access control using IEEE 802.1x” option to enable802.1x authentication.11. Select “Smart Card or other Certificate” from the drop-down list box forEAP type.12. Click “OK” to close the Wireless Network Connection Properties window,thus make the changes effective.The wireless client configuration in the zero-configuration utility provided inWindows XP is now completed for TLS configuration.    Before you can enable IEEE802.1x authentication and have wireless client authenticated by the Radius server, youhave to download the certificate to your local computer first.
47TLS Authentication – Download Digital Certificate from ServerIn most corporations, it requires internal IT or MIS staff’s help to have thecertificated downloaded to your local computer.    One of the main reasons is thateach corporation uses its own server systems, and you will need the assistancefrom your IT or MIS for account/password, CA server location and etc.    Thefollowing illustration is based on obtaining a certificate from Windows 2000Server which can act as a CA server, assuming you have a valid account/passwordto access the server.13. Connect to the server and ask for access, and the server will prompt you toenter your user name and password.14. Enter your user name and password, then click “OK” to continue.Please note that we use IP addresses for connection with the server for ourillustration, and the IP of the server is 192.168.1.10.15. After successful login, open up your Internet Browser, and type the followingin the address field.http://192.168.1.10/certsrvThis is how we connect to the Certificate Service installed in Windows 2000server.
4816. Now we are connected to the Certificate Service.  Select “Request acertificate”, and click “Next” to continue.
4917. Select “User Certificate request”, and click “Next” to continue.
5018. Click “Submit >” to continue.
5119. The Certificate Service is now processing the certificate request.
5220. The certificate is issued by the server, click “Install this certificate” todownload and store the certificate to your local computer.21. Click “Ye s ” to store the certificate to your local computer.
5322. Certificate is now installed.
54All the configuration and certificate download are now complete. Let’s try to connectto the Access Point using 802.1x TLS Authentication.23. Windows XP will prompt you to select a certificate for wireless networkconnection. Click on the network connection icon in the system tray tocontinue.
5524. Select the certificate that was issued by the server (WirelessCA), and click“OK” to continue.25. Check the server to make sure that it’s the server that issues certificate, andclick “OK” to complete the authentication process.
56MD5 Authentication26. Select “Data encryption (WEP enabled)” option, but leave other optionunselected.27. Select the key format that you want to use to key in your Network key.ASCII characters: 0~9, a~z and A~ZHEX characters: 0~9, a~f28. Select the key length that you wish to use40 bits (5 characters for ASCII, 10 characters for HEX)104 bits (13 characters for ASCII, 26 characters for HEX)29. After deciding the key format and key length that you wish to use for networkkey.    Enter the network key in “Network key” text box.Please note that that value of Network key entered, and key format/length used,must be the same as that used in the Access Point.  Although there are 4 set of keyscan be set in the Access Point WEP configuration, it’s the first set of key that mustbe the same as that we used by the supplicant wireless client.30. Click “OK” to close the Wireless Network Properties window, thus make thechanges effective.
5731. Select “Authentication” tab.32. Select “Enable network access control using IEEE 802.1X” to enable802.1x authentication.33. Select “MD-5 Challenge” from the drop-down list box for EAP type.34. Click “OK” to close Wireless Network Connection Properties window, thusmake all the changes effective.
58Unlike TLS, which uses digital certificate for validation, the MD-5 Authenticationis based on the user account/password. Therefore, you must have a valid accountused by the server for validation.35. WindowsXP will prompt you to enter your user name and password. Click onthe network connection icon in the system tray to continue.
5936. Enter the user name, password and the logon domain that your accountbelongs if you have one or more network domain exist in your network.37. Click “OK” to complete the validation process.
60Authenticator: Wireless Network Access PointThis is the web page configuration in the Access Point that we use.1. Enable 802.1x security by selecting “Enable”.2. If MD5 EAP methods is used then you can skip step 3 and go to step 4.3. Select the Encryption Key Length Size ranging from 64 to 256 Bits that youwould like to use.Select the Lifetime of the Encryption Key from 5 Minutes to 1 Day.    As soonas the lifetime of the Encryption Key is over, the Encryption Key will be renewedby the Radius server.4. Enter the IP address of and the Port used by the Primary Radius ServerEnter the Shared Secret, which is used by the Radius Server.5. Enter the IP address of, Port and Shared Secret used by the Secondary RadiusServer.6. Click “Apply” button for the 802.1x settings to take effect after Access Pointreboots itself.1345
61!Note: As soon as 802.1x security is enabled, all the wireless client stations that areconnected to the Access Point currently will be disconnected.    The wireless clientsmust be configured manually to authenticate themselves with the Radius server to bereconnected.
62Radius Server: Window2000 ServerThis section to help those who has Windows 2000 Server installed and wants to setupWindows2000 Server for 802.1x authentication, which includes setting up CertificateService for TLS Authentication, and enable EAP-methods.1. Login into your Windows 2000 Server as Administrator, or account that hasAdministrator authority.2. Go to Start > Control Panel, and double-click “Add or Remove Programs”3. Click on “Add/Remove Windows components”4. Check “Certificate Services”, and click “Next” to continue.
635. Select “Enterprise root CA”, and click “Next” to continue.6. Enter the information that you want for your Certificate Service, and click“Next” to continue.
647. Go to Start > Program > Administrative Tools > Certificate Authority8. Right-click on the “Policy Setting”, select “new”9. Select “Certificate to Issue”10. Select “Authenticated Session” and “Smartcard Logon” by holding downto the Ctrl key, and click “OK” to continue.
6511. Go to Start > Program > Administrative Tools > Active Directory Users andComputers.12. Right-click on domain, and select ”Properties” to continue.13. Select “Group Policy” tab and click “Properties” to continue.
6614. Go to “Computer Configuration” > “Security Settings” > “Public KeyPolicies”15. Right-click “Automatic Certificate Request Setting”, and select “New”16. Click “Automatic Certificate Request ...”
6717. The Automatic Certificate Request Setup Wizard will guide you through theAutomatic Certificate Request setup, simply click “Next” through to the laststep.18. Click “Finish” to complete the Automatic Certificate Request Setup19. Go to Start > Run, and type “command” and click “Enter” to openCommand Prompt.20. Type “secedit/refreshpolicy machine_policy” to refresh policy.
68Adding Internet Authentication Service21. Go to Start > Control Panel > Add or Remove Programs22. Select “Add/Remove Windows Components” from the panel on the left.23. Select “Internet Authentication Service”, and click “OK” to install.
69Setting Internet Authentication Service24. Go to Start > Program > Administrative Tools > Internet AuthenticationService25. Right-click “Client”, and select “New Client”
7026. Enter the IP address of the Access Point in the Client address text field, amemorable name for the Access Point in the Client-Vendor text field, theaccess password used by the Access Point in the Shared secret text field.Re-type the password in the Confirmed shared secret text field.27. Click “Finish” to complete adding of the Access Point.
7128. In the Internet AuthenticationService, right-click “Remote AccessPolicies”29. Select “New Remote AccessPolicy”.30. Select “Day-And-Time-Restriction”, and click “Add” to continue.
72
7331. Unless you want to specify the active duration for 802.1x authentication,click “OK” to accept to have 802.1x authentication enabled at all times.32. Select “Grant remote access permission”, and click “Next” to continue.
7433. Click “Edit Profile” to open up
75For TLS Authentication Setup (Steps 34 ~ 38)34. Select “Authentication” Tab35. Enable “Extensible Authentication Protocol”, and select “Smart Card orother Certificate” for TLS authentication
7636. Go to Start > Program > Administrative Tools > Active Directory Users andComputers37. Select “Users”, and double-click on the user that can be newly created orcurrently existing, who will be configured to have the right to obtain digitalcertificate remotely.Please note that in this case, we have a user called, test, whose account/password areused to obtain the digital certificate from server.
7738. Go to the “Dial-in” tab, and check “Allow access” option for Remote AccessPermission and “No Callback” for Callback Options.
78For MD5 Authentication (Steps 39 ~ 54)39. Go to Start > Program > Administrative Tools > Active Directory Users andComputers.40. Right click on the domain, and select “Properties”
7941. Select “Group Policy” tab, and click “Edit” to edit the Group Policy.
8042. Go to “Computer Configuration” > “Windows Settings” > “SecuritySettings” > “Account Policies” > “Password Policies”43. Click “Define this policy setting”, select “Enabled”, and click “OK” tocontinue.
8144. Go to Start > Program > Administrative Tools > Active Directory Users andComputers.45. Go to Users. Right-click on the user that you are granting access, and select“Properties”
8246. Go to “Account” tab, and enable “Store password using reversibleencryption”47. Click “OK” to continue.
8348. Go to Start > Program > Administrative Tools > Internet AuthenticationService.49. Go to Remote Access Policies50. Make sure that MD5 is moved up to Order 151. Right-click “MD5”, and select “Properties”
8452. Go to “Authentication” tab53. Enable “Extensible Authentication Protocol”54. Select “MD5-Challenge” for EAP type.
85APPENDIX D: GLOSSARYAccess Point ― An internetworking device that seamlessly connects wired andwireless networks.Ad-Hoc ― An independent wireless LAN network formed by a group of computers,each with an network adapter.AP Client – One of the additional AP operating modes offered by 22Mbps AccessPoint, which allows the Access Point to act as an Ethernet-to-Wireless Bridge, thus aLAN or a single computer station can join a wireless ESS network through it.ASCII – American Standard Code for Information Interchange, ASCII, is one of thetwo formats that you can use for entering the values for WEP key. It representsEnglish letters as numbers from 0 to 127.Authentication Type ― Indication of an authentication algorithm which can besupported by the Access Point:1. Open System : Open System authentication is the simplest of the availableauthentication algorithms. Essentially it is a null authentication algorithm.Any station that requests authentication with this algorithm may becomeauthenticated if 802.11 Authentication Type at the recipient station is set toOpen System authentication.2. Shared Key : Shared Key authentication supports authentication of stationsas either a member of those who knows a shared secret key or a member ofthose who does not.Backbone ― The core infrastructure of a network, which transports information fromone central location to another where the information is unloaded into a local system.Bandwidth ― The transmission capacity of a device, which is calculated by howmuch data the device can transmit in a fixed amount of time expressed in bits persecond (bps).Basic Rate ― the fixed transmitted and receiving data rate allowed by the AP withthe value 1,2,5.5, 11 and 22 Mbps for selection.
86Beacon ― A beacon is a packet broadcast by the Access Point to keep the networksynchronized.    Included in a beacon are information such as wireless LAN servicearea, the AP address, the Broadcast destination addresses, time stamp, DeliveryTraffic Indicator Maps, and the Traffic Indicator Message (TIM).Bit ― A binary digit, which is either -0 or -1 for value, is the smallest unit for data.Bridge ― An internetworking function that incorporates the lowest 2 layers of theOSI network protocol model.Browser ― An application program that enables one to read the content and interactin the World Wide Web or Intranet.BSS ― BSS stands for “Basic Service Set”. It is an Access Point and all the LANPCs that associated with it.Channel ― The bandwidth which wireless Radio operates is divided into severalsegments, which we call them “Channels”.    AP and the client stations that itassociated work in one of the channels.CSMA/CA ― In local area networking, this is the CSMA technique that combinesslotted time-division multiplexing with carrier sense multiple access/collisiondetection (CSMA/CD) to avoid having collisions occur a second time.    This worksbest if the time allocated is short compared to packet length and if the number ofsituations is small.CSMA/CD  ― Carrier Sense Multiple Access/Collision Detection, which is a LANaccess method used in Ethernet.    When a device wants to gain access to the network,it checks to see if the network is quiet (senses the carrier). If it is not, it waits arandom amount of time before retrying.  If the network is quiet and two devicesaccess the line at exactly the same time, their signals collide.    When the collision isdetected, they both back off and wait a random amount of time before retrying.DHCP  ― Dynamic Host Configuration Protocol, which is a protocol that letsnetwork administrators manage and allocate Internet Protocol (IP) addresses in anetwork.    Every computer has to have an IP address in order to communicate witheach other in a TCP/IP based infrastructure network. Without DHCP, each computermust be entered in manually the IP address.  DHCP enables the networkadministrators to assign the IP from a central location and each computer receives anIP address upon plugged with the Ethernet cable everywhere on the network.DSSS ― Direct Sequence Spread Spectrum.    DSSS generates a redundant bit patternfor each bit to be transmitted. This bit pattern is called a chip (or chipping code). Thelonger the chip, the greater the probability that the original data can be recovered.Even if one or more bits in the chip are damaged during transmission, statisticaltechniques embedded in the radio can recover the original data without the need for
87retransmission.  To an unintended receiver, DSSS appears as low power widebandnoise and is rejected (ignored) by most narrowband receivers.Dynamic IP Address ― An IP address that is assigned automatically to a clientstation in a TCP/IP network by a DHCP server.Encryption  ― A security method that uses a specific algorithm to alter the datatransmitted, thus prevent others from knowing the information transmitted.ESS ― ESS stands for “Extended Service Set”. More than one BSS is configured tobecome Extended Service Set. LAN mobile users can roam between different BSSs inan ESS.ESSID ― The unique identifier that identifies the ESS.    In infrastructureassociation , the stations use the same ESSID as AP’s to get connected.Ethernet ― A popular local area data communications network, originally developedby Xerox Corp., that accepts transmission from computers and terminals.    Ethernetoperates on a 10/100 Mbps base transmission rate, using a shielded coaxial cable orover shielded twisted pair telephone wire.Fragmentation ― When transmitting a packet over a network medium, sometimesthe packet is broken into several segments, if the size of packet exceeds that allowedby the network medium.Fragmentation Threshold – The Fragmentation Threshold defines the number ofbytes used for the fragmentation boundary for directed messages. The purpose of"Fragmentation Threshold" is to increase the transfer reliability thru cutting a MACService Data Unit (MSDU) into several MAC Protocol Data Units (MPDU) in smallersize. The RF transmission can not allow to transmit too big frame size due to theheavy interference caused by the big size of transmission frame. But if the frame sizeis too small, it will create the overhead during the transmission.Gateway  ― a device that interconnects networks with different, incompatiblecommunication protocols.HEX – Hexadecimal, HEX, consists of numbers from 0 – 9 and letters from A – F.IEEE ― The Institute of Electrical and Electronics Engineers, which is the largesttechnical professional society that promotes the development and application ofelectrotechnology and allied sciences for the benefit of humanity, the advancement ofthe profession.  The IEEE fosters the development of standards that often becomenational and international standards.Infrastructure ― An infrastructure network is a wireless network or other smallnetwork in which the wireless network devices are made a part of the network throughthe Access Point which connects them to the rest of the network.ISM Band ― The FCC and their counterparts outside of the U.S. have set aside
88bandwidth for unlicensed use in the ISM (Industrial, Scientific and Medical) band.Spectrum in the vicinity of 2.4GHz, in particular, is being made available worldwide.MAC Address ― Media Access Control Address is a unique hex number assignedby the manufacturer to any Ethernet networking device, such as a network adapter,that allows the network to identify it at the hardware level.Multicasting ― Sending data to a group of nodes instead of a single destination.Multiple Bridge – One of the additional AP operating modes offered by 22MbpsAccess Point, which allows a group of APs that consists of two or more APs toconnect two or more Ethernet networks or Ethernet enabled clients together.    Theway that multiple bridge setup is based on the topology of Ad-Hoc mode.Node ― A network junction or connection point, typically a computer or workstation.Packet ― A unit of data routed between an origin and a destination in a network.PLCP ― Physical layer convergence protocolPPDU ― PLCP protocol data unitPreamble Type ― During transmission, the PSDU shall be appended to a PLCPpreamble and header to create the PPDU. Two different preambles and headers aredefined as the mandatory supported long preamble and header which interoperateswith the current 1 and 2 Mbit/s DSSS specification as described in IEEE Std 802.11-1999, and an optional short preamble and header. At the receiver, the PLCP preambleand header are processed to aid in demodulation and delivery of the PSDU. Theoptional short preamble and header is intended for application where maximumthroughput is desired and interoperability with legacy and non-short-preamble capableequipment is not consideration. That is, it is expected to be used only in networks oflike equipment that can all handle the optional mode. (IEEE 802.11b standard)PSDU ― PLCP service data unitRoaming ― A LAN mobile user moves around an ESS and enjoys a continuousconnection to an Infrastructure network.RTS ― Request To Send.    An RS-232 signal sent from the transmitting station tothe receiving station requesting permission to transmit.RTS Threshold ― Transmitters contending for the medium may not be aware ofeach other. RTS/CTS mechanism can solve this “Hidden Node Problem”. If thepacket size is smaller than the preset RTS Threshold size, the RTS/CTS mechanismwill NOT be enabled.
89SSID ― Service Set Identifier, which is a unique name shared among all clients andnodes in a wireless network.    The SSID must be identical for each clients and nodesin the wireless network.Subnet Mask ― The method used for splitting IP networks into a series of sub-groups, or subnets.  The mask is a binary pattern that is matched up with the IPaddress to turn part of the host ID address field into a field for subnets.TCP/IP  ― Transmission Control Protocol/ Internet Protocol. The basiccommunication language or protocol of the Internet. It can also be used as acommunications protocol in a private network, i.e. intranet or internet.   When youare set up with direct access to the Internet, your computer is provided with a copy ofthe TCP/IP program just as every other computer that you may send messages to orget information from also has a copy of TCP/IP.Throughput  ― The amount of data transferred successfully from one point toanother in a given period of time.WEP ― Wired Equivalent Privacy (WEP) is an encryption scheme used to protectwireless data communication. To enable the icon will prevent other stations withoutthe same WEP key from linking with the AP.Wireless Bridge – One of the additional AP operating modes offered by 22mpbsAccess Point, which allows a pair of APs to act as the bridge that connects twoEthernet networks or Ethernet enabled clients together.
90APPENDIX E: TECHNICAL SPECIFICATIONStandard 802.11b compliant (wireless)Data Rate 1 / 2 / 5.5 / 11 / 22 MbpsEmission Type Direct Sequence Spread Spectrum (DSSS)Data Modulation 1 Mbps – BPSK2 Mbps – QPSK5.5 / 11 Mbps – CCK5.5 / 11 / 22 Mbps - PBCCRF Frequency 2412 MHz – 2462 MHz (North America)2412 MHz – 2472 MHz (General Europe)2412 MHz – 2484 MHz (Japan)Operating Channel 11 Channels (North America)13 Channels (Europe)14 Channels (Japan)RF Output Power 16 ~ 18 dBm (typical)Sensitivity 22Mbps PBCC -80 dBm (Typically @25℃+5℃)11Mbps PBCC  - 85 dBm (Typically @25℃+5℃)11Mbps  CCK  - 82 dBm (Typically @25℃+5℃)Security Wired Equivalent Privacy (WEP) 64 / 128 / 256 bitAntenna Type Diversity Patch with 2.0 dBi max. Antenna Gain.Interface PC CardBus, PC Card Standard v7.2Dimension 128.0 x 54.0 x 50.0 mmMemory 8Kbytes EEPROMPower Voltage 3.3V + 5%Power Consumption Operation max. 650 mA by TX350 mA by RX

Navigation menu