LINKSYS WET54GV2 Wireless-G Ethernet Bridge User Manual

LINKSYS LLC Wireless-G Ethernet Bridge

User manual

Instant Wireless®SeriesUse this guide to install:WET54G User GuideWireless-G Ethernet Bridge
COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. Copyright © 2003 Linksys, All RightsReserved. Instant Wireless, Linksys, and the Linksys logo are registered trademarks ofLinksys Group, Inc. Microsoft, Windows, and the Windows logo are registered trade-marks of Microsoft Corporation. All other trademarks and brand names are the propertyof their respective proprietors. LIMITED WARRANTY Linksys guarantees that every Wireless-G Ethernet Bridge will be free from physicaldefects in material and workmanship for three years from the date of purchase, whenused within the limits set forth in the Specifications section of this User Guide. This Warranty is valid and may be processed only in the country of purchase.If the product proves defective during this warranty period, go to the Linksys website atwww.linksys.comfor complete RMA (Return Merchandise Authorization) assistance. Youcan also call Linksys Technical Support in order to obtain a RMA Number. BE SURE TOHAVE YOUR PROOF OF PURCHASE AND A BARCODE FROM THE PRODUCT’S PACK-AGING ON HAND WHEN CALLING. RETURN REQUESTS CANNOT BE PROCESSEDWITHOUT PROOF OF PURCHASE. When returning a product, mark the RMA Numberclearly on the outside of the package and include a copy of your original proof of pur-chase. All customers located outside of the United States of America and Canada shallbe held responsible for shipping and handling charges.IN NO EVENT SHALL LINKSYS’S LIABILITY EXCEED THE PRICE PAID FOR THE PROD-UCT FROM DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAM-AGES RESULTING FROM THE USE OF THE PRODUCT, ITS ACCOMPANYING SOFT-WARE, OR ITS DOCUMENTATION. LINKSYS DOES NOT OFFER REFUNDS FOR ANYPRODUCT. Linksys makes no warranty or representation, expressed, implied, or statuto-ry, with respect to its products or the contents or use of this documentation and allaccompanying software, and specifically disclaims its quality, performance, mer-chantability, or fitness for any particular purpose. Linksys reserves the right to revise orupdate its products, software, or documentation without obligation to notify any individ-ual or entity. Please direct all inquiries to:Linksys  P.O. Box 18558, Irvine, CA 92623.   SAFETY AND REGULATORY NOTICESFCC STATEMENTThis Wireless-G Ethernet Bridge has been tested and complies with the specifications fora Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designedto provide reasonable protection against harmful interference in a residential installation.This equipment generates, uses, and can radiate radio frequency energy and, if notinstalled and used according to the instructions, may cause harmful interference to radiocommunications. However, there is no guarantee that interference will not occur in a par-ticular installation. If this equipment does cause harmful interference to radio or televisionreception, which is found by turning the equipment off and on, the user is encouraged totry to correct the interference by one or more of the following measures:• Reorient or relocate the receiving antenna• Increase the separation between the equipment or devices• Connect the equipment to an outlet other than the receiver’s• Consult a dealer or an experienced radio/TV technician for assistanceFCC Caution: Any change or modification to the product not expressly approved byLinksys could void the user’s authority to operate the device.FCC Radiation Exposure StatementThis equipment complies with FCC radiation exposure limits set forth for an uncontrolledenvironment.  This equipment should be installed and operated with minimum distance20cm between the radiator and your body.• Access points with 2.4 GHz or 5 GHz integrated antenna must operate with a sepa-ration distance of at least 20 cm from all persons using the cable provided and mustnot be co-located or operating in conjunction with any other antenna or transmitter.End-users must be provided with specific operations for satisfying RF exposure compli-ance.  And Linksys, LLC declare that WPC54GV1.2  (Wireless-G Ethernet Bridge ) islimited in CH1~CH11 by specified firmware controlled in U.S.A. INDUSTRY CANADA (CANADA)This Class B digital apparatus complies with Canadian ICES-003.Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.The use of this device in a system operating either partially or completely outdoors mayrequire the user to obtain a license for the system according to the Canadian regulations.EC DECLARATION OF CONFORMITY (EUROPE)Linksys Group declares that the Instant Wireless Series products included in the InstantWireless Series conform to the specifications listed below, following the provisions of theEMC Directive 89/336/EEC and Low Voltage Directive 73/23/EEC:• ETS 300-826, 301 489-1 General EMC requirements for Radio equipment.• EN 609 50 Safety• ETS 300-328-2 Technical requirements for Radio equipment.Note: This equipment is intended to be used in all EU and EFTA countries. Outdoor usemay be restricted to certain frequencies and/or may require a license for operation. Formore details, contact Linksys Corporate Compliance.Note: Combinations of power levels and antennas resulting in a radiated power level ofabove 100 mW are considered as not compliant with the above mentioned directive andare not allowed for use within the European community and countries that have adoptedthe European R&TTE directive 1999/5/EC and/or the CEPT recommendation Rec 70.03.For more details on legal combinations of power levels and antennas, contact LinksysCorporate Compliance.• Linksys Group vakuuttaa täten että Instant Wireless Wireless-G Ethernet Bridge tyyp-pinen laite on direktiivin 1999/5/EY, direktiivin 89/336/EEC ja direktiivin 73/23/EEColeellisten vaatimusten ja sitä koskevien näiden direktiivien muiden ehtojenmukainen.• Linksys Group déclare que  le pont Ethernet sans fil G est conforme aux conditionsessentielles et aux dispositions relatives à la directive 1999/5/EC, la directive89/336/EEC, et à la directive 73/23/EEC.• Belgique B L’utilisation en extérieur est autorisé sur le canal 11 (2462 MHz), 12 (2467MHz), et 13 (2472 MHz).Dans le cas d’une utilisation privée, à l’extérieur d’un bâtiment, au-dessus d’unespace public, aucun enregistrement n’est nécessaire pour une distance de moinsde 300m. Pour une distance supérieure à 300m un enregistrement auprès de l’IBPTest requise. Pour une utilisation publique à l’extérieur de bâtiments, une licence del’IBPT est requise. Pour les enregistrements et licences, veuillez contacter l’IBPT.
Wireless-G Ethernet Bridge• France F: Bande de fréquence restreinte: seuls les canaux 10, 11, 12, 13 (2457,2462, 2467, et 2472 MHz respectivement) doivent être utilisés en France. Toute util-isation, qu'elle soit intérieure ou extérieure, est soumise à autorisation. Vous pouvezcontacter l'Autorité de Régulation des Télécommuniations (http://www.art-telecom.fr)pour la procédure à suivre.• France F: Restricted frequency band: only channels 10, 11, 12, 13 (2457, 2462,2467, and 2472 MHz respectively) may be used in France. License required forevery indoor and outdoor installations. Please contact ART for procedure to follow.• Deutschland D: Anmeldung im Outdoor-Bereich notwending, aber nicht genehmi-gungspflichtig. Bitte mit Händler die Vorgehensweise abstimmen.• Germany D: License required for outdoor installations. Check with reseller for proce-dure to follow.• Italia I: E' necessaria la concessione ministeriale anche per l'uso interno. Verificarecon i rivenditori la procedura da seguire. L'uso per installazione in esterni non e' per-messa.• Italy I: License required for indoor use. Use with outdoor installations not allowed.• the Netherlands NL License required for outdoor installations. Check with reseller forprocedure to follow.• Nederlands NL Licentie verplicht voor gebruik met buitenantennes. Neem contact opmet verkoper voor juiste procedure.WET54G-UG-30404C JLTable of ContentsChapter 1: Introduction 1The Wireless-G Ethernet Bridge 1Features 1Chapter 2: Getting to Know the Wireless-GEthernet Bridge 2The Wireless-G Ethernet Bridge’s Back Panel 2The Wireless-G Ethernet Bridge’s Front Panel LEDs 3Chapter 3: Planning Your Wireless Network 4Network Topology 4Ad-Hoc versus Infrastructure Mode 4Chapter 4: Connecting the Wireless-G EthernetBridge for Setup 7Chapter 5: Setting Up the Wireless-G Ethernet Bridge 8Chapter 6: Connecting the Wireless-G EthernetBridge for Network Use 16Connection to a Network Device 16Placement Options 17Chapter 7: Using the Wireless-G Ethernet BridgeWeb-based Utility 18Overview 18Starting the Web-based Utility 18Setup 20Password 25Advanced 26Status 29Help 31Appendix A: Troubleshooting 32Common Problems and Solutions 32Frequently Asked Questions 33
Wireless-G Ethernet Bridge1Instant Wireless®SeriesChapter 1: IntroductionrThe versatile Wireless-G Ethernet Bridge can make any wired Ethernet-equipped device a part of your wireless network. At home, use the Bridge toconnect game consoles, set-top boxes, or computers to your Wireless-G net-work and its shared high-speed Internet connection. In the office, convert yourEthernet-wired printer, scanner, camera, notebook or desktop into a wirelessnetworked device.It’s completely driver-free, so it works on any platform and under any operat-ing system! Since there are no drivers to load, setup is a snap—configure thenetwork settings through your PC’s web browser, then plug it into your deviceand go. And physical installation is simplified by support for Power overEthernet. With an optional PoE Adapter, you can mount the Bridge whereveryou want—power and data are both supplied through the Category 5 Ethernetcable.You can also use the Wireless-G Ethernet Bridge as a kind of “cable-less cable”to connect remote areas together. Maybe Shipping is all the way across thewarehouse from Receiving. Or maybe you want to set up a home office in yourdetached garage. With a Wireless-G Ethernet Bridge in the garage, and anoth-er one (or a Wireless-G Access Point) in the house, you’re connected—no dig-ging trenches, and no overhead wires.Let the Wireless-G Ethernet Bridge from Linksys open up exciting new possi-bilities for your wireless network.• Converts wired-Ethernet devices to Wireless-G (draft 802.11g) networkconnectivity• Operates in the 2.4GHz frequency spectrum with throughput of up to54Mbps• Complies with IEEE draft 802.11g standard, and backwards compatiblewith IEEE 802.11b products• Installs in minutes with easy-to-use Setup Wizard• Built-in web user interface for easy configuration from any web browser• Security of up to 128-bit WEP encryption• Supports Power over Ethernet for easy deployment• Equipped with one standard 10/100Base-TX interfaceThe Wireless-G Ethernet BridgeFeaturesAppendix B: Glossary 37Appendix C: Specifications 43Environmental 44Appendix D: Warranty Information 45Appendix E: Contact Information 46
Wireless-G Ethernet Bridge3Instant Wireless®Series2Power Green.  The Power LED will light upwhen the Bridge is powered on.Ethernet Green.  The Ethernet LED will be litsteadily when the Bridge is connected tothe wired network. The LED will blinkwhen there is wired network traffic. Wireless-G Green. The Wireless-G LED will be litsteadily when the Bridge is connected tothe wireless network. The LED willblink when there is wireless networktraffic.Figure 2-2Chapter 2: Getting to Know theWireless-G Ethernet BridgeReset The Reset button resets the Bridge to itsfactory default settings.X-II The X-II (MDI/MDI-X) slide switchoffers a choice between two settings.Use the Xsetting if you are connectingthe Bridge to a network adapter. Use theII setting if you are connecting theBridge to a hub or switch.LAN The LAN port is where you will con-nect the Ethernet network cable.Power The Power port is where you will con-nect the power adapter.The Wireless-G Ethernet Bridge’s Back PanelFigure 2-1The Wireless-G Ethernet Bridge’s Front Panel LEDsNote: If you use a Power over Ethernet (PoE)device to supply data and power through theEthernet network cable, then you do not needto connect the power adapter to the Powerport.
Wireless-G Ethernet BridgeInstant Wireless®Series54If the wireless network is relatively small and needs to share resources onlywith the other computers on the wireless network, then the Ad-Hoc mode canbe used. Ad-Hoc mode allows computers equipped with wireless transmittersand receivers to communicate directly with each other, eliminating the need foran access point. The drawback of this mode is that in Ad-Hoc mode, wireless-equipped computers are not able to communicate with computers on a wirednetwork. And, of course, communication between the wireless-equipped comput-ers is limited by the distance and interference directly between them.Chapter 3: Planning Your WirelessNetworkNetwork TopologyA wireless local area network (WLAN) is exactly like a regular local area net-work (LAN), except that each computer in the WLAN uses a wireless device toconnect to the network. Computers in a WLAN share the same frequency chan-nel and SSID, which is an identification name for wireless devices.Unlike wired networks, wireless networks have two different modes in whichthey may be set up: infrastructure and ad-hoc. An infrastructure configurationis a WLAN and wired LAN communicating to each other through an accesspoint. An ad-hoc configuration is wireless-equipped computers communicatingdirectly with each other. Choosing between these two modes depends onwhether or not the wireless network needs to share data or peripherals with awired network or not. If the computers on the wireless network need to be accessible by a wired net-work or need to share a peripheral, such as a printer, with the wired networkcomputers, the wireless network should be set up in Infrastructure mode. Thebasis of Infrastructure mode centers around an access point, which serves as themain point of communications in a wireless network (see Figure 3-1). Accesspoints transmit data to PCs equipped with wireless network cards, which canroam within a certain radial range of the access point.  Multiple access pointscan be arranged to work in succession to extend the roaming range, and can beset up to communicate with your Ethernet hardware as well. Network TopologyAd-Hoc versus Infrastructure ModeFigure 3-1
Wireless-G Ethernet Bridge7Instant Wireless®SeriesFigure 3-2 shows a typical scenarioof four Wireless-G Ethernet Bridgesin ad-hoc mode. Figure 3-3 shows atypical wireless bridging scenariousing two Wireless-G EthernetBridges. Each wireless network isconnected to a Wireless-G EthernetBridge through a switch. A separatenotebook computer is equipped witha wireless PC card and can commu-nicate with both wireless networks aslong as it has the same SSID andchannel as both wireless networks.6Chapter 4: Connecting theWireless-G Ethernet Bridge forSetup1. Attach the external antenna.2. Plug the included Ethernetnetwork cable into theLAN port on the backpanel of the Bridge.3. The  X-II (MDI/MDI-X)slide switch offers a choicebetween two settings. Slidethe X-II switch to the Xposition if you are con-necting the Bridge to aPC’s network adapter.Slide the X-II selection switch to the II position if you are connecting theBridge to a hub or switch.4. Plug the other end of theEthernet network cableinto the RJ-45 port of thehub, switch, or PC youwish to use to configurethe Bridge.5. Plug the supplied powercable into the Power porton the back panel of theBridge. Then plug theother end into an electrical outlet. Proceed to the next section, “Chapter 5: Setting Up the Wireless-GEthernet Bridge.”Figure 4-1Figure 3-3Figure 4-2Figure 3-2
Wireless-G Ethernet Bridge3. The screen shown in Figure 5-2 shows the two ways to configure the Bridgeusing this Setup Wizard. Optimally, you should perform this setup througha PC on your wired network. You can also set up the Bridge through one ofthe PCs on your wireless network. Click the Next button.4. The screen shown in Figure 5-3 displays a list of Wireless-G EthernetBridges on your network, along with the status information for each Bridge.(If you have only one Bridge on your network, it will be the only one dis-played.) Select the Bridge you are currently installing by clicking its namein the Selection box. Write down the IP address of the Wireless-G EthernetBridge, so you can use it to access the Web-based Utility later. Click the Ye sbutton.9Instant Wireless®Series8Figure 5-2Figure 5-3Chapter 5: Setting Up theWireless-G Ethernet BridgeNow that you’ve connected the Wireless-G Ethernet Bridge to your wired net-work, you are ready to set it up. The Setup Wizard will guide you through allthe steps necessary.1. Insert the Setup CD-ROM into your PC’s CD-ROM drive. The SetupUtility should run automatically, and the screen in Figure 5-1 should appear.If it does not, click the Start  button and choose Run. In the field thatappears, enter D:\setup.exe (if “D” is the letter of your CD-ROM drive).•Setup - Click the Setup button to proceed with the Setup Wizard. •User Guide - Click the User Guide button to open the PDF file of this UserGuide.•LINKSYS Web - Click the LINKSYS Web button to access the Linksyswebsite using an active Internet connection.•Exit - Click the Exit button to exit the Setup Wizard.2. Click the Setup button to begin the setup process.Figure 5-1
Wireless-G Ethernet Bridge7. The Wireless Settings screen will now appear. Enter your wireless network’sSSID. If you chose Ad-Hoc mode, select the channel at which the networkbroadcasts its wireless signal. If you have Wireless-G (draft 802.11g) and Wireless-B (802.11b) devices inyour network, then keep the default Network Mode setting, Mixed. If youhave only Wireless-G devices, select G-Only. Then click the Next button tocontinue or the Back button to return to the previous screen. •SSID - The SSID is the unique name shared among all devices in a wire-less network. The SSID must be identical for all devices in the wireless net-work. It is case-sensitive and must not exceed 32 alphanumeric characters,which can be any keyboard character.•Channel - From the drop-down menu, select the appropriate channel tomatch your network settings (available for Ad-Hoc mode only). All devicesin your wireless network must use the same channel in order to functioncorrectly.•Network Mode - Keep the default setting, Mixed, if you have Wireless-Gand Wireless-B devices in your network. Select G-Only if you have onlyWireless-G devices in your network. 11Instant Wireless®Series5. For security purposes, you will be askedfor your password in order to access theBridge. In lowercase letters, enteradmin in the Password field (later youcan change the password through theWeb-based Utility). Then click theEnter button.6. The screen shown in Figure 5-5 shows a choice of two wireless modes.Click the Infrastructure radio button if you want your wireless computersto network with computers on your wired network using a wireless accesspoint. Click the Ad-Hoc radio button if you want multiple wireless com-puters to network directly with each other. Do not use the Ad-Hoc mode ifyou want to network your wireless computers with computers on your wirednetwork. In the WB Name field, enter a unique name for the Bridge. Memorablenames are helpful, especially if you are using multiple bridges on the samenetwork. Click the Next button to continue or the Back button to return tothe previous screen.10Figure 5-6Figure 5-4Figure 5-5
Wireless-G Ethernet Bridge9. The Security Settings screen, shown in Figure 5-8, appears next. Enable ordisable Wired Equivalent Privacy (WEP) encryption for your wireless net-work. If you enable WEP, select the level of WEP encryption, and then entera Passphrase. (If you want to enter a WEP key manually, then click the Nextbutton.) If you want to disable WEP encryption, keep the default, Disabled.Click the Next button to continue.•WEP (Disabled/64-bit WEP/128-bit WEP) - In order to utilize WEPencryption, select 64-bit or 128-bit WEP from the drop-down menu. Thenenter a Passphrase. (If you want to enter a WEP key manually, then click theNext button.) If you do not want to use WEP encryption, keep the defaultsetting, Disabled.•Passphrase - Instead of manually entering a WEP key, you can enter aPassphrase, so a WEP key will be automatically generated after you clickthe Next button. The Passphrase is case-sensitive and should have 16 orfewer alphanumeric characters. It must match the passphrase of your wire-less network and is compatible with Linksys wireless products only. (Youwill have to enter the WEP key(s) manually on any non-Linksys wirelessproducts.)13Instant Wireless®Series8. The IP Settings screen will appear next, shown in Figure 5-7. If your net-work has a DHCP server, click the radio button next to Automaticallyobtain an IP address (DHCP). Click the Next button to continue or theBack button to return to the previous screen. Then proceed to step 9.If your network does not have a DHCP server, click the radio button next toSet IP configuration manually to select this option. Enter an IP Address,IP Mask, and Gateway appropriate to your network. You must specify an IPaddress on this screen. If you are unsure about the IP Mask and Gateway, itis better to leave these two fields blank. Click the Next button to continue orthe Back button to return to the previous screen. Then proceed to step 9.•IP Address - This IP address must be unique to your network.•IP Mask - The Bridge’s IP Mask (also known as Subnet Mask) must be thesame as your wired network’s Subnet Mask.•Gateway - Enter the IP address of your network’s Gateway.12Figure 5-8Figure 5-7
Wireless-G Ethernet Bridge12. The configuration using the Setup Wizard is complete. To configure anyother Wireless-G Ethernet Bridges on your network, run this Setup Wizardagain. To register the Bridge, click the Online Registration button. To exitthe Setup Wizard, click the Exit button.The Wireless-G Ethernet Bridge is now successfully configured foryour network.For more advanced configuration, proceed to “Chapter 7: Using theWireless-G Ethernet Bridge Web-based Utility.” Otherwise, go to“Chapter 6: Connecting the Wireless-G Ethernet Bridge for Network Use.”15Instant Wireless®Series10. If you entered a Passphrase, then you will see the automatically generatedWEP key in the Key 1 field. Click the Next button, and proceed to step 11.If you did not enter a Passphrase, then enter a WEP key in the Key 1 field.If you are using 64-bit WEP encryption, then the key must consist of exact-ly 10 hexadecimal characters. If you are using 128-bit WEP encryption,then the key must consist of exactly 26 hexadecimal characters. Valid hexa-decimal characters are “0”-“9” and “A”-“F”. Then click the Next button,and proceed to step 11.11. Review your settings on the Confirmation screen. Write down the Bridge’sIP Address if you want to configure advanced settings through the Bridge’sWeb-based Utility. Click the Ye s button to save these settings. Click the Nobutton to exit the Setup Wizard.14Figure 5-11Figure 5-9Figure 5-10
Instant Wireless®Series16Chapter 6: Connecting theWireless-G Ethernet Bridge forNetwork Use1. After configuration, unplug the power cable from the electrical outlet, andunplug the Ethernet network cable from the PC. 2. Plug the Ethernet network cable into the RJ-45 port on the Ethernet-readynetwork device you wish to add to the wireless network. 3. Plug the power cable into a local electrical outlet.The installation of the Wireless-G Ethernet Bridge is complete. Proceedto the next section, “Placement Options,” if you want to mount theBridge on a wall or have the Bridge stand on a surface.Note: If you do not have an active connection to the Ethernet-readynetwork device, then change the position of the X-II switch.  Note: The Bridge features Power Over Ethernet (PoE) support. PoEtechnology allows a PoE adapter (also known as a power injector,power hub, or inline power device) to supply data and power to anEthernet device using a single Ethernet network cable. To use theBridge’s PoE feature, follow the instructions for your specific PoEdevice.Wireless-G Ethernet Bridge17There are three ways to place the Bridge. Thefirst way is to place the Bridge horizontally ona surface (see Figure 6-1). The second way isto hang the Bridge on a wall, with the Bridgein a vertical position. The third way is to standthe Bridge vertically on a surface (see Figure6-2). The second and third options areexplained in further detail below.Wall Mount Option1. The Bridge has eight rubber inserts, fouron each side. Depending on how you wantto mount the Bridge, remove two of the rubber inserts.2. Attach two screws to the wall in the location where you want to mount theBridge.3. Hang the Bridge off of the two screws.Stand Option1. The Bridge has eight rubber inserts, fouron each side. Remove the two rubberinserts that are adjacent to the power port.2. The Bridge includes two triangular stands.Insert a stand into an opening. Push thestand up to snap it into place.3. Do the same with the second stand.4. Place the Bridge.The installation of the Wireless-GEthernet Bridge is complete.Placement OptionsFigure 6-1Figure 6-2Connection to a Network Device
Wireless-G Ethernet Bridge19Instant Wireless®SeriesChapter 7: Using the Wireless-GEthernet Bridge Web-based UtilityThe Bridge is designed to function properly after configuration using the SetupWizard. However, if you would like to change these settings or make moreadvanced configuration changes, use your web browser and the Wireless-GEthernet Bridge Web-based Utility. This chapter explains how to use the Utility.1. Open your web browser, and enter the IP address of the Wireless-GEthernet Bridge (the default is 192.168.1.226). Press the Enter key, and thescreen shown in Figure 7-1 will appear. In lowercase letters, enter thedefault password, admin, in the Password field. Click the OK button. Youcan set a new password on the Password screen later. 182. The Setup screen of the Bridge’s Utility will appear. The Utility provides a convenient, web-browser-based way to alter theBridge’s settings. It offers five main tabs:•Setup - Enables you to configure the IP address and wireless settings.•Password - Allows you to change the password or reset all settings to fac-tory defaults.•Advanced - Lets you change the advanced wireless settings and clone aMAC address onto the Bridge.•Status - Displays the Bridge’s current settings.•Help - Provides explanations of various configuration settings and links toonline technical support resources.Figure 7-2Starting the Web-based UtilityOverviewFigure 7-1
Wireless-G Ethernet Bridge21Instant Wireless®Series20LAN• Device Name - You may assign any name to the Bridge. Unique, memo-rable names are helpful, especially if you are using multiple bridges on thesame wireless network.• Configuration Type - If the Bridge will obtain an IP address automatical-ly from a DHCP server, such as a router, then select AutomaticConfiguration-DHCP. If you are assigning the Bridge a static IP address,then select Static IP Address, and enter an IP Address, Subnet Mask, andGateway address in the IP Address,Subnet Mask, and Gateway fields. Wireless• SSID - The SSID is the network name shared among all devices in a wire-less network. The SSID must be identical for all devices in the wireless net-work. It is case-sensitive and must not exceed 32 alphanumeric characters,which may be any keyboard character (do not use any spaces). Make surethis setting is the same for all devices in your wireless network. For addedsecurity, Linksys recommends that you change the default SSID (linksys)to a name of your choice.To search for available wireless networks, click the Site Survey button.• Network Type - Choose a wireless operating mode for the Bridge. Keep thedefault setting, Infrastructure, if you want your wireless-equipped deviceto communicate with computers and other devices on your wired networkusing a wireless access point. Select Ad-Hoc button if you want multiplewireless-equipped devices to communicate directly with each other. If you chose Ad-Hoc mode, then select the correct operating channel foryour network in the Channel drop-down menu. The channel you chooseshould match the channel set on the other devices in your wireless network.Then select the appropriate network mode. Keep the default, Mixed, if youhave Wireless-G (draft 802.11g) and Wireless-B (802.11b) devices in yournetwork. Select G-Only if you have only Wireless-G devices in your net-work. • WEP  - To enable WEP encryption, click the Enable radio button. Toincrease wireless network security, using WEP encryption is strongly rec-ommended. Then click the Edit WEP Settings button to configure theWEP settings. To disable WEP encryption, keep the default, Disable.The Setup screen lets you configure the wired and wireless network settingsfor the Bridge.• Firmware - The version number of the Bridge’s firmware is displayed here.Firmware should be upgraded ONLY if you experience problems with theBridge. Firmware updates are posted at www.linksys.com.• MAC Address - The MAC Address of the Bridge is displayed here.Note: You may have to refresh this page to see any new settings.SetupFigure 7-3
Wireless-G Ethernet Bridge•MAC Address - The MAC address of the network’s access point.•Channel - The channel setting.•Signal Strength (%) - The percentage of wireless signal strength.•Mode - The type of wireless standard, network mode, and status of WEPencryption.Click the Refresh button to obtain the most up-to-date data. Click the Cancelbutton to close this screen. Click the Help button for additional on-screeninformation.WEP EncryptionUse the WEP Encryption screen to configure the WEP encryption level andWEP keys for the Bridge.23Instant Wireless®Series22Figure 7-5Note: You may have to refresh this page to see any new settings.An acronym for Wired Equivalent Privacy, WEP is an encryption methodused to protect your wireless data communications. WEP uses 64-bit or128-bit keys to provide access control to your network and encryption secu-rity for every data transmission. To decode a data transmission, each devicein a network must use an identical WEP key. Higher encryption levels offerhigher levels of security, but due to the complexity of the encryption, theymay decrease network performance.Click the Apply button to save your changes. If your page doesn’t automati-cally refresh itself, then click the Refresh button of your web browser. Clickthe Cancel button to cancel your changes. Click the Help button for addition-al on-screen information.Wireless Site SurveyThe Wireless Site Survey screen shows all the wireless networks detected by theBridge and their general information. You can use this screen to connect to oneof these networks.For each wireless network detected, the following information is displayed:•SSID - The network name. To join a wireless network, click its SSID.Figure 7-4Note: Make sure your WEP key matches the WEP key of the wire-less network you want to join. Otherwise, the connection will fail.
Wireless-G Ethernet BridgeThe Password screen lets you change the Bridge’s Password and restore the fac-tory default settings.• Administrative Password - It is strongly recommended that you changethe factory default password of the Bridge, which is admin. All users whotry to access the Bridge’s Web-based Utility will be prompted for theBridge’s Password. The new Password must not exceed 12 characters inlength and must not include any spaces. Enter the new Password a secondtime to confirm it.• Restore Factory Defaults - Click the Ye s radio button to reset all configu-ration settings to their default values. If you do not want to restore the fac-tory defaults, then keep the default setting, No.To save your changes, click the Apply button. Click the Cancel button to can-cel your changes. Click the Help button for additional on-screen information.25Instant Wireless®Series24Figure 7-6Note: Any settings you have saved will be lost when the default set-tings are restored.Password•Default Key - Select which WEP key (1-4) will be used when the Bridgesends data. Make sure the other wireless-equipped devices are using thesame key.•WEP Encryption - In order to use WEP encryption, select 64-Bit (10 hexdigits) or 128-Bit (26 hex digits) from the drop-down menu.•Passphrase - Instead of manually entering WEP keys, you can enter aPassphrase. This Passphrase is used to generate one or more WEP keys. Itis case-sensitive and should not be longer than 16 alphanumeric characters.(The Passphrase function is compatible with Linksys wireless productsonly. If you want to communicate with non-Linksys wireless products, youwill need to enter your WEP key(s) manually on the non-Linksys wirelessproducts.) After you enter the Passphrase, click the Generate button to cre-ate WEP key(s).•Keys 1-4 - If you are not using a Passphrase, then you can enter one or moreWEP keys manually.In each key field, manually enter a set of values. (Do not leave a key fieldblank, and do not enter all zeroes. These are not valid key values.) If you areusing 64-bit WEP encryption, then each key must consist of exactly 10hexadecimal characters in length. If you are using 128-bit WEP encryption,then each key must consist of exactly 26 hexadecimal characters in length.Valid hexadecimal characters are “0”-“9” and “A”-“F”.Click the Apply button to save your changes. If your page doesn’t automati-cally refresh itself, then click the Refresh button of your web browser. Clickthe Cancel button to cancel your changes. Click the Help button for addition-al on-screen information.
Wireless-G Ethernet BridgeWireless• Transmission Rate - The default setting is Auto. The range is from 1 to54Mbps.The rate of data transmission should be set depending on the speed of yourwireless network. You can select from a range of transmission speeds, oryou can keep the default setting, Auto, to have the Bridge automatically usethe fastest possible data rate and enable the Auto-Fallback feature. Auto-Fallback will negotiate the best possible connection speed between theBridge and another wireless-equipped device.• Authentication Type - The default setting is Auto. The choices are Auto,Open, and Shared.This setting allows the Bridge to authenticate communication with the wire-less devices in your network. With the Shared Key setting, all wirelessdevices must have the same WEP keys so that the Bridge and the client canauthenticate each other and start transmitting data. With the Open Systemsetting, any device can join a network without performing any securitycheck. Using the Auto setting, the Bridge will automatically detect whethera wireless device is set to Shared Key or Open System, and then transmitdata using the appropriate authentication type. • RTS Threshold - This value should remain at its default setting of 2347.The range is 0-2347 bytes. Should you encounter inconsistent data flow,only minor modifications are recommended. If a network packet is smallerthan the preset RTS threshold size, the RTS/CTS mechanism will not beenabled. The Router sends Request to Send (RTS) frames to a particularreceiving station and negotiates the sending of a data frame. After receivingan RTS, the wireless station responds with a Clear to Send (CTS) frame toacknowledge the right to begin transmission.• Fragmentation Threshold - This value should remain at its default settingof 2346. The range is 256-2346 bytes. It specifies the maximum size for apacket before data is fragmented into multiple packets. If you experience ahigh packet error rate, you may slightly increase the FragmentationThreshold. Setting the Fragmentation Threshold too low may result in poornetwork performance. Only minor modifications of this value are recom-mended.27Instant Wireless®SeriesUse the Advanced Settings screen to customize advanced wireless settings andclone a MAC address onto the Bridge.26Figure 7-7AdvancedNote: You may have to refresh this page to see any new settings.
Wireless-G Ethernet Bridge29Instant Wireless®SeriesMAC Address• Cloning Mode - You can clone the MAC address of any network deviceonto the Bridge. To disable MAC address cloning, keep the default setting,Disable. To use the MAC cloning feature, select Enable.If you have enabled MAC cloning, then select Auto if you want to clone theMAC address of the device currently connected to the Bridge’s LAN port.The Bridge will actively scan for a new MAC address to be cloned when-ever you disconnect and re-connect the Bridge through its LAN port. SelectManual if you want to specify a MAC address in the Enter MAC Addressfield. This is useful when the Bridge is connected to multiple devicesthrough a switch or a hub. Click the Apply button to save your changes. If your page doesn’t automati-cally refresh itself, then click the Refresh button of your web browser. Clickthe Cancel button to cancel your changes. Click the Help button for addition-al on-screen information.28The Status screen displayed the Bridge’s current status and settings. All infor-mation is read-only.• Device Name - The name you have assigned to the Bridge is displayed here.• Firmware Version - The version number of the Bridge’s firmware is dis-played here. Firmware should be upgraded ONLY if you experience prob-lems with the Bridge. Firmware updates are posted at www.linksys.com.• MAC Address - The MAC Address of the Bridge is displayed here.Figure 7-8Status
Wireless-G Ethernet BridgeThe Help screen offers links to all of the help information for the Web-basedUtility’s screens and the Bridge’s online technical support resources. All infor-mation is read-only.• Linksys Website - Click the Linksys Website link to visit Linksys’s web-site, www.linksys.com.• Online manual in PDF format - Click the Online manual in PDF formatto view this User Guide on-screen. It is in Adobe Acrobat PortableDocument File (.pdf) format, so you will need the free Adobe AcrobatReader to view the pdf. If you do not have the Reader, click the AdobeWebsite link to download it. • Adobe Website (software for viewing PDF documents) - If you need todownload the Adobe Acrobat Reader to view the User Guide pdf, then clickthe Adobe Website link.31Instant Wireless®SeriesLAN Settings• IP Address - The Bridge’s IP Address is displayed here.• Subnet Mask - The Bridge’s Subnet Mask is displayed here.• Gateway - The Gateway address for the Bridge is displayed here.LAN Statistics• Ethernet TX - The number of packets transmitted to the Ethernet networkis displayed here.• Ethernet RX - The number of packets received from the Ethernet networkis displayed here.• Wireless TX - The number of packets transmitted to the wireless networkis displayed here.• Wireless RX - The number of packets received from the wireless networkis displayed here.Wireless Settings• SSID - The Bridge’s SSID is displayed here.• Network Type - The Bridge’s mode is displayed here.• Channel - The Bridge’s channel setting is displayed here.• WEP - The status of the Bridge’s WEP encryption is displayed here.• TX Rate - The Bridge’s transmission rate is displayed here.• Link Quality - The quality of the Bridge’s connection is displayed here. Click the Refresh button to obtain the most up-to-date settings and statistics.Click the Help button for additional on-screen information.30Figure 7-9Help
Wireless-G Ethernet Bridge5. The Web-based Utility won’t open.Make sure that you have a network adapter installed on the PC so you canuse the Web-based Utility. 6. The Web-based Utility does not recognize my password.The password is case-sensitive. Make sure you are using the correct case(s)when entering the password.If you forget your password, you can push the Bridge’s Reset button. Thiswill reset the password to the default setting; however, all other Bridge set-tings will be reset to the factory defaults as well. To use the default setting,enter admin in the Password field.7. After I make changes through the Web-based Utility, the new settings aren’t dis-played on-screen.Click the Refresh button of your web browser. If the new settings aren’t dis-played, then unplug the power adapter from the Bridge. Plug the poweradapter back in, and then click the Refresh button again.What is the IEEE 802.11b standard?It is one of the IEEE standards for wireless networks. The 802.11b standardallows wireless networking hardware from different manufacturers to commu-nicate, provided that the hardware complies with the 802.11b standard. The802.11b standard states a maximum data transfer rate of 11Mbps and an oper-ating frequency of 2.4GHz. What IEEE 802.11b features are supported?The product supports the following IEEE 802.11 functions: • CSMA/CA plus Acknowledge protocol • Multi-Channel Roaming • Automatic Rate Selection • RTS/CTS feature • Fragmentation • Power Management Can I run an application from a remote computer over the wireless network?This will depend on whether or not the application is designed to be used overa network. Consult the application’s user guide to determine if it supports oper-ation over a network.33Instant Wireless®Series32Frequently Asked QuestionsAppendix A: TroubleshootingThis section provides solutions to potential problems regarding the installation andoperation of the Wireless-G Ethernet Bridge. If you can’t find an answer here,check the Linksys website at www.linksys.com.1. I can’t connect to the access point.Open the Web-based Utility. On the Setup tab, perform the following steps: • Verify that the operating mode is set to Infrastructure mode.• Make sure that the SSID is the same as the SSID of the access point.• On the WEP Encryption screen, make sure that all of the WEP settings arethe same as the WEP settings of the access point.2. I don’t know how to change the Bridge’s IP address.You have two ways to change the Bridge’s IP address. • Open the Web-based Utility. On the Setup screen, click the Static IPAddress radio button, and change the IP address there.• If you encounter problems, power the Bridge off and on again, or push theReset button. Then try to change the IP address again. 3. The Bridge-enabled PC won’t communicate with a wireless-enabled PC orprinter.Perform the following steps: • Check that the wireless-enabled PC or printer is on the same wireless net-work as the PC using the Bridge. • Make sure that the SSID and network mode are the same for all devicesconnected to the same wireless network.• If the wireless LAN settings are okay, make sure that all the devices areon the same IP network.4. The Web-based Utility doesn’t detect the Bridge.Make sure that the Ethernet cable is properly connected and that theEthernet LED is lit. If the LED is not lit, change the position of the X-II slideswitch on the Bridge’s rear panel. Use the Xsetting if you are connecting theBridge to a network adapter. Use the II setting if you are connecting theBridge to a hub or switch. If you still do not have an active connection, thenchange the position of the X-II switch again.  Common Problems and Solutions
Wireless-G Ethernet Bridge35Instant Wireless®Series34What is ISM band?The FCC and their counterparts outside of the U.S. have set aside bandwidthfor unlicensed use in the ISM (Industrial, Scientific and Medical) band.Spectrum in the vicinity of 2.4 GHz, in particular, is being made availableworldwide. This presents a truly revolutionary opportunity to place convenienthigh speed wireless capabilities in the hands of users around the globe. What is Spread Spectrum?Spread Spectrum technology is a wideband radio frequency technique devel-oped by the military for use in reliable, secure, mission-critical communica-tions systems. It is designed to trade off bandwidth efficiency for reliability,integrity, and security. In other words, more bandwidth is consumed than in thecase of narrowband transmission, but the trade-off produces a signal that is, ineffect, louder and thus easier to detect, provided that the receiver knows theparameters of the spread-spectrum signal being broadcast. If a receiver is nottuned to the right frequency, a spread-spectrum signal looks like backgroundnoise. There are two main alternatives, Direct Sequence Spread Spectrum(DSSS) and Frequency Hopping Spread Spectrum (FHSS).What is DSSS? What is FHSS? And what are their differences?Frequency Hopping Spread Spectrum (FHSS) uses a narrowband carrier thatchanges frequency in a pattern that is known to both transmitter and receiver.Properly synchronized, the net effect is to maintain a single logical channel. Toan unintended receiver, FHSS appears to be short-duration impulse noise.Direct Sequence Spread Spectrum (DSSS) generates a redundant bit pattern foreach bit to be transmitted. This bit pattern is called a chip (or chipping code).The longer the chip, the greater the probability that the original data can berecovered. Even if one or more bits in the chip are damaged during transmis-sion, statistical techniques embedded in the radio can recover the original datawithout the need for retransmission. To an unintended receiver, DSSS appearsas low power wideband noise and is rejected (ignored) by most narrowbandreceivers. Would the information be intercepted while transmitting on air?Instant Wireless products feature two-fold protection in security. On the hard-ware side, as with Direct Sequence Spread Spectrum technology, it has theinherent security feature of scrambling. On the software side, Instant Wirelessproducts offer the encryption function (WEP) to enhance security and accesscontrol. Users can set it up depending upon their needs.Can I play multiplayer games with other users of the wireless network?Yes, as long as the game supports multiple players over a LAN. Refer to thegame’s user guide for more information.What is ad-hoc mode?When a wireless network is set to ad-hoc mode, the wireless-equipped com-puters are configured to communicate directly with each other. The ad-hocwireless network will not communicate with any wired network. What is infrastructure mode?When a wireless network is set to infrastructure mode, the wireless network isconfigured to communicate with a wired network through a wireless accesspoint.What is roaming?Roaming is the ability of a portable computer user to communicate continu-ously while moving freely throughout an area greater than that covered by a sin-gle wireless network access point. Before using the roaming function, theworkstation must make sure that it is the same channel number as the wirelessnetwork access point of the dedicated coverage area. To achieve true seamless connectivity, the wireless LAN must incorporate anumber of different functions. Each node and wireless network access point,for example, must always acknowledge receipt of each message. Each nodemust maintain contact with the wireless network even when not actually trans-mitting data. Achieving these functions simultaneously requires a dynamic RFnetworking technology that links wireless network access points and nodes. Insuch a system, the user’s end node undertakes a search for the best possibleaccess to the system. First, it evaluates such factors as signal strength and qual-ity, as well as the message load currently being carried by each wireless net-work access point and the distance of each wireless network access point to thewired backbone. Based on that information, the node next selects the rightwireless network access point and registers its address. Communicationsbetween end node and host computer can then be transmitted up and down thebackbone.As the user moves on, the end node’s RF transmitter regularly checks the sys-tem to determine whether it is in touch with the original wireless networkaccess point or whether it should seek a new one. When a node no longerreceives acknowledgment from its original wireless network access point, itundertakes a new search. Upon finding a new wireless network access point, itthen re-registers, and the communication process continues.
Wireless-G Ethernet Bridge37Instant Wireless®Series36Appendix B: Glossary802.11b - One of the IEEE standards for wireless networking hardware.Products that adhere to a specific IEEE standard will work with each other,even if they are manufactured by different companies. The 802.11b standardspecifies a maximum data transfer rate of 11Mbps, an operating frequency of2.4GHz, and WEP encryption for security. 802.11b networks are also referredto as Wi-Fi networks.802.11g - A proposed, but as yet unratified extension of the IEEE 802.11 stan-dard for wireless networking hardware. The draft 802.11g specifications usedby Linksys specify a maximum data transfer rate of 54Mbps using OFDMmodulation, an operating frequency of 2.4GHz, backward compatibility withIEEE 802.11b devices, and WEP encryption for security.Ad-hoc Network - An ad-hoc network is a group of computers, each with awireless adapter, connected as an independent 802.11 wireless LAN.  Ad-hocwireless computers operate on a peer-to-peer basis, communicating directlywith each other without the use of an access point.  Ad-hoc mode is alsoreferred to as an Independent Basic Service Set (IBSS) or as peer-to-peermode, and is useful at a departmental scale or SOHO operation.Default Gateway - The router used to forward all traffic that is not addressedto a station within the local subnet.DHCP (Dynamic Host Configuration Protocol) - A protocol that lets networkadministrators centrally manage and automate the assignment of InternetProtocol (IP) addresses in an organization's network. Using the Internet's set ofprotocol (TCP/IP), each machine that can connect to the Internet needs aunique IP address. When an organization sets up its computer users with a con-nection to the Internet, an IP address must be assigned to each machine.Without DHCP, the IP address must be entered manually at each computer and,if computers move to another location in another part of the network, a new IPaddress must be entered. DHCP lets a network administrator supervise and dis-tribute IP addresses from a central point and automatically sends a new IPaddress when a computer is plugged into a different place in the network. DHCP uses the concept of a “lease” or amount of time that a given IP addresswill be valid for a computer. The lease time can vary depending on how long auser is likely to require the Internet connection at a particular location. It’s espe-What is WEP?WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40/64bit shared key algorithm, as described in the IEEE 802.11 standard. Can Instant Wireless products support file and printer sharing?Instant Wireless products perform the same function as LAN products.Therefore, Instant Wireless products can work with NetWare, WindowsNT/2000, or other LAN operating systems to support printer or file sharing.
Wireless-G Ethernet BridgeThe IEEE fosters the development of standards that often become national andinternational standards. The organization publishes a number of journals, hasmany local chapters, and has several large societies in special areas, such as theIEEE Computer Society. Infrastructure Network - An infrastructure network is a group of computersor other devices, each with a wireless adapter, connected as an 802.11 wirelessLAN.  In infrastructure mode, the wireless devices communicate with eachother and to a wired network by first going through an access point.  An infra-structure wireless network connected to a wired network is referred to as aBasic Service Set (BSS).  A set of two or more BSS in a single network isreferred to as an Extended Service Set (ESS).  Infrastructure mode is useful ata corporation scale, or when it is necessary to connect the wired and wirelessnetworks.IP Address - In the most widely installed level of the Internet Protocol (IP)today, an IP address is a 32-binary digit number that identifies each sender orreceiver of information that is sent in packets across the Internet. When yourequest an HTML page or send e-mail, the Internet Protocol part of TCP/IPincludes your IP address in the message (actually, in each of the packets if morethan one is required) and sends it to the IP address that is obtained by lookingup the domain name in the Uniform Resource Locator you requested or in thee-mail address you're sending a note to. At the other end, the recipient can seethe IP address of the Web page requester or the e-mail sender and can respondby sending another message using the IP address it received. IPCONFIG - A utility that provides for querying, defining and managing IPaddresses within a network.  A commonly used utility, under Windows NT and2000, for configuring networks with static IP addresses.ISP - An ISP (Internet service provider) is a company that provides individualsand companies access to the Internet and other related services such as websitebuilding and virtual hosting. LAN - A local area network (LAN) is a group of computers and associateddevices that share a common communications line and typically share theresources of a single processor or server within a small geographic area (forexample, within an office building). MAC Address - The MAC (Media Access Control) address is a unique num-ber assigned by the manufacturer to any Ethernet networking device, such as anetwork adapter, that allows the network to identify it at the hardware level.39Instant Wireless®Series38cially useful in education and other environments where users change fre-quently. Using very short leases, DHCP can dynamically reconfigure networksin which there are more computers than there are available IP addresses. DHCP supports static addresses for computers containing Web servers thatneed a permanent IP address.DNS - The Domain Name System (DNS) is the way that Internet domainnames are located and translated into Internet Protocol (IP) addresses. Adomain name is a meaningful and easy-to-remember “handle” for an Internetaddress.DSSS (Direct-Sequence Spread Spectrum) - DSSS generates a redundant bitpattern for all transmitted data. This bit pattern is called a chip (or chippingcode).  Even if one or more bits in the chip are damaged during transmission,statistical techniques embedded in the receiver can recover the original datawithout the need for retransmission. To an unintended receiver, DSSS appearsas low power wideband noise and is rejected (ignored) by most narrowbandreceivers.  However, to an intended receiver (i.e. another wireless LAN end-point), the DSSS signal is recognized as the only valid signal, and interferenceis inherently rejected (ignored).Dynamic IP Address - An IP address that is automatically assigned to a clientstation in a TCP/IP network, typically by a DHCP server. Network devices thatserve multiple users, such as servers and printers, are usually assigned static IPaddresses.FHSS (Frequency Hopping Spread Spectrum) - FHSS continuously changes(hops) the carrier frequency of a conventional carrier several times per secondaccording to a pseudo-random set of channels. Because a fixed frequency is notused, and only the transmitter and receiver know the hop patterns, interceptionof FHSS is extremely difficult.Firmware - Code that is written onto read-only memory (ROM) or program-mable read-only memory (PROM).  Once firmware has been written onto theROM or PROM, it is retained even when the device is turned off.IEEE - The Institute of Electrical and Electronics Engineers. The IEEEdescribes itself as “the world's largest technical professional society—promot-ing the development and application of electrotechnology and allied sciencesfor the benefit of humanity, the advancement of the profession, and the well-being of our members.”
Wireless-G Ethernet Bridge41Instant Wireless®SeriesmIRC - mIRC runs under Windows and provides a graphical interface for log-ging onto IRC servers and listing, joining, and leaving channels.Network Mask - Also known as the “Subnet Mask.”OFDM - Developed for wireless applications, Orthogonal Frequency DivisionMultiplexing (OFDM) technology offers superior performance—increaseddata rates and more reliable transmissions—than previous technologies, such asDSSS. OFDM is a scheme in which numerous signals of different frequenciesare combined to form a single signal for transmission on the medium.OFDM works by breaking one high-speed data stream into a number of lower-speed data streams, which are then transmitted in parallel. Each lower-speedstream is used to modulate a subcarrier. Essentially, this creates a multi-carriertransmission by dividing a wide frequency band or channel into a number ofnarrower frequency bands or sub-channels. OFDM is also used for other appli-cations, including powerline networking.Passphrase - Used much like a password, a passphrase simplifies the WEPencryption process by automatically generating the WEP encryption keys forLinksys products. PCMCIA - The PCMCIA (Personal Computer Memory Card InternationalAssociation) is an industry group organized in 1989 to promote standards for acredit card-size memory or I/O device that would fit into a personal computer,usually a notebook or laptop computer. Ping (Packet INternet Groper) - An Internet utility used to determine whethera particular IP address is online. It is used to test and debug a network by send-ing out a packet and waiting for a response.Power over Ethernet (PoE) - A technology that allows a device, such as apower injector, power hub, or inline power device, to supply data and power toan Ethernet device using a single Ethernet network cable.RJ-45 - A connector similar to a telephone connector that holds up to eightwires, used for connecting Ethernet devices.Roaming - In an infrastructure mode wireless network, this refers to the abili-ty to move out of one access point's range and into another and transparentlyreassociate and reauthenticate to the new access point.  This reassociation andreauthentication should occur without user intervention and ideally without40interruption to network connectivity.  A typical scenario would be a locationwith multiple access points, where users can physically relocate from one areato another and easily maintain connectivity.SOHO (Small Office/Home Office) - Refers to any small office or homeoffice environment.SSID (Service Set IDentifier) - A unique name shared among all points in awireless network. The SSID must be identical for each point in the wireless net-work and is case-sensitive.Static IP Address - A permanent IP address that is assigned to a node in aTCP/IP network. Subnet Mask - The method used for splitting IP networks into a series of sub-groups, or subnets. The mask is a binary pattern that is matched up with the IPaddress to turn part of the host ID address field into a field for subnets. TCP (Transmission Control Protocol) - A method (protocol) used along withthe IP (Internet Protocol) to send data in the form of message units (datagram)between network devices over a LAN or WAN. While IP takes care of handlingthe actual delivery of the data (routing), TCP takes care of keeping track of theindividual units of data (called packets) that a message is divided into for effi-cient delivery over the network. TCP is known as a “connection oriented” pro-tocol due to requiring the receiver of a packet to return an acknowledgment ofreceipt to the sender of the packet resulting in transmission control.TCP/IP (Transmission Control Protocol/Internet Protocol) - The basic com-munication language or set of protocols for communications over a network(developed specifically for the Internet).  TCP/IP defines a suite or group ofprotocols and not only TCP and IP.UDP (User Datagram Protocol) - A method (protocol) used along with the IP(Internet Protocol) to send data in the form of message units (datagram)between network devices over a LAN or WAN. While IP takes care of handlingthe actual delivery of the data (routing), UDP takes care of keeping track of theindividual units of data (called packets) that a message is divided into for effi-cient delivery over the network. UDP is known as a “connection-less” protocoldue to NOT requiring the receiver of a packet to return an acknowledgment ofreceipt to the sender of the packet (as opposed to TCP).
Wireless-G Ethernet BridgeAppendix C: SpecificationsStandards Draft 802.11g, IEEE 802.11b,IEEE 802.3, IEEE 802.3uPorts One 10/100Base-TX RJ-45 PortButtons MDI/MDI-X slide switch, Reset buttonCabling Type Category 5 or betterLEDs Power, Ethernet, WirelessTransmit Power 18 dBm (typical) @ 11Mbps CCK15 dBm (typical) @ 54Mbps OFDMSecurity Feature WEP EncryptionWEP Key Bits 64/128-bitModulation 802.11b: CCK (11Mbps, 5.5Mbps),DQPSK (2Mbps), DBPSK (1Mbps)802.11g: OFDM (54Mbps)43Instant Wireless®SeriesWEP (Wired Equivalent Privacy) - A data privacy mechanism based on a 64-bit shared key algorithm, as described in the IEEE 802.11 standard. WINIPCFG - Configuration utility based on the Win32 API for querying,defining, and managing IP addresses within a network.  A commonly used util-ity, under Windows 95, 98, and Millennium, for configuring networks withstatic IP addresses.WLAN (Wireless Local Area Network) - A group of computers and associat-ed devices that communicate with each other wirelessly.42
Wireless-G Ethernet Bridge45Instant Wireless®SeriesDimensions 4.96" x 1.06" x 4.21" (126 mm x 27 mm x 107 mm)Unit Weight 8.50 oz. (0.2409 kg)Power 5V DCCertifications FCC Class BOperating Temp. 32°F to 104°F (0°C to 40°C)Storage Temp. -13°F to 158°F (-25°C to 70°C)Operating Humidity 10% to 90%, Non-CondensingStorage Humidity 5% to 90%, Non-Condensing44Appendix D: Warranty InformationBE SURE TO HAVE YOUR PROOF OF PURCHASE AND A BARCODEFROM THE PRODUCT’S PACKAGING ON HAND WHEN CALLING.RETURN REQUESTS CANNOT BE PROCESSED WITHOUT PROOF OFPURCHASE.IN NO EVENT SHALL LINKSYS’S LIABILITY EXCEED THE PRICEPAID FOR THE PRODUCT FROM DIRECT, INDIRECT, SPECIAL, INCI-DENTAL, OR CONSEQUENTIAL DAMAGES RESULTING FROM THEUSE OF THE PRODUCT, ITS ACCOMPANYING SOFTWARE, OR ITSDOCUMENTATION. LINKSYS DOES NOT OFFER REFUNDS FOR ANYPRODUCT. LINKSYS OFFERS CROSS SHIPMENTS, A FASTER PROCESS FOR PRO-CESSING AND RECEIVING YOUR REPLACEMENT.  LINKSYS PAYSFOR UPS GROUND ONLY. ALL CUSTOMERS LOCATED OUTSIDE OFTHE UNITED STATES OF AMERICA AND CANADA SHALL BE HELDRESPONSIBLE FOR SHIPPING AND HANDLING CHARGES. PLEASECALL LINKSYS FOR MORE DETAILS.Environmental
Instant Wireless®SeriesAppendix E: Contact InformationFor help with the installation or operation of the Wireless-G Ethernet Bridge,contact Linksys Technical Support at one of the phone numbers or Internetaddresses below.Sales Information 800-546-5797 (LINKSYS)Technical Support 800-326-7114RMA (Return MerchandiseAuthorization) Issues www.linksys.com (or call 949-271-5461)Fax 949-265-6655E-mail support@linksys.comWeb http://www.linksys.comFTP Site ftp.linksys.com46© Copyright 2003 Linksys, All Rights Reserved.http://www.linksys.com

Navigation menu