TROY Group 802.11b manual

Page 19

If your network uses WEP encryption, you will need to enable WEP and enter the appropriate WEP key(s). Contact your system manager to deter- mine what information .

If you are using TCP/IP (recommended for Windows printing) and you do not have a DHCP server (see note below), you will need to manually assign a valid IP Address, Subnet Mask, and Gateway and then set the Boot Method to Static.

If you are using a Macintosh, no further configuration should be necessary. When you are done configuring, click OK.

For a Glossary of Terms used for all the settings in WP-Admin, see chapter 11.

Note:

If you are using DHCP on your network, the EtherWind may have acquired valid IP settings at this point and no further configuration is necessary. This might work well if your DHCP server allows the print server to keep this address permanently, but in most cases, you will want to use a static address outside the range reserved for DHCP (See your DHCP server docu- mentation for details). This is because when you configure your printer port, it will go to a static IP address.

Your Print Server should be configured correctly at this point. Configuring the EtherWind to print under various operating systems is covered in chapters 4 through 9.

2-5

Image 19
Contents User’s Guide Copyright Notice Contents Where to Get Help TroubleshootingIntroduction Ad-Hoc ModeOperating Systems Supported System RequirementsNetwork Protocols Supported IPX/SPX Page Before You Begin Installing EtherWind Print Server HardwareUnpacking the Print Server EtherWind Connectors, Switches, and LEDs Verifying Successful Installation Connecting to a PrinterVerifying the Connection to the Printer DB9 DTE DCE Connecting the EtherWind to an RS-232 Serial DeviceSET Port S1 Console Enabled Page EtherWind 802.11b ConfiguringIP Settings Configuring the EtherWindPage Installing the Software Page Page Page STARTProgramsTROY GroupEtherWindXAdmin32 STARTProgramsTROY GroupEtherWindWP-AdminManagement Methods Telnet DEC NCP DEC NCL EtherWind ConsoleMicrosoft Windows Network ConfigurationPage Page Additional Windows Configuration Methods AppleTalk Network ConfigurationConfiguring the Macintosh Setting Up Printing MacOS 8.xDirectory Services Setting Up Printing MacOSNetWare Network This section covers installation using the Novell clientPage Print Server Name window Select Print Services Quick Setup from the Tools menuPage Unix Network Berkeley Unix Host Configuration192.189.207.33xcdprinter LaserPrinter\ Lp=\ Sun Solaris ConfigurationMkdir /usr/spool/lpd/LaserPrinter Check the box next to Remote Printer is on BSD System HP/UX ConfigurationSelect Add Access to Remote Printer Lp -dLaserJet filenameName of queue to add user selectable Activate the queue Yes Configuration on Other SystemsDEC LAT Network VMS LAT Host Configuration$SET Term LTAxx/PASSTHRU/PASSALL PRINT/QUEUE=queuename filename @filenameFile Server Queue Configuration File Server User ConfigurationBanyan Vines Print Server Configuration Installing the Software on a Windows PC at the Local Site Printing ConfigurationPrintraNet Internet 10-2 Adding a Second PrintraNet Destination Configuring the Remote Troy Print Server Printing to the Remote Troy Print Server 192.189.207.222mail.troy.com Troubleshooting Printing Problems Troubleshooting and MaintenanceTroubleshooting Wireless Configuration Problems Troubleshooting Network Configuration Server Name Wireless Server Configuration Screen FieldsSsid Loading the Firmware Wireless Mode11-6 11-7 Double-ClickAdd/Remove Programs Uninstalling the EtherWind Wireless SoftwareChange/Remove Worldwide Web Support Where to Get HelpContacting Troy Returning Products WarrantyFCC Compliance Statement For United States Users Declaration of Conformity For European UsersRegulatory Information Canada IC notice

802.11b specifications

TROY Group 802.11b is a significant advancement in wireless networking technology, introduced in the late 1990s. Operating within the 2.4 GHz frequency band, 802.11b provided users with robust connectivity and established a foundation for future wireless standards. This protocol marked a transition from wired networking to wireless, enabling greater mobility and flexibility for users.

One of the main features of the 802.11b standard is its data transmission rate, which supports speeds of up to 11 Mbps. While this may seem modest by today’s standards, it was a groundbreaking achievement at the time. The 802.11b technology utilized Direct Sequence Spread Spectrum (DSSS) modulation, which allowed multiple data streams to coexist with minimal interference. This was crucial in environments with numerous wireless devices.

Security was another important consideration, and 802.11b incorporated Wired Equivalent Privacy (WEP) for data protection. WEP attempted to secure wireless transmissions by encrypting data packets, although it was later found to have vulnerabilities. Nevertheless, it was a starting point for securing wireless communication until more robust security protocols, such as WPA and WPA2, were developed.

The compatibility of 802.11b with earlier standards like 802.11 meant that devices could be mixed and matched, allowing for a smooth transition to wireless networks. With a typical range of around 100 to 300 feet, it was suitable for various environments, from homes to offices. In addition, the protocol facilitated peer-to-peer networking, allowing devices to communicate directly without the need for an access point.

In terms of hardware, 802.11b required compatible wireless network interface cards (NICs) and access points. These devices were increasingly integrated into laptops and desktops, leading to widespread adoption and the growing popularity of wireless networking in everyday life.

In conclusion, TROY Group 802.11b laid the groundwork for modern wireless communication. Its features, including data rates of up to 11 Mbps, DSSS modulation, and initial security measures like WEP, made it a pioneer in the industry. Although it has been succeeded by faster and more secure protocols, the legacy of 802.11b lives on as a crucial development in the evolution of wireless technology, setting the stage for the high-speed and secure connections that users enjoy today.