Intel 105BNH Intel Centrino Wireless-N 105 User Manual

Intel Mobile Communications Intel Centrino Wireless-N 105

User Manual

Intel® Wireless Adapter Information GuideSupported wireless adapters:Intel® Centrino® Wireless-N 100 (Available for Windows* 7 only)Intel® Centrino® Wireless-N 105 (Available for Windows* 7 only)Intel® Centrino® Wireless-N 130 (Available for Windows* 7 only)Intel® Centrino® Wireless-N 135 (Available for Windows* 7 only)Intel® WiFi Link 1000Intel® Centrino® Wireless-N 1030Intel® Centrino® Wireless-N 2200 (Available for Windows* 7 only)Intel® Centrino® Wireless-N 2230 (Available for Windows* 7 only)Intel® Centrino® Wireless-N + WiMAX 6150Intel® Centrino® Advanced-N 6200Intel® Centrino® Advanced-N 6205Intel® Centrino® Advanced-N 6230Intel® Centrino® Advanced-N 6235 (Not available for Windows Vista)Intel® Centrino® Advanced-N + WiMAX 6250Intel® Centrino® Ultimate-N 6300With your WiFi network card, you can access WiFi networks, share files or printers, or even share your Internetconnection. All of these features can be explored using a WiFi network in your home or office. This WiFi networksolution is designed for both home and business use. Additional users and features can be added as yournetworking needs grow and change.This guide contains basic information about Intel adapters. It includes information about several adapter propertiesthat you can set to control and enhance the performance of your adapter with your particular wireless networkand environment. Intel® wireless adapters enable fast connectivity without wires for desktop and notebook PCs.Adapter SettingsRegulatory InformationSpecificationsImportant InformationSupportWarrantyGlossaryDepending on the model of your Intel WiFi adapter, your adapter is compatible with 802.11a, 802.11b, 802.11g,and 802.11n (draft 2.0) wireless standards. Operating at 5 GHz or 2.4 GHz frequency at data rates of up to 450Mbps, you can now connect your computer to existing high-speed networks that use multiple access points withinlarge or small environments. Your WiFi adapter maintains automatic data rate control according to the access pointlocation and signal strength to achieve the fastest possible connection. All of your wireless network connectionsare easily managed by the WiFi connection utility. Profiles that are set up through the WiFi connection utilityprovide enhanced security measures with 802.1X network authentication.Information in this document is subject to change without notice.© 2004–2011 Intel Corporation. All rights reserved. Intel Corporation, 5200 N.E. Elam Young Parkway,Hillsboro, OR 97124-6497 USAThe copying or reproducing of any material in this document in any manner whatsoever without the writtenpermission of Intel Corporation is strictly forbidden. Intel® is a trademark or registered trademark of IntelCorporation or its subsidiaries in the United States and other countries. Other trademarks and trade names maybe used in this document to refer to either the entities claiming the marks and names or their products. Inteldisclaims any proprietary interest in trademarks and trade names other than its own. Microsoft and Windows areregistered trademarks of Microsoft Corporation. Windows Vista is either a registered trademark or trademark ofMicrosoft Corporation in the United States and/or other countries.*Other names and brands may be claimed as the property of others.
Intel Corporation assumes no responsibility for errors or omissions in this document. Nor does Intel make anycommitment to update the information contained herein."IMPORTANT NOTICE FOR ALL USERS OR DISTRIBUTORS:Intel wireless LAN adapters are engineered, manufactured, tested, and quality checked to ensure that they meetall necessary local and governmental regulatory agency requirements for the regions that they are designatedand/or marked to ship into. Because wireless LANs are generally unlicensed devices that share spectrum withradars, satellites, and other licensed and unlicensed devices, it is sometimes necessary to dynamically detect,avoid, and limit usage to avoid interference with these devices. In many instances Intel is required to provide testdata to prove regional and local compliance to regional and governmental regulations before certification orapproval to use the product is granted. Intel's wireless LAN's EEPROM, firmware, and software driver are designedto carefully control parameters that affect radio operation and to ensure electromagnetic compliance (EMC). Theseparameters include, without limitation, RF power, spectrum usage, channel scanning, and human exposure.For these reasons Intel cannot permit any manipulation by third parties of the software provided in binary formatwith the wireless LAN adapters (e.g., the EEPROM and firmware). Furthermore, if you use any patches, utilities, orcode with the Intel wireless LAN adapters that have been manipulated by an unauthorized party (i.e., patches,utilities, or code (including open source code modifications) which have not been validated by Intel), (i) you will besolely responsible for ensuring the regulatory compliance of the products, (ii) Intel will bear no liability, under anytheory of liability for any issues associated with the modified products, including without limitation, claims underthe warranty and/or issues arising from regulatory non-compliance, and (iii) Intel will not provide or be required toassist in providing support to any third parties for such modified products.Note: Many regulatory agencies consider Wireless LAN adapters to be "modules", and accordingly, conditionsystem-level regulatory approval upon receipt and review of test data documenting that the antennas and systemconfiguration do not cause the EMC and radio operation to be non-compliant."September 7, 2011
Back to ContentsAdapter SettingsThe Advanced tab displays the device properties for the WiFi adapter installed on your computer.How to AccessAt the Intel® PROSet/Wireless WiFi Connection Utility, Advanced Menu click Adapter Settings. Select theAdvanced tab.WiFi Adapter Settings DescriptionName Description802.11nChannel Width(2.4 GHz)Set high throughput channel width to maximize performance. Set the channel width to Auto or20MHz. Use 20MHz if 802.11n channels are restricted. This setting applies to 802.11n capableadapters only.NOTE: This setting does not apply to the Intel® Wireless WiFi Link 4965AGN (uses 20 MHzchannel width only).802.11nChannel Width(5.2 GHz)Set high throughput channel width to maximize performance. Set the channel width to Auto or20MHz. Use 20MHz if 802.11n channels are restricted. This setting applies to 802.11n capableadapters only.NOTE: This setting does not apply to the following adapters:Intel® WiFi Link 1000Intel® Wireless WiFi Link 4965AGN802.11n Mode The 802.11n standard builds on previous 802.11 standards by adding multiple-input multiple-output (MIMO). MIMO increases data throughput to improve transfer rate. Select Enabled orDisabled to set the 802.11n mode of the WiFi adapter. Enabled is the default setting. Thissetting applies to 802.11n capable adapters only.NOTE: To achieve transfer rates greater than 54 Mbps on 802.11n connections, WPA2*-AESsecurity must be selected. No security (None) can be selected to enable network setup andtroubleshooting.An administrator can enable or disable support for high throughput mode to reduce power-consumption or conflicts with other bands or compatibility issues.Ad HocChannel Unless the other computers in the ad hoc network use a different channel from the defaultchannel, there is no need to change the channel.Value: Select the permitted operating channel from the list.802.11b/g: Select this option when 802.11b and 802.11g (2.4 GHz) ad hoc bandfrequency is used.802.11a: Select this option when 802.11a (5 GHz) ad hoc band frequency is used. Thissetting does not apply to the Intel® WiFi Link 1000 adapter.NOTE: When an 802.11a channel is not displayed, initiating ad hoc networks is not supportedfor 802.11a channels.Ad Hoc PowerManagement Set power saving features for device to device (ad hoc) networks.Disable: Select when connecting to ad hoc networks that contain stations that do notsupport ad hoc power managementMaximum Power Savings: Select to optimize battery life.
Noisy Environment: Select to optimize performance or connecting with multiple clients.Ad Hoc QoSMode Quality of Service (QoS) control in ad hoc networks. QoS provides prioritization of traffic fromthe access point over a wireless LAN based on traffic classification. WMM (Wi-Fi Multimedia) isthe QoS certification of the Wi-Fi Alliance (WFA). When WMM is enabled, the WiFi adapter usesWMM to support priority tagging and queuing capabilities for Wi-Fi networks.WMM Enabled (Default)WMM DisabledFat ChannelIntolerant This setting communicates to surrounding networks that this WiFi adapter is not tolerant of40MHz channels in the 2.4GHz band. The default setting is for this to be turned off (disabled),so that the adapter does not send this notification.NOTE: This setting does not apply to the following adapters:Intel® Wireless WiFi Link 4965AG_Intel® PRO/Wireless 3945ABG Network ConnectionMixed modeprotection Use to avoid data collisions in a mixed 802.11b and 802.11g environment. Request toSend/Clear to Send (RTS/CTS) should be used in an environment where clients may not heareach other. CTS-to-self can be used to gain more throughput in an environment where clientsare in close proximity and can hear each other.PowerManagement Lets you select a balance between power consumption and WiFi adapter performance. The WiFiadapter power settings slider sets a balance between the computer's power source and thebattery.Use default value: (Default) Power settings are based on the computer's power source.Manual: Adjust the slider for the desired setting. Use the lowest setting for maximumbattery life. Use the highest setting for maximum performance.NOTE: Power consumption savings vary based on Network (Infrastructure) settings.RoamingAggressiveness This setting lets you define how aggressively your wireless client roams to improve connectionto an access point.Default: Balanced setting between not roaming and performance.Lowest: Your wireless client will not roam. Only significant link quality degradationcauses it to roam to another access point.Highest: Your wireless client continuously tracks the link quality. If any degradationoccurs, it tries to find and roam to a better access point.ThroughputEnhancement Changes the value of the Packet Burst Control.Enable: Select to enable throughput enhancement.Disable: (Default) Select to disable throughput enhancement.TransmitPower Default Setting: Highest power setting.Lowest: Minimum Coverage: Set the adapter to the lowest transmit power. Enables you toexpand the number of coverage areas or confine a coverage area. Reduces the coverage areain high traffic areas to improve overall transmission quality and avoids congestion andinterference with other devices.Highest: Maximum Coverage: Set the adapter to a maximum transmit power level. Selectfor maximum performance and range in environments with limited additional WiFi radiodevices.NOTE: The optimal setting is for a user to always set the transmit power at the lowestpossible level that is still compatible with the quality of their communication. This allows themaximum number of wireless devices to operate in dense areas and reduce interference withother devices that it shares the same radio spectrum with.
NOTE: This setting takes effect when either Network (Infrastructure) or Device to Device (adhoc) mode is used.Wireless Mode Select which mode to use for connection to a wireless network:802.11a only: Connect the wireless WiFi adapter to 802.11a networks only. Notapplicable for all adapters.802.11b only: Connect the wireless WiFi adapter to 802.11b networks only. Notapplicable for all adapters.802.11g only: Connect the wireless WiFi adapter to 802.11g networks only.802.11a and 802.11g: Connect the WiFi adapter to 802.11a and 802.11g networksonly. Not applicable for all adapters.802.11b and 802.11g: Connect the WiFi adapter to 802.11b and 802.11g networksonly. Not applicable for all adapters.802.11a, 802.11b, and 802.11g: (Default) - Connect to either 802.11a, 802.11b or802.11g wireless networks. Not applicable for all adapters.NOTE: These wireless modes (Modulation type) determine the discovered access pointsdisplayed in the WiFi Networks listOK Saves settings and returns to the previous page.Cancel Closes and cancels any changes.Back to TopBack to ContentsTrademarks and Disclaimers
Back to ContentsRegulatory InformationNOTE: Due to the evolving state of regulations and standards in the wireless LAN field (IEEE 802.11and similar standards), the information provided herein is subject to change. Intel Corporationassumes no responsibility for errors or omissions in this document.Intel® Centrino® Wireless-N 100Intel® Centrino® Wireless-N 105Intel® Centrino® Wireless-N 130Intel® Centrino® Wireless-N 135Intel® WiFi Link 1000Intel® Centrino® Wireless-N 1030Intel® Centrino® Wireless-N 2200Intel® Centrino® Wireless-N 2230Intel® Centrino® Wireless-N + WiMAX 6150Intel® Centrino® Advanced-N 6200Intel® Centrino® Advanced-N 6205Intel® Centrino® Advanced-N 6230Intel® Centrino® Advanced-N 6235Intel® Centrino® Advanced-N + WiMAX 6250Intel® Centrino® Ultimate-N 6300Intel WiFi/WiMAX Wireless AdaptersInformation in this section supports the following wireless adapters:Intel® Centrino® Wireless-N + WiMAX 6150Intel® Centrino® Advanced-N + WiMAX 6250See Specifications for complete wireless adapter specifications.NOTE: In this section, all references to the "wireless adapter" refer to all adapters listed above.The following information is provided:Information for the UserRegulatory InformationInformation for the UserSafety NoticesUSA—FCC and FAAThe FCC with its action in ET Docket 96-8 has adopted a safety standard for human exposure to radio frequency(RF) electromagnetic energy emitted by FCC certified equipment. The wireless adapter meets the Human Exposurelimits found in OET Bulletin 65, supplement C, 2001, and ANSI/IEEE C95.1, 1992. Proper operation of this radioaccording to the instructions found in this manual will result in exposure substantially below the FCC’srecommended limits.The following safety precautions should be observed:Do not touch or move antenna while the unit is transmitting or receiving.Do not hold any component containing the radio such that the antenna is very close or touching anyexposed parts of the body, especially the face or eyes, while transmitting.Do not operate the radio or attempt to transmit data unless the antenna is connected; this behavior may
cause damage to the radio.Use in specific environments:The use of wireless adapters in hazardous locations is limited by the constraints posed by the safetydirectors of such environments.The use of wireless adapters on airplanes is governed by the Federal Aviation Administration (FAA).The use of wireless adapters in hospitals is restricted to the limits set forth by each hospital.Antenna UseIn order to comply with FCC RF exposure limits, low gain integrated antennas should be located at a minimumdistance of 20cm (8 inches) or more from the body of all persons or at a minimum distance as specified by theFCC module grant conditions. FCC grants can be viewed from the FCC Equipment Authorization website athttps://fjallfoss.fcc.gov/oetcf/eas/reports/GenericSearch.cfm by entering the FCC ID printed on the module label.Explosive Device Proximity Warning Warning: Do not operate a portable transmitter (including this wireless adapter) near unshielded blastingcaps or in an explosive environment unless the transmitter has been modified to be qualified for such use.Antenna Warnings Warning: To comply with the FCC and ANSI C95.1 RF exposure limits, it is recommended that for thewireless adapter installed in a desktop or portable computer, the antenna for this wireless adapter to be installedso as to provide a separation distance of at least 20 cm (8 inches) from all persons or at the minimum distance asspecified by the module grant conditions. FCC grants can be viewed from the FCC Equipment Authorization websiteat https://fjallfoss.fcc.gov/oetcf/eas/reports/GenericSearch.cfm by entering the FCC ID printed on the modulelabel. Warning: The wireless adapter is not designed for use with high-gain directional antennas.Use On Aircraft Caution Caution: Regulations of the FCC and FAA prohibit airborne operation of radio-frequency wireless devices(wireless adapters) because their signals could interfere with critical aircraft instruments.Other Wireless DevicesSafety Notices for Other Devices in the Wireless Network: See the documentation supplied with wirelessadapters or other devices in the wireless network.Local Restrictions on 802.11a, 802.11b, 802.11g, 802.11n, and 802.16e Radio Usage Caution: Due to the fact that the frequencies used by 802.11a, 802.11b, 802.11g, 802.11n, and 802.16ewireless LAN devices may not yet be harmonized in all countries, 802.11a, 802.11b, 802.11g, 802.11n, and802.16e products are designed for use only in specific countries, and are not allowed to be operated in countriesother than those of designated use. As a user of these products, you are responsible for ensuring that theproducts are used only in the countries for which they were intended and for verifying that they are configuredwith the correct selection of frequency and channel for the country of use. The device transmit power control(TPC) interface is part of the Intel® PROSet/Wireless WiFi Connection Utility Software. Operational restrictions forEquivalent Isotropic Radiated Power (EIRP) are provided by the system manufacturer. Any deviation from thepermissible power and frequency settings for the country of use is an infringement of national law and may bepunished as such.For country-specific information, see the additional compliance information supplied with the product.Wireless InteroperabilityThe wireless adapter is designed to be interoperable with other wireless LAN products that are based on direct
sequence spread spectrum (DSSS) radio technology and to comply with the following standards:IEEE Std. 802.11b compliant Standard on Wireless LANIEEE Std. 802.11g compliant Standard on Wireless LANIEEE Std. 802.11a compliant Standard on Wireless LANIEEE Std. 802.11n draft 2.0 compliant on Wireless LANIEEE 802.16e-2005 Wave 2 compliantWireless Fidelity certification, as defined by the Wi-Fi AllianceWiMAX certification as defined by the WiMAX ForumThe Wireless Adapter and Your HealthThe wireless adapter, like other radio devices, emits radio frequency electromagnetic energy. The level of energyemitted by the wireless adapter, however, is less than the electromagnetic energy emitted by other wirelessdevices such as mobile phones. The wireless adapter operates within the guidelines found in radio frequency safetystandards and recommendations. These standards and recommendations reflect the consensus of the scientificcommunity and result from deliberations of panels and committees of scientists who continually review andinterpret the extensive research literature. In some situations or environments, the use of the wireless adaptermay be restricted by the proprietor of the building or responsible representatives of the applicable organization.Examples of such situations may include:Using the wireless adapter on board airplanes, orUsing the wireless adapter in any other environment where the risk of interference with other devices orservices is perceived or identified as being harmful.If you are uncertain of the policy that applies to the use of wireless adapters in a specific organization orenvironment (an airport, for example), you are encouraged to ask for authorization to use the adapter before youturn it on.WEEERegulatory InformationInformation for the OEMs and IntegratorsThe following statement must be included with all versions of this document supplied to an OEM or integrator, butshould not be distributed to the end user.This device is intended for OEM integrators only.Please see the full Grant of Equipment document for other restrictions.This device must be operated and used with a locally approved access point.Information To Be Supplied to the End User by the OEM or IntegratorThe following regulatory and safety notices must be published in documentation supplied to the end user of theproduct or system incorporating the Intel® wireless adapter, in compliance with local regulations. Host systemmust be labeled with "Contains FCC ID: XXXXXXXX", FCC ID displayed on label.The Intel® wireless adapter must be installed and used in strict accordance with the manufacturer's instructions asdescribed in the user documentation that comes with the product. Intel Corporation is not responsible for anyradio or television interference caused by unauthorized modification of the devices included with the wirelessadapter kit or the substitution or attachment of connecting cables and equipment other than that specified by IntelCorporation. The correction of interference caused by such unauthorized modification, substitution or attachment is
the responsibility of the user. Intel Corporation and authorized resellers or distributors are not liable for anydamage or violation of government regulations that may arise from the user failing to comply with theseguidelines.Local Restriction of 802.11a, 802.11b, 802.11g, and 802.11n Radio UsageThe following statement on local restrictions must be published as part of the compliance documentation for all802.11a, 802.11b, 802.11g and 802.11n products. Caution: Due to the fact that the frequencies used by 802.11a, 802.11b, 802.11g, 802.11n, and 802.16ewireless LAN devices may not yet be harmonized in all countries, 802.11a, 802.11b, 802.11g, 802.11n, and802.16e products are designed for use only in specific countries, and are not allowed to be operated in countriesother than those of designated use. As a user of these products, you are responsible for ensuring that theproducts are used only in the countries for which they were intended and for verifying that they are configuredwith the correct selection of frequency and channel for the country of use. Any deviation from the permissiblepower and frequency settings for the country of use is an infringement of national law and may be punished assuch.FCC Radio Frequency Interference RequirementsThis wireless adapter is restricted to indoor use due to its operation in the 5.15 to 5.25 GHz frequency range. FCCrequires this wireless adapter to be used indoors for the frequency range 5.15 to 5.25 GHz to reduce the potentialfor harmful interference to co-channel mobile satellite systems. High power radars are allocated as primary usersof the 5.25 to 5.35 GHz and 5.65 to 5.85 GHz bands. These radar stations can cause interference with and /ordamage this device.This wireless adapter is intended for OEM integrators only.This wireless adapter cannot be co-located with any other transmitter unless approved by the FCC.USA—Federal Communications Commission (FCC)This wireless adapter complies with Part 15 of the FCC Rules. Operation of the device is subject to the followingtwo conditions:This device may not cause harmful interference.This device must accept any interference that may cause undesired operation.NOTE: The radiated output power of the adapter is far below the FCC radio frequency exposure limits.Nevertheless, the adapter should be used in such a manner that the potential for human contactduring normal operation is minimized. To avoid the possibility of exceeding the FCC radio frequencyexposure limits, you should keep a distance of at least 20cm between you (or any other person in thevicinity), or the minimum separation distance as specified by the FCC grant conditions, and theantenna that is built into the computer. Details of the authorized configurations can be found athttp://www.fcc.gov/oet/ea/ by entering the FCC ID number on the device.Interference StatementThis wireless adapter has been tested and found to comply with the limits for a Class B digital device, pursuant toPart 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interferencein a residential installation. This wireless adapter generates, uses, and can radiate radio frequency energy. If thewireless adapter is not installed and used in accordance with the instructions, the wireless adapter may causeharmful interference to radio communications. There is no guarantee, however, that such interference will notoccur in a particular installation. If this wireless adapter does cause harmful interference to radio or televisionreception (which can be determined by turning the equipment off and on), the user is encouraged to try to correctthe interference by taking one or more of the following measures:Reorient or relocate the receiving antenna of the equipment experiencing the interference.Increase the distance between the wireless adapter and the equipment experiencing the interference.Connect the computer with the wireless adapter to an outlet on a circuit different from that to which theequipment experiencing the interference is connected.
Consult the dealer or an experienced radio/TV technician for help.NOTE: The adapter must be installed and used in strict accordance with the manufacturer'sinstructions as described in the user documentation that comes with the product. Any other installationor use will violate FCC Part 15 regulations.Underwriters Laboratories Inc. (UL) Regulatory WarningFor use in (or with) UL Listed personal computers or compatible.Low HalogenApplies only to brominated and chlorinated flame retardants (BFRs/CFRs) and PVC in the final product. Intelcomponents as well as purchased components on the finished assembly meet JS-709 requirements, and the PCB /substrate meet IEC 61249-2-21 requirements. The replacement of halogenated flame retardants and/or PVC maynot be better for the environment.TaiwanRadio ApprovalsTo determine whether you are allowed to use your wireless network device in a specific country, please check tosee if the radio type number that is printed on the identification label of your device is listed in the manufacturer'sOEM Regulatory Guidance document.Regulatory MarkingsA list of required regulatory markings can be found on the web at http://www.intel.com/support/wireless/wlan/To find the regulatory information for your adapter, click on the link for your adapter. Then click AdditionalInformation > Regulatory Documents.Intel WiFi Adapters, 802.11n CompliantThe information in this section applies to the following products:Intel® Centrino® Wireless-N 100Intel® Centrino® Wireless-N 105Intel® Centrino® Wireless-N 130Intel® Centrino® Wireless-N 135Intel® WiFi Link 1000Intel® Centrino® Wireless-N 1030Intel® Centrino® Wireless-N 2200Intel® Centrino® Wireless-N 2230Intel® Centrino® Advanced-N 6200
Intel® Centrino® Advanced-N 6205Intel® Centrino® Advanced-N 6230Intel® Centrino® Advanced-N 6235Intel® Centrino® Ultimate-N 6300See Specifications for wireless adapter specifications.NOTE: In this section, all references to the "wireless adapter" refer to all adapters listed above.The following information is provided:Information for the UserRegulatory InformationInformation for the UserSafety NoticesUSA—FCC and FAAThe FCC with its action in ET Docket 96-8 has adopted a safety standard for human exposure to radio frequency(RF) electromagnetic energy emitted by FCC certified equipment. The wireless adapter meets the Human Exposurelimits found in OET Bulletin 65, supplement C, 2001, and ANSI/IEEE C95.1, 1992. Proper operation of this radioaccording to the instructions found in this manual will result in exposure substantially below the FCC’srecommended limits.The following safety precautions should be observed:Do not touch or move antenna while the unit is transmitting or receiving.Do not hold any component containing the radio such that the antenna is very close or touching anyexposed parts of the body, especially the face or eyes, while transmitting.Do not operate the radio or attempt to transmit data unless the antenna is connected; this behavior maycause damage to the radio.Use in specific environments:The use of wireless adapters in hazardous locations is limited by the constraints posed by the safetydirectors of such environments.The use of wireless adapters on airplanes is governed by the Federal Aviation Administration (FAA).The use of wireless adapters in hospitals is restricted to the limits set forth by each hospital.Antenna UseIn order to comply with FCC RF exposure limits, low gain integrated antennas should be located at a minimumdistance of 20cm (8 inches) or more from the body of all persons or at a minimum distance as specified by theFCC module grant conditions. FCC grants can be viewed from the FCC Equipment Authorization website athttps://fjallfoss.fcc.gov/oetcf/eas/reports/GenericSearch.cfm by entering the FCC ID printed on the module label.Explosive Device Proximity WarningWarning: Do not operate a portable transmitter (including this wireless adapter) near unshielded blastingcaps or in an explosive environment unless the transmitter has been modified to be qualified for such use.Antenna Warnings Warning: To comply with the FCC and ANSI C95.1 RF exposure limits, it is recommended that for thewireless adapter installed in a desktop or portable computer, the antenna for this wireless adapter to be installedso as to provide a separation distance of at least 20 cm (8 inches) from all persons or at the minimum distance asspecified by the module grant conditions. FCC grants can be viewed from the FCC Equipment Authorization websiteat https://fjallfoss.fcc.gov/oetcf/eas/reports/GenericSearch.cfm by entering the FCC ID printed on the modulelabel.
 Warning: The wireless adapter is not designed for use with high-gain directional antennas.Use On Aircraft Caution Caution: Regulations of the FCC and FAA prohibit airborne operation of radio-frequency wireless devices(wireless adapters) because their signals could interfere with critical aircraft instruments.Other Wireless DevicesSafety Notices for Other Devices in the Wireless Network: See the documentation supplied with wirelessadapters or other devices in the wireless network.Local Restrictions on 802.11a, 802.11b, 802.11g and 802.11n Radio Usage Caution: Due to the fact that the frequencies used by 802.11a, 802.11b, 802.11g and 802.11n wireless LANdevices may not yet be harmonized in all countries, 802.11a, 802.11b, 802.11g and 802.11n products aredesigned for use only in specific countries, and are not allowed to be operated in countries other than those ofdesignated use. As a user of these products, you are responsible for ensuring that the products are used only inthe countries for which they were intended and for verifying that they are configured with the correct selection offrequency and channel for the country of use. The device transmit power control (TPC) interface is part of theIntel® PROSet/Wireless WiFi Connection Utility Software. Operational restrictions for Equivalent Isotropic RadiatedPower (EIRP) are provided by the system manufacturer. Any deviation from the permissible power and frequencysettings for the country of use is an infringement of national law and may be punished as such.For country-specific information, see the additional compliance information supplied with the product.Wireless InteroperabilityThe wireless adapter is designed to be interoperable with other wireless LAN products that are based on directsequence spread spectrum (DSSS) radio technology and to comply with the following standards:IEEE Std. 802.11b compliant Standard on Wireless LANIEEE Std. 802.11g compliant Standard on Wireless LANIEEE Std. 802.11a compliant Standard on Wireless LANIEEE Std. 802.11n draft 2.0 compliant on Wireless LANWireless Fidelity certification, as defined by the Wi-Fi AllianceThe Wireless Adapter and Your HealthThe wireless adapter, like other radio devices, emits radio frequency electromagnetic energy. The level of energyemitted by the wireless adapter, however, is less than the electromagnetic energy emitted by other wirelessdevices such as mobile phones. The wireless adapter operates within the guidelines found in radio frequency safetystandards and recommendations. These standards and recommendations reflect the consensus of the scientificcommunity and result from deliberations of panels and committees of scientists who continually review andinterpret the extensive research literature. In some situations or environments, the use of the wireless adaptermay be restricted by the proprietor of the building or responsible representatives of the applicable organization.Examples of such situations may include:Using the wireless adapter on board airplanes, orUsing the wireless adapter in any other environment where the risk of interference with other devices orservices is perceived or identified as being harmful.If you are uncertain of the policy that applies to the use of wireless adapters in a specific organization orenvironment (an airport, for example), you are encouraged to ask for authorization to use the adapter before youturn it on.WEEE
Regulatory InformationInformation for the OEMs and IntegratorsThe following statement must be included with all versions of this document supplied to an OEM or integrator, butshould not be distributed to the end user.This device is intended for OEM integrators only.Please see the full Grant of Equipment document for other restrictions.This device must be operated and used with a locally approved access point.Information To Be Supplied to the End User by the OEM or IntegratorThe following regulatory and safety notices must be published in documentation supplied to the end user of theproduct or system incorporating the Intel® wireless adapter, in compliance with local regulations. Host systemmust be labeled with "Contains FCC ID: XXXXXXXX", FCC ID displayed on label.The wireless adapter must be installed and used in strict accordance with the manufacturer's instructions asdescribed in the user documentation that comes with the product. For country-specific approvals, see RadioApprovals. Intel Corporation is not responsible for any radio or television interference caused by unauthorizedmodification of the devices included with the wireless adapter kit or the substitution or attachment of connectingcables and equipment other than that specified by Intel Corporation. The correction of interference caused by suchunauthorized modification, substitution or attachment is the responsibility of the user. Intel Corporation andauthorized resellers or distributors are not liable for any damage or violation of government regulations that mayarise from the user failing to comply with these guidelines.Local Restriction of 802.11a, 802.11b, 802.11g, and 802.11n Radio UsageThe following statement on local restrictions must be published as part of the compliance documentation for all802.11a, 802.11b, 802.11g and 802.11n products. Caution: Due to the fact that the frequencies used by 802.11a, 802.11b, 802.11g and 802.11n wireless LANdevices may not yet be harmonized in all countries, 802.11a, 802.11b, 802.11g and 802.11n products aredesigned for use only in specific countries, and are not allowed to be operated in countries other than those ofdesignated use. As a user of these products, you are responsible for ensuring that the products are used only inthe countries for which they were intended and for verifying that they are configured with the correct selection offrequency and channel for the country of use. Any deviation from permissible settings and restrictions in thecountry of use could be an infringement of national law and may be punished as such.FCC Radio Frequency Interference RequirementsThis device is restricted to indoor use due to its operation in the 5.15 to 5.25 GHz and 5.470 to 5.725 GHzfrequency ranges. FCC requires this product to be used indoors for the frequency ranges 5.15 to 5.25 GHz and5.470 to 5.725 GHz to reduce the potential for harmful interference to co-channel mobile satellite systems. Highpower radars are allocated as primary users of the 5.25 to 5.35 GHz and 5.65 to 5.85 GHz bands. These radarstations can cause interference with and /or damage this device. No configuration controls are provided for thiswireless adapter allowing any change in the frequency of operations outside the FCC grant of authorization for U.Soperation according to Part 15.407 of the FCC rules.This device is intended for OEM integrators only.This device cannot be co-located with any other transmitter unless approved by the FCC.USA—Federal Communications Commission (FCC)
This device complies with Part 15 of the FCC Rules. Operation of the device is subject to the following twoconditions:This device may not cause harmful interference.This device must accept any interference that may cause undesired operation.NOTE: The radiated output power of the adapter is far below the FCC radio frequency exposure limits.Nevertheless, the adapter should be used in such a manner that the potential for human contactduring normal operation is minimized. To avoid the possibility of exceeding the FCC radio frequencyexposure limits, you should keep a distance of at least 20cm between you (or any other person in thevicinity), or the minimum separation distance as specified by the FCC grant conditions, and theantenna that is built into the computer. Details of the authorized configurations can be found athttp://www.fcc.gov/oet/ea/ by entering the FCC ID number on the device.Interference StatementThis wireless adapter has been tested and found to comply with the limits for a Class B digital device, pursuant toPart 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interferencein a residential installation. This wireless adapter generates, uses, and can radiate radio frequency energy. If thewireless adapter is not installed and used in accordance with the instructions, the wireless adapter may causeharmful interference to radio communications. There is no guarantee, however, that such interference will notoccur in a particular installation. If this wireless adapter does cause harmful interference to radio or televisionreception (which can be determined by turning the equipment off and on), the user is encouraged to try to correctthe interference by taking one or more of the following measures:Reorient or relocate the receiving antenna of the equipment experiencing the interference.Increase the distance between the wireless adapter and the equipment experiencing the interference.Connect the computer with the wireless adapter to an outlet on a circuit different from that to which theequipment experiencing the interference is connected.Consult the dealer or an experienced radio/TV technician for help.NOTE: The adapter must be installed and used in strict accordance with the manufacturer'sinstructions as described in the user documentation that comes with the product. Any other installationor use will violate FCC Part 15 regulations.Underwriters Laboratories Inc. (UL) Regulatory WarningFor use in (or with) UL Listed personal computers or compatible.Low HalogenApplies only to brominated and chlorinated flame retardants (BFRs/CFRs) and PVC in the final product. Intelcomponents as well as purchased components on the finished assembly meet JS-709 requirements, and the PCB /substrate meet IEC 61249-2-21 requirements. The replacement of halogenated flame retardants and/or PVC maynot be better for the environment.Canada – Industry Canada (IC)This device complies with RSS210 of Industry Canada. Cet appareil se conforme à RSS210 de Canada d'Industrie.Caution: When using IEEE 802.11a wireless LAN, this product is restricted to indoor use due to its operation inthe 5.15- to 5.25-GHz frequency range. Industry Canada requires this product to be used indoors for thefrequency range of 5.15 GHz to 5.25 GHz to reduce the potential for harmful interference to co-channel mobilesatellite systems. High power radar is allocated as the primary user of the 5.25- to 5.35-GHz and 5.65 to 5.85-GHz bands. These radar stations can cause interference with and/or damage to this device. The maximum allowedantenna gain for use with this device is 6dBi in order to comply with the E.I.R.P limit for the 5.25- to 5.35 and5.725 to 5.85 GHz frequency range in point-to-point operation. To comply with RF exposure requirements allantennas should be located at a minimum distance of 20cm, or the minimum separation distance allowed by themodule approval, from the body of all persons.
Attention: l’utilisation d’un réseau sans fil IEEE802.11a est réstreinte à une utilisation en intérieur à cause dufonctionement dans la bande de fréquence 5.15-5.25 GHz. Industry Canada requiert que ce produit soit utilisé àl’intérieur des bâtiments pour la bande de fréquence 5.15-5.25 GHz afin de réduire les possibilités d’interférencesnuisibles aux canaux co-existants des systèmes de transmission satellites. Les radars de puissances ont fait l’objetd’une allocation primaire de fréquences dans les bandes 5.25-5.35 GHz et 5.65-5.85 GHz. Ces stations radarpeuvent créer des interférences avec ce produit et/ou lui être nuisible. Le gain d’antenne maximum permissiblepour une utilisation avec ce produit est de 6 dBi afin d’être conforme aux limites de puissance isotropiquerayonnée équivalente (P.I.R.E.) applicable dans les bandes 5.25-5.35 GHz et 5.725-5.85 GHz en fonctionementpoint-à-point. Se pour conformer aux conditions d'exposition de RF toutes les antennes devraient être localisées àune distance minimum de 20 cm, ou la distance de séparation minimum permise par l'approbation de module, ducorps de toutes les personnes.”This Class B digital apparatus complies with Canadian ICES-003.Cet appareil numérique de la classe B est conforme a la norme NMB-003 du Canada.European UnionThe low band 5.15 -5.35 GHz is for indoor use only.This equipment complies with the essential requirements of the European Union directive 1999/5/EC. SeeStatements of European Union Compliance.European Union Declarations of ConformityThe European Union Declaration of Conformity for each adapter is available at:http://www.intel.com/support/wireless/wlan/.To find the Declaration of Conformity for your adapter, click on the link for your adapter. Then click AdditionalInformation > Regulatory Documents.JapanIndoor use only in the 5Ghz band.KoreaMoroccoThe operation of this product in the radio channel 2 (2417 MHz) is not authorized in the following cities: Agadir,Assa-Zag, Cabo Negro, Chaouen, Goulmima, Oujda, Tan Tan, Taourirt, Taroudant and Taza.The operation of this product in the radio channels 4, 5, 6 et 7 (2425 - 2442 MHz) is not authorized in thefollowing cities: Aéroport Mohamed V, Agadir, Aguelmous, Anza, Benslimane, Béni Hafida, Cabo Negro, Casablanca,Fès, Lakbab, Marrakech, Merchich, Mohammédia, Rabat, Salé, Tanger, Tan Tan, Taounate, Tit Mellil, Zag.Taiwan
Radio ApprovalsTo determine whether you are allowed to use your wireless network device in a specific country, please check tosee if the radio type number that is printed on the identification label of your device is listed in the manufacturer'sOEM Regulatory Guidance document.Regulatory MarkingsA list of required regulatory markings can be found on the web at http://www.intel.com/support/wireless/wlan/To find the regulatory information for your adapter, click on the link for your adapter. Then click AdditionalInformation > Regulatory Documents.Statement of European ComplianceEach of the adapters listed below comply with the essential requirements of the European Union directive1999/5/EC.Intel® Centrino® Wireless-N 100 (Only available on Windows* 7 installations)Intel® Centrino® Wireless-N 105 (Only available on Windows* 7 installations)Intel® Centrino® Wireless-N 130 (Only available on Windows* 7 installations)Intel® Centrino® Wireless-N 135 (Only available on Windows* 7 installations)Intel® WiFi Link 1000Intel® Centrino® Wireless-N 1030Intel® Centrino® Wireless-N 2200 (Only available on Windows* 7 installations)Intel® Centrino® Wireless-N 2230 (Not available on Windows* Vista* installations)Intel® Centrino® Wireless-N + WiMAX 6150Intel® Centrino® Advanced-N 6200Intel® Centrino® Advanced-N 6205Intel® Centrino® Advanced-N 6230Intel® Centrino® Advanced-N 6235Intel® Centrino® Advanced-N + WiMAX 6250Intel® Centrino® Ultimate-N 6300Back to TopBack to ContentsTrademarks and Disclaimers
Back to ContentsSpecificationsIntel® Centrino® Wireless-N 100Intel® Centrino® Wireless-N 105Intel® Centrino® Wireless-N 130Intel® Centrino® Wireless-N 135Intel® WiFi Link 1000Intel® Centrino® Wireless-N 1030Intel® Centrino® Wireless-N 2200Intel® Centrino® Wireless-N 2230Intel® Centrino® Wireless-N + WiMAX 6150Intel® Centrino® Advanced-N 6200Intel® Centrino® Advanced-N 6205Intel® Centrino® Advanced-N 6230Intel® Centrino® Advanced-N 6235Intel® Centrino® Advanced-N + WiMAX 6250Intel® Centrino® Ultimate-N 6300Intel® Centrino® Wireless-N 100, Intel® Centrino® Wireless-N 105,Intel® Centrino® Wireless-N 130 and Intel® Centrino® Wireless-N 135Form Factor PCI Express* Half-Mini CardDimensions Half-Mini Card: Width 1.049 in x Length 1.18 in x Height 0.18 in (26.64 mm x 30 mm x 4.5mm)Antenna InterfaceConnector Hirose U.FL-R-SMT mates with cable connector U.FL-LP-066Antenna Diversity On-board diversityConnectorInterface 52-pin Mini Card edge connectorVoltage 3.3 VOperatingTemperature 0 to +80 degrees CelsiusHumidity 50% to 95% non-condensing (at temperatures of 25 ºC to 35 ºC)WiFi  FrequencyModulation 2.4 GHz (802.11b/g/n)Frequency band 2.400 - 2.4835 GHz (dependent on country)Modulation BPSK, QPSK, 16 QAM, 64 QAM CCK, DQPSK, DBPSKWireless Medium 2.4 GHz ISM: Orthogonal Frequency Division Multiplexing (OFDM)Channels All channels as defined by the relevant specification and country rules.IEEE 802.11n DataRates MIMO Configuration: 1X1Tx/Rx: 150, 144, 135, 130, 120, 117, 115.5, 90, 86.667, 72.2, 65, 60, 57.8, 45, 43.3, 30,28.9, 21.7, 15, 14.4, 7.2 MbpsIEEE 802.11g DataRates 54, 48, 36, 24, 18, 12, 9, 6 MbpsIEEE 802.11b Data 11, 5.5, 2, 1 Mbps
RatesBluetooth Support Intel® Centrino® Wireless-N 100: NoneIntel® Centrino® Wireless-N 105: NoneIntel® Centrino® Wireless-N 130: Bluetooth 2.1, 2.1 + EDR, 3.0, 3.0+HSIntel® Centrino® Wireless-N 135: Bluetooth 4.0 (Bluetooth Low-Energy and Bluetooth3.0 +HS)GeneralOperating Systems Windows* 7 (32-bit and 64-bit)Wi-Fi Alliance*certification Wi-Fi* certification for 802.11b, 802.11g, 802.11n, WPA-Personal, WPA-Enterprise, WPA2-Personal, WPA2-Enterprise, WMM, WPSCisco CompatibleExtensionscertificationCisco Compatible Extensions, v4.0IEEE Feature Sets IEEE 802.11b, 802.11g, 802.11n, 802.11e, 802.11i, 802.11d, 802.11hArchitecture Infrastructure or ad hoc (peer-to-peer) operating modesSecurity WPA-Personal, WPA2-Personal, WPA-Enterprise, WPA2-Enterprise, AES-CCMP 128-bit, WEP128-bit and 64-bit; 802.1X: EAP-SIM, LEAP, PEAP, TKIP, EAP-FAST, EAP-TLS, EAP-TTLS,EAP-AKAProduct Safety UL, C-UL, CB (IEC 60590)Intel® WiFi Link 1000WiFi / WiMAXForm Factor PCI Express* Mini Card and Half-Mini CardSKUs Intel® WiFi Link 1000 - 1X2 MC/HMCDimensions Mini Card: Width 2.0 in x Length 1.18 in x Height 0.18 in (50.80 mm x 30 mm x 4.5mm)Half-Mini Card: Width 1.049 in x Length 1.18 in x Height 0.18 in (26.64 mm x 30 mmx 4.5 mm)Antenna InterfaceConnector Hirose U.FL-R-SMT mates with cable connector U.FL-LP-066Antenna Diversity On-board diversityConnector Interface 52-pin Mini Card edge connectorVoltage 3.3 VOperating Temperature 0 to +80 degrees CelsiusHumidity 50% to 90% non-condensing (at temperatures of 25 ºC to 35 ºC)WiFiFrequency Modulation 2.4 GHz (802.11b/g/n)Frequency band 2.41-2.474 GHz (dependent on country)Modulation BPSK, QPSK, 16 QAM, 64 QAM, CCK, DQPSK, DBPSKWireless Medium 2.4 GHz ISM: Orthogonal Frequency Division Multiplexing (OFDM)Channels All channels as defined by the relevant specification and country rules.IEEE 802.11n DataRates 300, 270, 243, 240, 180, 150, 144, 135, 130, 120, 117, 115.5, 90, 86.667, 72.2, 65,60, 57.8, 45, 43.3, 30, 28.9, 21.7, 15, 14.4, 7.2 MbpsIEEE 802.11g DataRates 54, 48, 36, 24, 18, 12, 9, 6 MbpsIEEE 802.11b Data 11, 5.5, 2, 1 Mbps
RatesWiFi GeneralOperating Systems Microsoft Windows* XP (32 and 64 bit) and Windows Vista* (32 and 64 bit), UbuntuLinux*Wi-Fi Alliance*certification Wi-Fi* certification for 802.11b, 802.11g, 802.11n, WPA-Personal, WPA-Enterprise,WPA2-Personal, WPA2-Enterprise, WMM, WPSCisco CompatibleExtensions certification Cisco Compatible Extensions, v4.0WLAN Standard IEEE 802.11g, 802.11b, 802.11n, 802.11d, 802.11e, 802.11i,Architecture Infrastructure or ad hoc (peer-to-peer) operating modesSecurity WPA-Personal, WPA2-Personal, WPA-Enterprise, WPA2-Enterprise, 802.1X: EAP-SIM,LEAP, PEAP, EAP-FAST, EAP-TLS, EAP-TTLS, EAP-AKAEncryption AES-CCMP 128-bit, WEP 128-bit and 64-bit, CKIP, TKIPProduct Safety UL, C-UL, CB (IEC 60590)Intel® Centrino® Wireless-N 2200 and Intel® Centrino® Wireless-N2230Form Factor PCI Express* Half-Mini CardDimensions Half-Mini Card: Width 1.049 in x Length 1.18 in x Height 0.18 in (26.64 mm x 30 mm x 4.5mm)Antenna InterfaceConnector Hirose U.FL-R-SMT mates with cable connector U.FL-LP-066Antenna Diversity On-board diversityConnectorInterface 52-pin Mini Card edge connectorVoltage 3.3 VOperatingTemperature 0 to +80 degrees CelsiusHumidity 50% to 95% non-condensing (at temperatures of 25 ºC to 35 ºC)WiFi  FrequencyModulation 2.4 GHz (802.11b/g/n)Frequency band 2.400 - 2.4835 GHz (dependent on country)Modulation BPSK, QPSK, 16 QAM, 64 QAM CCK, DQPSK, DBPSKWireless Medium 2.4 GHz ISM: Orthogonal Frequency Division Multiplexing (OFDM)Channels All channels as defined by the relevant specification and country rules.IEEE 802.11n DataRates MIMO Configuration: 2X2Tx/Rx: 300, 150, 144, 135, 130, 120, 117, 115.5, 90, 86.667, 72.2, 65, 60, 57.8, 45,43.3, 30, 28.9, 21.7, 15, 14.4, 7.2 MbpsIEEE 802.11g DataRates 54, 48, 36, 24, 18, 12, 9, 6 MbpsIEEE 802.11b DataRates 11, 5.5, 2, 1 MbpsBluetooth Support Intel® Centrino® Wireless-N 2200: NoneIntel® Centrino® Wireless-N 2230: Bluetooth 4.0 (Bluetooth Low-Energy andBluetooth 3.0 +HS)
GeneralOperating Systems Windows* 7 (32-bit and 64-bit)Wi-Fi Alliance*certification Wi-Fi* certification for 802.11b, 802.11g, 802.11n, WPA-Personal, WPA-Enterprise, WPA2-Personal, WPA2-Enterprise, WMM, WPSCisco CompatibleExtensionscertificationCisco Compatible Extensions, v4.0IEEE Feature Sets IEEE 802.11b, 802.11g, 802.11n, 802.11e, 802.11i, 802.11d, 802.11hArchitecture Infrastructure or ad hoc (peer-to-peer) operating modesSecurity WPA-Personal, WPA2-Personal, WPA-Enterprise, WPA2-Enterprise, AES-CCMP 128-bit, WEP128-bit and 64-bit; 802.1X: EAP-SIM, LEAP, PEAP, TKIP, EAP-FAST, EAP-TLS, EAP-TTLS,EAP-AKAProduct Safety UL, C-UL, CB (IEC 60590)Intel® Centrino® Wireless-N 1030 and Intel® Centrino® Advanced-N6230Form Factor PCI Express* Half-Mini CardDimensions Half-Mini Card: Width 1.049 in x Length 1.18 in x Height 0.18 in (26.64 mm x 30 mm x 4.5mm)AntennaInterfaceConnectorHirose U.FL-R-SMT mates with cable connector U.FL-LP-066AntennaDiversity On-board diversityNetworkStandards 802.11a/b/g/n (varies by adapter) and Bluetooth 3.0 + HSConnectorInterface 52-pin Mini Card edge connectorVoltage 3.3 VOperatingTemperature 0 to +80 degrees CelsiusHumidity 50% to 95% non-condensing (at temperatures of 25 ºC to 35 ºC)WiFi NetworkStandards Intel® Centrino® Wireless-N 1030: 802.11b/g/nIntel® Centrino® Advanced-N 6230: 802.11a/g/nFrequencyModulation 5 GHz (802.11a/n) 2.4 GHz (802.11b/g/n)Frequency band 5.15 GHz - 5.85 GHz (dependent on country) 2.400 - 2.4835 GHz (dependent on country)Modulation BPSK, QPSK, 16 QAM, 64 QAM CCK, DQPSK, DBPSKWirelessMedium 5 GHz UNII: Orthogonal Frequency DivisionMultiplexing (OFDM) 2.4 GHz ISM: Orthogonal Frequency DivisionMultiplexing (OFDM)Channels All channels as defined by the relevant specification and country rules.IEEE 802.11nData Rates Intel® Centrino® Advanced-N 6230:Tx/Rx (Mbps): 300, 270, 243, 240, 216.7, 195, 180, 173.3, 150, 144, 135, 130, 120, 117,115.5, 90, 86.667, 72.2, 65, 60, 57.8, 45, 43.3, 30, 28.9, 21.7, 15, 14.4, 7.2Intel® Centrino® Wireless-N 1030:Rx (Mbps): 300, 270, 243, 240, 180
Rx/Tx (Mbps): 150, 144, 135, 130, 120, 117, 115.5, 90, 86.667, 72.2, 65, 60, 57.8, 45, 43.3,30, 28.9, 21.7, 15, 14.4, 7.2IEEE 802.11aData Rates 54, 48, 36, 24, 18, 12, 9, 6 MbpsIEEE 802.11gData Rates 54, 48, 36, 24, 18, 12, 9, 6 MbpsIEEE 802.11bData Rates 11, 5.5, 2, 1 MbpsBluetooth Bluetooth Version 3.0 + HSGeneralOperatingSystems Microsoft Windows* XP (32-bit and 64-bit)Windows Vista* (32-bit and 64-bit)Windows* 7 (32-bit and 64-bit)Wi-Fi Alliance*certification Wi-Fi* certification for 802.11b, 802.11g, 802.11a, 802.11h, 802.11d, WPA-Personal, WPA-Enterprise, WPA2-Personal, WPA2-Enterprise, WPS, WMM, WMM Power Save, EAP-SIM, LEAP,PEAP, TKIP, EAP-FAST, EAP-TLS, EAP-TTLS, EAP-AKA, P2PCiscoCompatibleExtensionscertificationCisco Compatible Extensions, v4.0WLAN Standard IEEE 802.11g, 802.11b, 802.11a, 802.11nArchitecture Infrastructure or ad hoc (peer-to-peer) operating modesSecurity WPA-Personal, WPA2-Personal, WPA-Enterprise, WPA2-Enterprise, AES-CCMP 128-bit, WEP 128-bit and 64-bit; 802.1X: EAP-SIM, LEAP, PEAP, TKIP, EAP-FAST, EAP-TLS, EAP-TTLS, EAP-AKAProduct Safety UL, C-UL, CB (IEC 60590)Intel® Centrino® Advanced-N 6235Form Factor PCI Express* Half-Mini CardDimensions Half-Mini Card: Width 1.049 in x Length 1.18 in x Height 0.18 in (26.64 mm x 30 mm x 4.5mm)AntennaInterfaceConnectorHirose U.FL-R-SMT mates with cable connector U.FL-LP-066AntennaDiversity On-board diversityNetworkStandards 802.11a/b/g/n and Bluetooth 4.0ConnectorInterface 52-pin Mini Card edge connectorVoltage 3.3 VOperatingTemperature 0 to +80 degrees CelsiusHumidity 50% to 95% non-condensing (at temperatures of 25 ºC to 35 ºC)FrequencyModulation 5 GHz (802.11a/n) 2.4 GHz (802.11b/g/n)Frequency band 5.15 GHz - 5.85 GHz (dependent on country) 2.400 - 2.4835 GHz (dependent on country)Modulation BPSK, QPSK, 16 QAM, 64 QAM CCK, DQPSK, DBPSKWireless 5 GHz UNII: Orthogonal Frequency Division 2.4 GHz ISM: Orthogonal Frequency Division
Medium Multiplexing (OFDM) Multiplexing (OFDM)Channels All channels as defined by the relevant specification and country rules.IEEE 802.11nData Rates Tx/Rx (Mbps): 300, 270, 243, 240, 216.7, 195, 180, 173.3, 150, 144, 135, 130, 120, 117,115.5, 90, 86.667, 72.2, 65, 60, 57.8, 45, 43.3, 30, 28.9, 21.7, 15, 14.4, 7.2IEEE 802.11aData Rates 54, 48, 36, 24, 18, 12, 9, 6 MbpsIEEE 802.11gData Rates 54, 48, 36, 24, 18, 12, 9, 6 MbpsIEEE 802.11bData Rates 11, 5.5, 2, 1 MbpsBluetooth Bluetooth Version 4.0 (3.0 +HS )GeneralOperatingSystems Windows* 7 (32-bit and 64-bit)Wi-Fi Alliance*certification Wi-Fi* certification for 802.11b, 802.11g, 802.11a, 802.11h, 802.11d, WPA-Personal, WPA-Enterprise, WPA2-Personal, WPA2-Enterprise, WPS, WMM, WMM Power Save, EAP-SIM, LEAP,PEAP, TKIP, EAP-FAST, EAP-TLS, EAP-TTLS, EAP-AKA, P2PCiscoCompatibleExtensionscertificationCisco Compatible Extensions, v4.0WLAN Standard IEEE 802.11g, 802.11b, 802.11a, 802.11nArchitecture Infrastructure or ad hoc (peer-to-peer) operating modesSecurity WPA-Personal, WPA2-Personal, WPA-Enterprise, WPA2-Enterprise, AES-CCMP 128-bit, WEP 128-bit and 64-bit; 802.1X: EAP-SIM, LEAP, PEAP, TKIP, EAP-FAST, EAP-TLS, EAP-TTLS, EAP-AKAProduct Safety UL, C-UL, CB (IEC 60590)Intel® Centrino® Advanced-N + WiMAX 6250 and Intel® Centrino®Wireless-N + WiMAX 6150Form Factor PCI Express* Half-Mini CardDimensions Half-Mini Card: Width 1.049 in x Length 1.18 in x Height 0.18 in (26.64 mm x 30 mm x 4.5mm)AntennaInterfaceConnectorHirose U.FL-R-SMT mates with cable connector U.FL-LP-066AntennaDiversity On-board diversityConnectorInterface 52-pin Mini Card edge connectorVoltage 3.3 VOperatingTemperature 0 to +80 degrees CelsiusHumidity 50% to 95% non-condensing (at temperatures of 25 ºC to 35 ºC)WiFi  FrequencyModulation Intel® Centrino® Advanced-N + WiMAX 62502.4 GHz (802.11b/g/n), 5 GHz (802.11a/n)Intel® Centrino® Wireless-N + WiMAX 61502.4 GHz (802.11b/g/n)Frequency band 5.15 GHz - 5.85 GHz (dependent on country) 2.400 - 2.4835 GHz (dependent on country)
Modulation BPSK, QPSK, 16 QAM, 64 QAM CCK, DQPSK, DBPSKWirelessMedium 5 GHz UNII: Orthogonal Frequency DivisionMultiplexing (OFDM) 2.4 GHz ISM: Orthogonal Frequency DivisionMultiplexing (OFDM)Channels All channels as defined by the relevant specification and country rules.IEEE 802.11nData Rates Intel® Centrino® Wireless-N + WiMAX 6150MIMO Configuration: 1X2Rx: 300, 270, 243, 240, 180 MbpsRx/Tx: 150, 144, 135, 130, 120, 117, 115.5, 90, 86.667, 72.2, 65, 60, 57.8, 45, 43.3, 30,28.9, 21.7, 15, 14.4, 7.2 MbpsIntel® Centrino® Advanced-N + WiMAX 6250MIMO Configuration: 2X2Tx/Rx: 300, 270, 243, 240, 180, 150, 144, 135, 130, 120, 117, 115.5, 90, 86.667, 72.2, 65,60, 57.8, 45, 43.3, 30, 28.9, 21.7, 15, 14.4, 7.2 MbpsIEEE 802.11aData Rates 54, 48, 36, 24, 18, 12, 9, 6 MbpsIEEE 802.11gData Rates 54, 48, 36, 24, 18, 12, 9, 6 MbpsIEEE 802.11bData Rates 11, 5.5, 2, 1 MbpsGeneralOperatingSystems Microsoft Windows* XP (32-bit and 64-bit)Windows Vista* (32-bit and 64-bit)Windows* 7 (32-bit and 64-bit)Wi-Fi Alliance*certification Wi-Fi* certification for 802.11b, 802.11g, 802.11a, 802.11h, 802.11d, WPA-Personal, WPA-Enterprise, WPA2-Personal, WPA2-Enterprise, WMM, WMM Power Save, EAP-SIM, LEAP, PEAP,TKIP, EAP-FAST, EAP-TLS, EAP-TTLS, EAP-AKACiscoCompatibleExtensionscertificationCisco Compatible Extensions, v4.0IEEE FeatureSets Intel® Centrino® Wireless-N + WiMAX 6150: IEEE 802.11b, 802.11g, 802.11n, 802.11e, 802.11i, 802.11h, 802.11dIntel® Centrino® Advanced-N + WiMAX 6250: 802.11a, IEEE 802.11b, 802.11g, 802.11n, 802.11e, 802.11i, 802.11h, 802.11dArchitecture Infrastructure or ad hoc (peer-to-peer) operating modesSecurity WPA-Personal, WPA2-Personal, WPA-Enterprise, WPA2-Enterprise, AES-CCMP 128-bit, WEP 128-bit and 64-bit; 802.1X: EAP-SIM, LEAP, PEAP, TKIP, EAP-FAST, EAP-TLS, EAP-TTLS, EAP-AKAProduct Safety UL, C-UL, CB (IEC 60590)WiMAXGeneralOperatingSystems Microsoft Windows* XP (32-bit and 64-bit)Windows Vista* (32-bit and 64-bit)Windows* 7 (32-bit and 64-bit)StandardCompliance 802.16e-2005 Corrigenda 2 (D4)WiMAX SystemProfile FeaturesetIntel® Centrino® Wireless-N + WiMAX 6150: Mobile WiMAX release 1, Wave II. Supports 3A and 1A/B profiles
Intel® Centrino® Advanced-N + WiMAX 6250: Mobile WiMAX release 1, Wave II. Supports 3A, 5A/C, 1A/B, and 5BL profilesSecurity Key Management Protocol (PKMv2)Encryption 128-bit CCMP (Counter-Mode/CBC-MAC) based on AES encryptionWiMAXFrequency band Intel® Centrino® Wireless-N + WiMAX 6150: 2.3-2.4 GHz / 2.496-2.690 GHzIntel® Centrino® Advanced-N + WiMAX 6250: 2.3-2.4 GHz / 2.496-2.690 GHz / 3.4-3.8 GHzModulation UL - QPSK, 16 QAMDL - QPSK, 16 QAM, 64 QAMWirelessMedium Duplex mode: TDD operations Scalable OFDMA (SOFDMA): 512 and 1024 FFTsub-carrier permutation: PUSC Intel® Centrino® Wireless-N + WiMAX 6150:Channel bandwidths: 5 and 10 MHzIntel® Centrino® Advanced-N + WiMAX 6250:Channel bandwidths: 5, 7, 8.75 and 10 MHzWiMAX NetworkRelease FeaturesetSPWG/NWG Release 1.5RatePerformance Intel® Centrino® Wireless-N + WiMAX 6150:Up to 10 Mbps DL and 4 Mbps UL @ peak rate(OTA performance, 10MHz channel)Intel® Centrino® Advanced-N + WiMAX 6250:Up to 20 Mbps DL and 6 Mbps UL @ peak rate(OTA performance, 10MHz channel)RF TransmitterOutput Power Compliance with Power class 2Intel® Centrino® Advanced-N 6200, Intel® Centrino® Advanced-N6205 and Intel® Centrino® Ultimate-N 6300Form Factor Intel® Centrino® Advanced-N 6200, Intel® Centrino® Ultimate-N 6300:PCI Express* Full-Mini Card and Half-Mini Card.Intel® Centrino® Advanced-N 6205: PCI Express* Half-Mini Card.Dimensions Full-Mini Card: Width 2.00 in x Length 1.18 in x Height 0.18 in (50.95 mm x 30 mm x 4.5 mm)Half-Mini Card: Width 1.049 in x Length 1.18 in x Height 0.18 in (26.64 mm x 30 mm x 4.5mm)AntennaInterfaceConnectorHirose U.FL-R-SMT mates with cable connector U.FL-LP-066AntennaDiversity On-board diversityConnectorInterface 52-pin Mini Card edge connectorVoltage 3.3 VOperatingTemperature 0 to +80 degrees CelsiusHumidity 50% to 95% non-condensing (at temperatures of 25 ºC to 35 ºC)Frequency 5 GHz (802.11a/n) 2.4 GHz (802.11b/g/n)
ModulationFrequency band 5.15 GHz - 5.85 GHz (dependent on country) 2.400 - 2.4835 GHz (dependent on country)Modulation BPSK, QPSK, 16 QAM, 64 QAM CCK, DQPSK, DBPSKWirelessMedium 5 GHz UNII: Orthogonal Frequency DivisionMultiplexing (OFDM) 2.4 GHz ISM: Orthogonal Frequency DivisionMultiplexing (OFDM)Channels All channels as defined by the relevant specification and country rules.IEEE 802.11nData Rates Intel® Centrino® Ultimate-N 6300:Tx/Rx: 450, 405, 360, 300, 270, 243, 240, 216.7, 195, 180, 173.3, 150, 144, 135, 130, 120,117, 115.5, 90, 86.667, 72.2, 65, 60, 57.8, 45, 43.3, 30, 28.9, 21.7, 15, 14.4, 7.2 MbpsIntel® Centrino® Advanced-N 6200, Intel® Centrino® Advanced-N 6205:Tx/Rx: 300, 270, 243, 240, 180, 150, 144, 135, 130, 120, 117, 115.5, 90, 86.667, 72.2, 65,60, 57.8, 45, 43.3, 30, 28.9, 21.7, 15, 14.4, 7.2 MbpsIEEE 802.11aData Rates 54, 48, 36, 24, 18, 12, 9, 6 MbpsIEEE 802.11gData Rates 54, 48, 36, 24, 18, 12, 9, 6 MbpsIEEE 802.11bData Rates 11, 5.5, 2, 1 MbpsGeneralOperatingSystems Microsoft Windows* XP (32-bit and 64-bit)Windows Vista* (32-bit and 64-bit)Windows* 7 (32-bit and 64-bit)Wi-Fi Alliance*certification Wi-Fi* certification for 802.11b, 802.11g, 802.11a, 802.11h, 802.11d, WPA-Personal, WPA-Enterprise, WPA2-Personal, WPA2-Enterprise, WMM, WMM Power Save, EAP-SIM, LEAP, PEAP,TKIP, EAP-FAST, EAP-TLS, EAP-TTLS, EAP-AKACiscoCompatibleExtensionscertificationCisco Compatible Extensions, v4.0WLAN Standard IEEE 802.11g, 802.11b, 802.11a, 802.11nArchitecture Infrastructure or ad hoc (peer-to-peer) operating modesSecurity WPA-Personal, WPA2-Personal, WPA-Enterprise, WPA2-Enterprise, AES-CCMP 128-bit, WEP 128-bit and 64-bit; 802.1X: EAP-SIM, LEAP, PEAP, TKIP, EAP-FAST, EAP-TLS, EAP-TTLS, EAP-AKAProduct Safety UL, C-UL, CB (IEC 60590)Back to TopBack to ContentsTrademarks and Disclaimers
Back to ContentsImportant InformationSafety InformationThird Party Software NoticesSafety InformationIt is important that you read the safety information regarding your WiFi adapter. Please see the User's Guide forsafety and regulatory notices.Third Party Software NoticesPortions of Intel® PROSet/Wireless WiFi Connection Utility include software under the following terms:OpenSSL LicenseCopyright (c) 1998-2006 The OpenSSL Project. All rights reserved.Redistribution and use in source and binary forms, with or without modification, are permitted provided that thefollowing conditions are met:1.  Redistributions of source code must retain the above copyright notice, this list of conditions and thefollowing disclaimer.2.  Redistributions in binary form must reproduce the above copyright notice, this list of conditions and thefollowing disclaimer in the documentation and/or other materials provided with the distribution.3.  All advertising materials mentioning features or use of this software must display the followingacknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSLToolkit. (http://www.openssl.org/)"4.  The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote productsderived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.5.  Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their nameswithout prior written permission of the OpenSSL Project.6.  Redistributions of any form whatsoever must retain the following acknowledgment: "This product includessoftware developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT "AS IS" AND ANY EXPRESSED OR IMPLIEDWARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESSFOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITSCONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIALDAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OFUSE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING INANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.This product includes cryptographic software written by Eric Young (eay@cryptsoft.com).  This product includessoftware written by Tim Hudson (tjh@cryptsoft.com).Original SSLeay LicenseCopyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation waswritten so as to conform with Netscape's SSL.This library is free for commercial and non-commercial use as long as the following conditions are adhered to. Thefollowing conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not justthe SSL code.  The SSL documentation included with this distribution is covered by the same copyright termsexcept that the holder is Tim Hudson (tjh@cryptsoft.com).Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If thispackage is used in a product, Eric Young should be given attribution as the author of the parts of the library used.This can be in the form of a textual message at program startup or in documentation (online or textual) providedwith the package.Redistribution and use in source and binary forms, with or without modification, are permitted provided that thefollowing conditions are met:1.  Redistributions of source code must retain the copyright notice, this list of conditions and the followingdisclaimer.2.  Redistributions in binary form must reproduce the above copyright notice, this list of conditions and thefollowing disclaimer in the documentation and/or other materials provided with the distribution.3.  All advertising materials mentioning features or use of this software must display the followingacknowledgement: "This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)"The word 'cryptographic' can be left out if the routines from the library being used are not cryptographicrelated.4.  If you include any Windows specific code (or a derivative thereof) from the apps directory (application code)you must include an acknowledgement: "This product includes software written by Tim Hudson(tjh@cryptsoft.com)"THIS SOFTWARE IS PROVIDED BY ERIC YOUNG "AS IS:' AND ANY EXPRESS OR IMPLIED WARRANTIES,INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR APARTICULAR PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FORANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUTNOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; ORBUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USEOF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.The license and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution license [including the GNU PublicLicense.]zlib.h -- interface of the 'zlib' general purpose compression library, version 1.2.3, July18th, 2005Copyright (C) 1995-2005 Jean-loup Gailly and Mark AdlerThis software is provided 'as-is', without any express or implied warranty.  In no event will the authors be heldliable for any damages arising from the use of this software. Permission is granted to anyone to use this softwarefor any purpose, including commercial applications, and to alter it and redistribute it freely, subject to thefollowing restrictions:1.  The origin of this software must not be misrepresented; you must not claim that you wrote the originalsoftware. If you use this software in a product, an acknowledgment in the product documentation would beappreciated but is not required.2.  Altered source versions must be plainly marked as such, and must not be misrepresented as being theoriginal software.3.  This notice may not be removed or altered from any source distribution.Jean-loup Gailly jloup@gzip.orgMark Adler madler@alumni.caltech.edu
Adapter DriverPortions of the driver include software under the following terms:WPA SupplicantCopyright (c) 2003-2007, Jouni Malinen <jkmaline@cc.hut.fi> and contributors. All rights reserved.Redistribution and use in source and binary forms, with or without modification, are permitted provided that thefollowing conditions are met:Redistributions of source code must retain the above copyright notice, this list of conditions and thefollowing disclaimer.Redistributions in binary form must reproduce the above copyright notice, this list of conditions and thefollowing disclaimer in the documentation and/or other materials provided with the distribution.Neither the name of Jouni Malinen nor the names of its contributors may be used to endorse or promoteproducts derived from this software without specific prior written permission.THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS ORIMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY ANDFITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER ORCONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIALDAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OFUSE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING INANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.__________Copyright (c) 2001, Dr Brian Gladman <brg@gladman.me.uk>, Worcester, UK.All rights reserved.LICENSE TERMSThe free distribution and use of this software in both source and binary form is allowed (with or without changes)provided that:1.  Distributions of this source code include the above copyright notice, this list of conditions and the followingdisclaimer;2.  distributions in binary form include the above copyright notice, this list of conditions and the followingdisclaimer in the documentation and/or other associated materials;3.  the copyright holder's name is not used to endorse products built using this software without specific writtenpermission.DISCLAIMERThis software is provided 'as is' with no explicit or implied warranties in respect of its properties, including, but notlimited to, correctness and fitness for purpose.Issue Date: 29/07/2002This file contains the definitions required to use AES (Rijndael) in C.Portions Licensed from Devicescape Software, Inc.Intel® PROSet/Wireless WiFi Connection Utility contains software licensed from Devicescape Software, Inc.Copyright (c) 2004 - 2008 Devicescape Software, Inc. All rights reserved."Odd Button" Artistic License
Portions of this software contain the standard version of "Odd Button" licensed under the Artistic License. Thesource code for "Odd Button" may be found online at http://sourceforge.net/projects/oddbutton.September 15, 2011Back to TopBack to ContentsTrademarks and Disclaimers
Back to ContentsCustomer SupportIntel support is available online or by telephone. Available services include the most up-to-date productinformation, installation instructions about specific products, and troubleshooting tips.Online SupportTechnical Support: http://www.intel.com/supportNetwork Product Support: http://www.intel.com/networkCorporate Web Site: http://www.intel.comBack to TopBack to ContentsTrademarks and Disclaimers
Back to ContentsGlossary of TermsTerm Definition802.11 The 802.11 standard refers to a family of specifications developed by the IEEE for wireless LANtechnology. The 802.11 specifies an over-the-air interface between a wireless client and a basestation or between two wireless clients and provides 1 or 2 Mbps transmission in the 2.4 GHzband using either frequency hopping spread spectrum (FHSS) or direct sequence spreadspectrum (DSSS).802.11a The 802.11a standard specifies a maximum data transfer rate of 54 Mbps and an operatingfrequency of 5 GHz. The 802.11a standard uses the Orthogonal Frequency Division Multiplexing(OFDM) transmission method. Additionally, the 802.11a standard supports 802.11 features suchas WEP encryption for security.802.11b 802.11b is an extension to 802.11 that applies to wireless networks and provides 11 Mbpstransmission (with a fallback to 5.5, 2 and 1 Mbps) in the 2.4 GHz band. 802.11b uses onlyDSSS. Throughput data rate 5+ Mbps in the 2.4 GHz band.802.11g The 802.11g standard specifies a maximum data transfer rate of 54 Mbps, an operatingfrequency of 2.4GHz, and WEP encryption for security. 802.11g networks are also referred to asWi-Fi* networks.802.11n A task group of the IEEE 802.11 committee has defined a new draft specification that providesfor increased throughput speeds of up to 540 Mbps. The specification provides for Multiple-Input-Multiple-Output (MIMO) technology, or using multiple receivers and multiple transmittersin both the client and access point, to achieve improved performance.802.1X 802.1X is the IEEE Standard for Port-Based Network Access Control. This is used in conjunctionwith EAP methods to provide access control to wired and wireless networks.AAA Server Authentication, Authorization and Accounting Server. A system to control access to computerresources and track user activity.Access Point(AP) A device that connects wireless devices to another network. For example, a wireless LAN,Internet modem or others.Ad HocNetwork A communication configuration in which every computer has the same capabilities, and anycomputer can initiate a communication session. Also known as a peer-to-peer network, a deviceto device network or a computer-to-computer network.AES-CCMP Advanced Encryption Standard - Counter CBC-MAC Protocol is the new method for privacyprotection of wireless transmissions specified in the IEEE 802.11i standard. AES-CCMP providesa stronger encryption method than TKIP. The AES algorithm is capable of using cryptographickeys of 128, 192, and 256 bits to encrypt and decrypt data in 128-bit blocks. AES-CCMP usesthe AES block cipher, but restricts the key length to 128 bits. AES-CCMP incorporates twosophisticated cryptographic techniques (counter mode and CBC-MAC) to provide improvedsecurity between the mobile client and the access point.Authentication Verifies the identity of a user logging onto a network. Passwords, digital certificates, smart cardsand biometrics are used to prove the identity of the client to the network. Passwords and digitalcertificates are also used to identify the network to the client.Availablenetwork One of the networks listed under Available networks on the Wireless Networks tab of theWireless Network Connection Properties (Windows* XP environment). Any wireless network thatis broadcasting and is within receiving range of the WiFi adapter appears on the list.BER Bit Error Rate. The ratio of errors to the total number of bits being sent in a data transmissionfrom one location to another.Bit Rate The total number of bits (ones and zeros) per second that a network connection can support.Note that this bit rate will vary, under software control, with different signal path conditions.Broadcast SSID Used to allow an access point to respond to clients on a wireless network by sending probes.BSSID A unique identifier for each wireless client on a wireless network. The Basic Service SetIdentifier (BSSID) is the Ethernet MAC address of each adapter on the network.
CA (CertificateAuthority) A corporate certification authority implemented on a server. In addition, Internet Explorer'scertificate can import a certificate from a file. A trusted CA certificate is stored in the root store.CCX (CiscoCompatibleeXtension)Cisco Compatible Extensions Program ensures that devices used on Cisco wireless LANinfrastructure meet the security, management and roaming requirements.Certificate Used for client authentication. A certificate is registered on the authentication server (forexample, RADIUS server) and used by the authenticator.CKIP Cisco Key Integrity Protocol (CKIP) is a Cisco proprietary security protocol for encryption in802.11 media. CKIP uses a key message integrity check and message sequence number toimprove 802.11 security in infrastructure mode. CKIP is Cisco's version of TKIP.Client computer The computer that gets its Internet connection by sharing either the host computer's connectionor the access point's connection.DSSS Direct Sequence Spread Spectrum. Technology used in radio transmission. Incompatible withFHSS.EAP Short for Extensible Authentication Protocol, EAP sits inside of Point-to-Point Protocol's (PPP)authentication protocol and provides a generalized framework for several different authenticationmethods. EAP is supposed to head off proprietary authentication systems and let everythingfrom passwords to challenge-response tokens and public-key infrastructure certificates all worksmoothly.EAP-AKA EAP-AKA (Extensible Authentication Protocol Method for UMTS Authentication and KeyAgreement) is an EAP mechanism for authentication and session key distribution, using theUniversal Mobile Telecommunications System (UMTS) Subscriber Identity Module (USIM). TheUSIM card is a special smart card used with cellular networks to validate a given user with thenetwork.EAP-FAST EAP-FAST, like EAP-TTLS and PEAP, uses tunneling to protect traffic. The main difference is thatEAP-FAST does not use certificates to authenticate.Provisioning in EAP-FAST is negotiated solely by the client as the first communication exchangewhen EAP-FAST is requested from the server. If the client does not have a pre-shared secretProtected Access Credential (PAC), it can request to initiate a provisioning EAP-FAST exchangeto dynamically obtain one from the server.EAP-FAST documents two methods to deliver the PAC: manual delivery through an out-of-bandsecure mechanism, and automatic provisioning.Manual delivery mechanisms can be any delivery mechanism that the administrator of thenetwork feels is sufficiently secure for their network.Automatic provisioning establishes an encrypted tunnel to protect the authentication ofthe client and the delivery of the PAC to the client. This mechanism, while not as secureas a manual method may be, is more secure than the authentication method used inLEAP.The EAP-FAST method can be divided into two parts: provisioning, and authentication. Theprovisioning phase involves the initial delivery of the PAC to the client. This phase only needs tobe performed once per client and user.EAP-GTC The EAP-GTC (Generic Token Card) is similar to the EAP-OTP except with hardware token cards.The request contains a displayable message, and the response contains the string read from thehardware token card.EAP-OTP EAP-OTP (One-Time Password) is similar to MD5, except it uses the OTP as the response. Therequest contains a displayable message. The OTP method is defined in RFC 2289.EAP-SIM Extensible Authentication Protocol-Subscriber Identity Module (EAP-SIM) authentication can beused with:Network Authentication types: Open, Shared, and WPA*-Enterprise, WPA2*-Enterprise.Data Encryption types: None, WEP and CKIP.
A SIM card is a special smart card that is used by Global System for Mobile Communications(GSM) based digital cellular networks. The SIM card is used to validate your credentials with thenetworkEAP-TLS A type of authentication method that uses EAP and a security protocol called the TransportLayer Security (TLS). EAP-TLS uses certificates that use passwords. EAP-TLS authenticationsupports dynamic WEP key management.EAP-TTLS A type of authentication method that uses EAP and Tunneled Transport Layer Security (TTLS).EAP-TTLS uses a combination of certificates and another security method such as passwords.Encryption Scrambling data so that only the authorized recipient can read it. Usually a key is needed tointerpret the data.FHSS Frequency-Hop Spread Spectrum. Technology used in radio transmission. Incompatible withDSSS.File and printersharing A capability that allows a number of people to view, modify, and print the same file(s) fromdifferent computers.Fragmentationthreshold The threshold at which the wireless adapter breaks the packet into multiple frames. Thisdetermines the packet size and affects the throughput of the transmission.GHz(Gigahertz) A unit of frequency equal to 1,000,000,000 cycles per second.Host computer The computer that is directly connected to the Internet via a modem or network adapter.Infrastructurenetwork A wireless network centered around an access point. In this environment, the access point notonly provides communication with the wired network, but also mediates wireless network trafficin the immediate neighborhood.IEEE Institute of Electrical and Electronics Engineers (IEEE) is an organization involved in definingcomputing and communications standards.InternetProtocol (IP)addressThe address of a computer that is attached to a network. Part of the address designates whichnetwork the computer is on, and the other part represents the host identification.LAN (Local AreaNetwork) A high-speed, low-error data network covering a relatively small geographic area.LEAP (LightExtensibleAuthenticationProtocol)A version of Extensible Authentication Protocol (EAP). LEAP is a proprietary extensibleauthentication protocol developed by Cisco that provides a challenge-response authenticationmechanism and dynamic key assignment.MAC (MediaAccess Control)AddressA hardwired address applied at the factory. It uniquely identifies network hardware, such as awireless adapter, on a LAN or WAN.Mbps(Megabits-per-second)Transmission speed of 1,000,000 bits per second.MHz(Megahertz) A unit of frequency equal to 1,000,000 cycles per second.MIC (Michael) Message Integrity Check (commonly called Michael).MS-CHAP An EAP mechanism used by the client. Microsoft Challenge Authentication Protocol (MS-CHAP)Version 2, is used over an encrypted channel to enable server validation. The challenge andresponse packets are sent over a non-exposed TLS encrypted channel.ns(Nanosecond) 1 billionth (1/1,000,000,000) of a second.OFDM Orthogonal Frequency Division Multiplexing.Openauthentication Allows any device network access. If encryption is not enabled on the network, any device thatknows the Service Set Identifier (SSID) of the access point can gain access to the network.PEAP Protected Extensible Authentication Protocol (PEAP) is an Internet Engineering Task Force (IETF)draft protocol sponsored by Microsoft, Cisco, and RSA Security. PEAP creates an encryptedtunnel similar to the tunnel used in secure web pages (SSL). Inside the encrypted tunnel, a
number of other EAP authentication methods can be used to perform client authentication. PEAPrequires a TLS certificate on the RADIUS server, but unlike EAP-TLS there is no requirement tohave a certificate on the client. PEAP has not been ratified by the IETF. The IETF is currentlycomparing PEAP and TTLS (Tunneled TLS) to determine an authentication standard for 802.1Xauthentication in 802.11 wireless systems. PEAP is an authentication type designed to takeadvantage of server-side EAP-Transport Layer Security (EAP-TLS) and to support variousauthentication methods, including user passwords and one-time passwords, and Generic TokenCards.Peer-to-Peermode A wireless network structure that allows wireless clients to communicate directly with each otherwithout using an access point.Power savemode The state in which the radio is periodically powered down to conserve power. When the portablecomputer is in Power Save mode, received packets are stored in the access point until thewireless adapter wakes up.Preferrednetwork One of the networks that has been configured. Such networks are listed under Preferrednetworks on the Wireless Networks tab of the Wireless Network Connection Properties(Windows* XP environment).RADIUS(RemoteAuthenticationDial-In UserService)RADIUS is an authentication and accounting system that verifies user's credentials and grantsaccess to requested resources.RF (RadioFrequency) The international unit for measuring frequency is Hertz (Hz), which is equivalent to the olderunit of cycles per second. One MegaHertz (MHz) is one million Hertz. One GigaHertz (GHz) isone billion Hertz. For reference: the standard US electrical power frequency is 60 Hz, the AMbroadcast radio frequency band is 0.55 -1.6 MHz, the FM broadcast radio frequency band is 88-108 MHz, and microwave ovens typically operate at 2.45 GHz.Roaming Movement of a wireless node between two micro cells. Roaming usually occurs in infrastructurenetworks built around multiple access points. Current wireless network roaming is onlysupported in the same subnet of a network.RTS threshold The number of frames in the data packet at or above which an RTS/CTS (request to send/clearto send) handshake is turned on before the packet is sent. The default value is 2347.Shared key An encryption key known only to the receiver and sender of data. This is also referred to as apre-shared key.SIM(SubscriberIdentityModule)A SIM card is used to validate credentials with the network. A SIM card is a special smart cardused by GSM-based digital cellular networks.Silent mode Silent Mode Access Points or Wireless Routers have been configured to not broadcast the SSIDfor the wireless network. This makes it necessary to know the SSID in order to configure thewireless profile to connect to the access point or wireless router.Single Sign On Single Sign On feature set allows the 802.1X credentials to match your Windows log on username and password credentials for wireless network connections.SSID (ServiceSet Identifier) SSID or network name is a value that controls access to a wireless network. The SSID for yourwireless network card must match the SSID for any access point that you want to connect with.If the value does not match, you are not granted access to the network. Each SSID may be upto 32 alphanumeric characters long and is case-sensitive.stealth A stealth access point is one that has the capability and is configured to not broadcast its SSID.This is the WiFi network name that appears when a DMU (Device Management Utility, such asIntel® PROSet/Wireless WiFi Connection Utility) scans for available wireless networks. Althoughthis can enhance wireless network security, it is commonly considered a weak security feature.To connect to a stealth access point, a user must specifically know the SSID and configure theirDMU accordingly. The feature is not a part of the 802.11 specification, and is known by differingnames by various vendors: closed mode, private network, SSID broadcasting.TKIP (TemporalKey Integrity Temporal Key Integrity protocol improves data encryption. Wi-Fi Protected Access* uses itsTKIP. TKIP provides important data encryption enhancements including a re-keying method.
Protocol) TKIP is part of the IEEE 802.11i encryption standard for wireless networks. TKIP is the nextgeneration of WEP, the Wired Equivalency Protocol, which is used to secure 802.11 wirelessnetworks. TKIP provides per packet key mixing, a message integrity check and a re-keyingmechanism, thus fixing the flaws of WEP.TLS (TransportLayer Security) A type of authentication method using the Extensible Authentication Protocol (EAP) and asecurity protocol called the Transport Layer Security (TLS). EAP-TLS uses certificates which usepasswords. EAP-TLS authentication supports dynamic WEP key management. The TLS protocol isintended to secure and authenticate communications across a public network through dataencryption. The TLS Handshake Protocol allows the server and client to provide mutualauthentication and to negotiate an encryption algorithm and cryptographic keys before data istransmitted.TTLS (TunneledTransport LayerSecurity)These settings define the protocol and the credentials used to authenticate a user. In TTLS, theclient uses EAP-TLS to validate the server and create a TLS-encrypted channel between theclient and server. The client can use another authentication protocol. Typically password-basedprotocols challenge over this encrypted channel to enable server validation. The challenge andresponse packets are sent over a non-exposed TLS encrypted channel. TTLS implementationstoday support all methods defined by EAP, as well as several older methods (CHAP, PAP, MS-CHAP and MS-CHAP-V2). TTLS can easily be extended to work with new protocols by definingnew attributes to support new protocols.WEP (WiredEquivalentPrivacy)Wired Equivalent Privacy, 64- and 128-bit (64-bit is sometimes referred to as 40-bit). This is alow-level encryption technique designed to give the user about the same amount of privacy thathe would expect from a LAN. WEP is a security protocol for wireless local area networks(WLANs) defined in the 802.11b standard. WEP is designed to provide the same level of securityas that of a wired LAN. WEP aims to provide security by data over radio waves so that it isprotected as it is transmitted from one end point to another.WEP Key Either a pass phrase or hexadecimal key.The pass phrase must be 5 ASCII characters for 64-bit WEP or 13 ASCII characters for 128-bitWEP. For pass phrases, 0-9, a-z, A-Z, and ~!@#$%^&*()_+|`-={}|[]\:";'<>?,./ are all validcharacters.The hex key must be 10 hexadecimal characters (0-9, A-F) for 64-bit WEP or 26 hexadecimalcharacters (0-9, A-F) for 128-bit WEP.Wi-Fi*(WirelessFidelity)Is meant to be used generically when referring of any type to 802.11 network, whether802.11b, 802.11a, or dual-band.WiMAX WiMAX, the Worldwide Interoperability for Microwave Access, is a telecommunicationstechnology aimed at providing wireless data over long distances in a variety of ways, from point-to-point links to full mobile cellular type access. It is based on the IEEE 802.16 standard. Thename WiMAX was created by the WiMAX Forum, which was formed in June 2001 to promoteconformance and interoperability of the standard. The forum describes WiMAX as "a standards-based technology enabling the delivery of last mile wireless broadband access as an alternativeto cable and DSL."Wireless router A stand-alone wireless hub that allows any computer that has a wireless network adapter tocommunicate with another computer within the same network and to connect to the Internet.WLAN (WirelessLocal-AreaNetwork)A type of local-area network that uses high-frequency radio waves rather than wires tocommunicate between nodes.WPA* (Wi-FiProtectedAccess)This is a security enhancement that strongly increases the level of data protection and accesscontrol to a wireless network. WPA is an interim standard that will be replaced with the IEEE's802.11i standard upon its completion. WPA consists of RC4 and TKIP and provides support forBSS (Infrastructure) mode only. WPA and WPA2 are compatible.WPA2* (Wi-FiProtectedAccess 2)This is the second generation of WPA that complies with the IEEE TGi specification. WPA2consists of AES encryption, pre-authentication and PMKID caching. It provides support for BSS(Infrastructure) mode and IBSS (ad hoc) mode. WPA and WPA2 are compatible.WPA-Enterprise Wi-Fi Protected Access-Enterprise applies to corporate users. A new standards-based,interoperable security technology for wireless LAN (subset of IEEE 802.11i draft standard) thatencrypts data sent over radio waves. WPA is a Wi-Fi standard that was designed to improve
upon the security features of WEP as follows:Improved data encryption through the temporal key integrity protocol (TKIP). TKIP uses ahashing algorithm to scramble the encryption keys and adds an integrity-checking featureto ensure that the keys have not been tampered with.User authentication, which is generally missing in WEP, through the extensibleauthentication protocol (EAP). WEP regulates access to a wireless network based on acomputer's hardware-specific MAC address, which is relatively simple to be sniffed out andstolen. EAP is built on a more secure public-key encryption system to ensure that onlyauthorized network users can access the network.WPA is an interim standard that will be replaced with the IEEE's 802.11i standard upon itscompletion.WPA-Personal Wi-Fi Protected Access-Personal provides a level of security in the small network or homeenvironment.WPA-PSK (Wi-Fi Protected-Access Pre-Shared Key)WPA-PSK mode does not use an authentication server. It can be used with the data encryptiontypes WEP or TKIP. WPA-PSK requires configuration of a pre-shared key (PSK). You must entera pass phrase or 64 hex characters for a pre-shared key of length 256-bits. The data encryptionkey is derived from the PSK.Back to TopBack to ContentsTrademarks and Disclaimers
Back to ContentsWarrantyProduct Warranty InformationOne-Year Limited Hardware WarrantyLimited WarrantyIn this warranty statement, the term "Product" applies to the wireless adapters listed in Specifications.Intel warrants to the purchaser of the Product that the Product, if properly used and installed, will be free fromdefects in material and workmanship and will substantially conform to Intel’s publicly available specifications forthe Product for a period of one (1) year beginning on the date the Product was purchased in its original sealedpackaging.SOFTWARE OF ANY KIND DELIVERED WITH OR AS PART OF THE PRODUCT IS EXPRESSLY PROVIDED "AS IS",SPECIFICALLY EXCLUDING ALL OTHER WARRANTIES, EXPRESS, IMPLIED (INCLUDING WITHOUT LIMITATION,WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT OR FITNESS FOR A PARTICULAR PURPOSE), providedhowever, that Intel warrants that the media on which the software is furnished will be free from defects for aperiod of ninety (90) days from the date of delivery. If such a defect appears within the warranty period, you mayreturn the defective media to Intel for replacement or alternative delivery of the software at Intel's discretion andwithout charge. Intel does not warrant or assume responsibility for the accuracy or completeness of anyinformation, text, graphics, links or other items contained within the software.If the Product which is the subject of this Limited Warranty fails during the warranty period for reasons covered bythis Limited Warranty, Intel, at its option, will:REPAIR the Product by means of hardware and/or software; ORREPLACE the Product with another product, OR, if Intel is unable to repair or replace the Product,REFUND the then-current Intel price for the Product at the time a claim for warranty service is made toIntel under this Limited Warranty.THIS LIMITED WARRANTY, AND ANY IMPLIED WARRANTIES THAT MAY EXIST UNDER APPLICABLE STATE,NATIONAL, PROVINCIAL OR LOCAL LAW, APPLY ONLY TO YOU AS THE ORIGINAL PURCHASER OF THE PRODUCT.Extent of Limited WarrantyIntel does not warrant that the Product, whether purchased stand-alone or integrated with other products,including without limitation, semi-conductor components, will be free from design defects or errors known as"errata." Current characterized errata are available upon request. Further, this Limited Warranty does NOT cover:(i) any costs associated with the replacement or repair of the Product, including labor, installation or other costsincurred by you, and in particular, any costs relating to the removal or replacement of any Product soldered orotherwise permanently affixed to any printed circuit board or integrated with other products; (ii) damage to theProduct due to external causes, including accident, problems with electrical power, abnormal, mechanical orenvironmental conditions, usage not in accordance with product instructions, misuse, neglect, accident, abuse,alteration, repair, improper or unauthorized installation or improper testing, or (iii) any Product which has beenmodified or operated outside of Intel’s publicly available specifications or where the original product identificationmarkings (trademark or serial number) have been removed, altered or obliterated from the Product; or (iv) issuesresulting from modification (other than by Intel) of software products provided or included in the Product, (v)incorporation of software products, other than those software products provided or included in the Product byIntel, or (vi) failure to apply Intel-supplied modifications or corrections to any software provided with or includedin the Product.How to Obtain Warranty ServiceTo obtain warranty service for the Product, you may contact your original place of purchase in accordance with itsinstructions or you may contact Intel. To request warranty service from Intel, you must contact the Intel Customer
Support ("ICS") center in your region (http://www.intel.com/support/wireless/) within the warranty period duringnormal business hours (local time), excluding holidays and return the Product to the designated ICS center. Pleasebe prepared to provide: (1) your name, mailing address, email address, telephone numbers and, in the USA, validcredit card information; (2) proof of purchase; (3) model name and product identification number found on theProduct; and (4) an explanation of the problem. The Customer Service Representative may need additionalinformation from you depending on the nature of the problem. Upon ICS's verification that the Product is eligiblefor warranty service, you will be issued a Return Material Authorization ("RMA") number and provided withinstructions for returning the Product to the designated ICS center. When you return the Product to the ICScenter, you must include the RMA number on the outside of the package. Intel will not accept any returnedProduct without an RMA number, or that has an invalid RMA number, on the package. You must deliver thereturned Product to the designated ICS center in the original or equivalent packaging, with shipping charges pre-paid (within the USA), and assume the risk of damage or loss during shipment. Intel may elect to repair orreplace the Product with either a new or reconditioned Product or components, as Intel deems appropriate. Therepaired or replaced product will be shipped to you at the expense of Intel within a reasonable period of time afterreceipt of the returned Product by ICS. The returned Product shall become Intel’s property on receipt by ICS. Thereplacement product is warranted under this written warranty and is subject to the same limitations of liability andexclusions for ninety (90) days or the remainder of the original warranty period, whichever is longer. If Intelreplaces the Product, the Limited Warranty period for the replacement Product is not extended.WARRANTY LIMITATIONS AND EXCLUSIONSTHIS WARRANTY REPLACES ALL OTHER WARRANTIES FOR THE PRODUCT AND INTEL DISCLAIMS ALL OTHERWARRANTIES, EXPRESS OR IMPLIED INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OFMERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT, COURSE OF DEALING ANDUSAGE OF TRADE. Some states (or jurisdictions) do not allow the exclusion of implied warranties so thislimitation may not apply to you. ALL EXPRESS AND IMPLIED WARRANTIES ARE LIMITED IN DURATION TO THELIMITED WARRANTY PERIOD. NO WARRANTIES APPLY AFTER THAT PERIOD. Some states (or jurisdictions) donot allow limitations on how long an implied warranty lasts, so this limitation may not apply to you.LIMITATIONS OF LIABILITYINTEL’S RESPONSIBILITY UNDER THIS OR ANY OTHER WARRANTY, IMPLIED OR EXPRESS, IS LIMITED TO REPAIR,REPLACEMENT OR REFUND, AS SET FORTH ABOVE. THESE REMEDIES ARE THE SOLE AND EXCLUSIVE REMEDIESFOR ANY BREACH OF WARRANTY. TO THE MAXIMUM EXTENT PERMITTED BY LAW, INTEL IS NOT RESPONSIBLEFOR ANY DIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES RESULTING FROM ANY BREACH OFWARRANTY OR UNDER ANY OTHER LEGAL THEORY (INCLUDING WITHOUT LIMITATION, LOST PROFITS,DOWNTIME, LOSS OF GOODWILL, DAMAGE TO OR REPLACEMENT OF EQUIPMENT AND PROPERTY, AND ANYCOSTS OF RECOVERING, REPROGRAMMING, OR REPRODUCING ANY PROGRAM OR DATA STORED IN OR USEDWITH A SYSTEM CONTAINING THE PRODUCT), EVEN IF INTEL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCHDAMAGES. Some states (or jurisdictions) do not allow the exclusion or limitation of incidental orconsequential damages, so the above limitations or exclusions may not apply to you. THIS LIMITEDWARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS, AND YOU MAY ALSO HAVE OTHER RIGHTS THAT VARY BY STATEOR JURISDICTION. ANY AND ALL DISPUTES ARISING UNDER OR RELATED TO THIS LIMITED WARRANTY SHALL BEADJUDICATED IN THE FOLLOWING FORUMS AND GOVERNED BY THE FOLLOWING LAWS: FOR THE UNITED STATESOF AMERICA, CANADA, NORTH AMERICA AND SOUTH AMERICA, THE FORUM SHALL BE SANTA CLARA,CALIFORNIA, USA AND THE APPLICABLE LAW SHALL BE THAT OF THE STATE OF DELAWARE. FOR THE ASIAPACIFIC REGION (EXCEPT FOR MAINLAND CHINA), THE FORUM SHALL BE SINGAPORE AND THE APPLICABLE LAWSHALL BE THAT OF SINGAPORE. FOR EUROPE AND THE REST OF THE WORLD, THE FORUM SHALL BE LONDONAND THE APPLICABLE LAW SHALL BE THAT OF ENGLAND AND WALES IN THE EVENT OF ANY CONFLICT BETWEENTHE ENGLISH LANGUAGE VERSION AND ANY OTHER TRANSLATED VERSION(S)OF THIS LIMITED WARRANTY(WITH THE EXCEPTION OF THE SIMPLIFIED CHINESE VERSION), THE ENGLISH LANGUAGE VERSION SHALLCONTROL.IMPORTANT! UNLESS OTHERWISE AGREED IN WRITING BY INTEL, THE INTEL PRODUCTS SOLD HEREUNDER ARENOT DESIGNED, OR INTENDED FOR USE IN ANY MEDICAL, LIFE SAVING OR LIFE SUSTAINING SYSTEMS,TRANSPORTATION SYSTEMS, NUCLEAR SYSTEMS, OR FOR ANY OTHER MISSION CRITICAL APPLICATION IN WHICHTHE FAILURE OF THE INTEL PRODUCT COULD CREATE A SITUATION WHERE PERSONAL INJURY OR DEATH MAYOCCUR.
WEEEBack to TopBack to ContentsTrademarks and Disclaimers

Navigation menu