TROY Group 802.11b manual

Page 16

this option, select Ad-hoc Computer-to-Computer, or whatever mode your adapter uses to communicate on a wireless network without an access point.

If you are using WEP (Wired Equivalent Privacy) encryption on your wireless network, you will need to temporarily disable WEP on your PC in order to configure the print server. If you are using an access point with WEP enabled and it does not allow non- wep clients to communicate with other non-wep clients, then you will also need to temporarily change the wireless mode of your computer to Ad-hoc (802.11) mode.

Note:

If no computers on your network can be set to Ad-hoc mode, you will need to temporarily disable WEP on your access point. When you are done con- figuring the print server, you can re-enable WEP on your computer and change the wireless mode back if necessary.

If you are using TCP/IP, note your computer’s IP address. The print server will need to be on the same IP segment as the other nodes on your network in order to communi- cate.

If you are using infrastructure mode, make sure you have a good signal between your computer and the access point. Most wireless adapters have a utility that shows the wireless signal strength. See your wireless adapter’s documentation for details.

If you are using a Macintosh with an Airport® base station or non-Apple access point:

If your Macintosh has an Airport wireless card installed, make sure that AirPort is enabled in the AppleTalk and TCP/IP Control Panels. If both your Macintosh and the AirPort base station or access point are connected to an existing Ethernet net- work, select Ethernet in the AppleTalk and TCP/IP Control Panel.

To use the printer in infrastructure mode, use the Airport application to select the Airport Network name that corresponds to the base station or access point from the AirPort Networks list.

To use the printer in computer-to-computer (Ad-hoc) mode, use the Airport appli- cation to create or join a computer-to-computer network. See your AirPort docu- mentation for details.

If you are using password protection, you will need to temporarily create a comput- er-to-computer network with no password protection to configure the print server, then re-join the network with the password protection.

In order to make the Apple Airport password protection compatible with the 64-bit WEP (Wired Equivalent Privacy) on the EtherWind, you will need to use 0x fol- lowed by the 10 digit WEP key.

If you are using a home gateway or router, you will want to configure the EtherWind from a PC on the same network segment that you want the EtherWind to be on.

2-2

Image 16
Contents User’s Guide Copyright Notice Contents Troubleshooting Where to Get HelpAd-Hoc Mode IntroductionOperating Systems Supported System RequirementsNetwork Protocols Supported IPX/SPX Page Before You Begin Installing EtherWind Print Server HardwareUnpacking the Print Server EtherWind Connectors, Switches, and LEDs Verifying Successful Installation Connecting to a PrinterVerifying the Connection to the Printer Connecting the EtherWind to an RS-232 Serial Device DB9 DTE DCESET Port S1 Console Enabled Page Configuring IP SettingsConfiguring the EtherWind EtherWind 802.11bPage Installing the Software Page Page Page STARTProgramsTROY GroupEtherWindXAdmin32 STARTProgramsTROY GroupEtherWindWP-AdminManagement Methods EtherWind Console Telnet DEC NCP DEC NCLNetwork Configuration Microsoft WindowsPage Page Additional Windows Configuration Methods Configuration Configuring the MacintoshSetting Up Printing MacOS 8.x AppleTalk NetworkSetting Up Printing MacOS Directory ServicesThis section covers installation using the Novell client NetWare NetworkPage Select Print Services Quick Setup from the Tools menu Print Server Name windowPage Unix Network Berkeley Unix Host Configuration192.189.207.33xcdprinter LaserPrinter\ Lp=\ Sun Solaris ConfigurationMkdir /usr/spool/lpd/LaserPrinter HP/UX Configuration Select Add Access to Remote PrinterLp -dLaserJet filename Check the box next to Remote Printer is on BSD SystemConfiguration on Other Systems Name of queue to add user selectable Activate the queue YesDEC LAT Network VMS LAT Host Configuration$SET Term LTAxx/PASSTHRU/PASSALL @filename PRINT/QUEUE=queuename filenameFile Server Queue Configuration File Server User ConfigurationBanyan Vines Print Server Configuration Installing the Software on a Windows PC at the Local Site Printing ConfigurationPrintraNet Internet 10-2 Adding a Second PrintraNet Destination Configuring the Remote Troy Print Server Printing to the Remote Troy Print Server 192.189.207.222mail.troy.com Troubleshooting Printing Problems Troubleshooting and MaintenanceTroubleshooting Wireless Configuration Problems Troubleshooting Network Configuration Wireless Server Configuration Screen Fields Server NameSsid Wireless Mode Loading the Firmware11-6 11-7 Double-ClickAdd/Remove Programs Uninstalling the EtherWind Wireless SoftwareChange/Remove Worldwide Web Support Where to Get HelpContacting Troy Warranty Returning ProductsFCC Compliance Statement For United States Users For European Users Declaration of ConformityRegulatory Information Canada IC notice

802.11b specifications

TROY Group 802.11b is a significant advancement in wireless networking technology, introduced in the late 1990s. Operating within the 2.4 GHz frequency band, 802.11b provided users with robust connectivity and established a foundation for future wireless standards. This protocol marked a transition from wired networking to wireless, enabling greater mobility and flexibility for users.

One of the main features of the 802.11b standard is its data transmission rate, which supports speeds of up to 11 Mbps. While this may seem modest by today’s standards, it was a groundbreaking achievement at the time. The 802.11b technology utilized Direct Sequence Spread Spectrum (DSSS) modulation, which allowed multiple data streams to coexist with minimal interference. This was crucial in environments with numerous wireless devices.

Security was another important consideration, and 802.11b incorporated Wired Equivalent Privacy (WEP) for data protection. WEP attempted to secure wireless transmissions by encrypting data packets, although it was later found to have vulnerabilities. Nevertheless, it was a starting point for securing wireless communication until more robust security protocols, such as WPA and WPA2, were developed.

The compatibility of 802.11b with earlier standards like 802.11 meant that devices could be mixed and matched, allowing for a smooth transition to wireless networks. With a typical range of around 100 to 300 feet, it was suitable for various environments, from homes to offices. In addition, the protocol facilitated peer-to-peer networking, allowing devices to communicate directly without the need for an access point.

In terms of hardware, 802.11b required compatible wireless network interface cards (NICs) and access points. These devices were increasingly integrated into laptops and desktops, leading to widespread adoption and the growing popularity of wireless networking in everyday life.

In conclusion, TROY Group 802.11b laid the groundwork for modern wireless communication. Its features, including data rates of up to 11 Mbps, DSSS modulation, and initial security measures like WEP, made it a pioneer in the industry. Although it has been succeeded by faster and more secure protocols, the legacy of 802.11b lives on as a crucial development in the evolution of wireless technology, setting the stage for the high-speed and secure connections that users enjoy today.