NETGEAR HA311 manual Ssid

Page 30

This table describes the options available from the Configuration section:

CONFIGURATION

DESCRIPTION

 

 

 

 

Network

Configurable between ad-hoc and infrastructure modes.

 

 

In 802.11 ad-hoc mode, the wireless nodes form their own local network where

 

 

the end nodes communicate peer-to-peer without an access point.

 

 

In infrastructure mode, the wireless node searches all available wireless

 

 

channels to associate with an access point.

 

Network Name

Enter a 32-character (maximum) service set ID in this field; the characters are

 

(SSID)

case sensitive.

 

 

When the wireless node is operating in ad-hoc mode, this field operates as the

 

 

basic service set ID (BSSID). All wireless nodes in the same network should use

 

 

the same BSSID.

 

 

When in infrastructure mode, this field defines the extended service set ID

 

 

(ESSID). The ESSID assigned to the wireless node is required to match the

 

 

access point ESSID in order for the wireless node to communicate with the

 

 

access point.

 

Turbo Mode

Enabling turbo mode allows the wireless node to transmit or receive at a higher

 

 

rate, up to 72 Mbps.

 

Power Saving

Supports optional power management to conserve battery life in Infrastructure

 

 

mode. The three possible settings are off, normal, and maximum. The HA311

 

 

“wakes up” every 10-beacon interval to listen to the normal mode, but “wakes

 

 

up” every 100-beacon interval in the maximum power saving mode.

 

Security:

Sets the data encryption level for the wireless node. The data encryption level

 

Enable Security

must be the same between all wireless nodes and access points within the same

 

 

network. The possible values for the data encryption level are Disable, 64 bits,

 

 

128 bits, and 152 bits. (The 64-bit data encryption is also called 40-bit data

 

 

encryption by some vendors.) For more Information on data encryption, please

 

 

refer to Chapter 4--Wireless Network Fundamentals.

 

 

Unchecking the Enable Security (WEP Key) box or setting the data encryption

 

 

level to Disable is to not use any encryption; this is also called Open System

 

 

data encryption. Setting the data encryption level to 64-bit configures the

 

 

wireless node to use the 40-bit (also called 64-bit) Shared Key data encryption

 

 

method. Use of 128-bit and 152-bit Shared Key data encryption methods are

 

 

also possible.

 

Shared Key

The HA311 device with WEP enabled uses a WEP key to encrypt and decrypt

 

Entries

information. An HA311 Wireless PCI Adapter can support up to four WEP keys.

 

 

30

 

Image 30
Contents Netgear NETGEAR, INC Contents Introduction Features BenefitsPackage Contents System RequirementsRelated Netgear Ieee 802.11a Products About This GuideGet Started Now Installation Install the HA311 Utility SoftwarePage Page Page Page Page Install the HA311 Wireless PCI Adapter Hardware InstallationHardware Description Page Page Install the HA311 Wireless PCI Adapter Driver For Windows XP, 2000, ME, and 98 SE UsersClick Finish to close the Found New Hardware Wizard Verifying Driver Installation Page For Windows NT 4.0 Users Verifying NT 4.0 Driver Installation Configure the HA311 Network Settings Windows XP UsersIcon Ad-hoc mode Infrastructure mode Color About the HA311 Systray ApplicationConfiguring the HA311 Wireless PCI Adapter, on Test the Network Connection Status Click OK when you are done Configuring the HA311 802.11A Wireless PCI Adapter Status SectionConfiguration Section Ssid Statistics Section About Section Wireless Network Fundamentals Wireless Network ConfigurationAD-HOC Mode PEER-TO-PEER Workgroup Infrastructure Mode Service Set Identification Ssid Authentication and WEP Encryption Wireless Channel Selection Ieee 802.11a Channel Allocations HE102 user can use eight channels in non-turbo mode Appendix A-TROUBLESHOOTING AdapterAppendix B-GENERAL Specifications Model HA311 802.11a Wireless PCI AdapterAppendix C-REGULATORY Compliance TrademarksPage Radio Frequency Interference Requirements