Linksys Network Router specifications What is Ad-hoc?, What is Infrastructure?, What is Roaming?

Page 24

Wireless-G Range Expander

•Multi-Channel Roaming •Automatic Rate Selection •RTS/CTS feature •Fragmentation •Power Management

What is Ad-hoc?

An Ad-hoc wireless network is a group of computers, each with a wireless adapter, connected as an independent wireless network. An Ad-hoc wireless network is applicable at a departmental scale for a branch or SOHO operation.

What is Infrastructure?

An integrated wireless and wired network is called an Infrastructure configuration. Infrastructure is applicable to enterprise scale for wireless access to a central database, or wireless application for mobile workers.

What is Roaming?

Roaming is the ability of a portable computer user to communicate continuously while moving freely throughout an area greater than that covered by a single access point. Before using the roaming function, the workstation must make sure that it is the same channel number as the network within the coverage area.

To achieve true seamless connectivity, the wireless network must incorporate a number of different functions. Each node, for example, must always acknowledge receipt of each message. Each node must maintain contact with the wireless network even when not actually transmitting data. Achieving these functions simultaneously requires a dynamic RF networking technology that links nodes. In such a system, the user’s end node undertakes a search for the best possible access to the system. First, it evaluates such factors as signal strength and quality, as well as the message load currently being carried in the network. Based on that information, the node next selects the right access point and registers its address. Communications between end node and host computer can then be transmitted up and down the backbone.

As the user moves on, the end node’s RF transmitter regularly checks the system to determine whether it is in touch with the original access point or whether it should seek a new one. When a node no longer receives acknowledgment from its original access point, it undertakes a new search. Upon finding a new access point, it then re-registers, and the communication process continues.

What is ISM band?

The FCC and their counterparts outside of the U.S. have set aside bandwidth for unlicensed use in the ISM (Industrial, Scientific and Medical) band. Spectrum in the vicinity of 2.4 GHz, in particular, is being made available worldwide. This presents a truly revolutionary opportunity to place convenient high speed wireless capabilities in the hands of users around the globe.

Appendix A: Troubleshooting

21

Frequently Asked Questions

Image 24
Contents How to Use this Guide Copyright and Trademarksword definition Table of Contents List of Figures Chapter 1 Introduction Welcomerouter - a networking device that connects multiple networks together adapter - a device that adds network functionality to your PCWhat’s in this Guide? Appendix F Warranty Information This appendix supplies the Range Expander’s warranty informationAppendix G Regulatory Information This appendix supplies the Range Expander’s regulatory informationChapter 2 Planning your Wireless Network SSID your wireless networks nameNetwork Topology RoamingNetwork Layout Chapter 3 Getting to Know the Wireless-G Range Expander Powerwhen there is network activity no network with which to connect, this light will appear redThe Power Plate Figure 3-3 The Two Prong Power Plate Figure 3-2 The Power Platewith Cord Chapter 4 Connecting the Wireless-G Range Expander tcp/ip a set of instructions PCs use to communicate over a networkWall Mounting Chapter 5 Setting Up the Wireless-G Range Expander Figure 5-2 Connecting to an access point Click the Next button to continue or Exit to exit the Setup Wizard bit - a binary digit Figure 5-11 The Confirm New Settings screen Chapter 6 Configuring the Wireless-G Range Expander OverviewThe Setup Tab Basic Setupfirmware the programming code that runs a networking device subnet mask an address code that determines the size of the networkFigure 6-3 WEP Security screen encryption encoding data transmitted in a networksoftware instructions for the computer Password download to receive a file transmitted over a networkupgrade to replace existing software or firmware with a newer version HelpAppendix A Troubleshooting Common Problems and SolutionsFrequently Asked Questions What IEEE 802.11b features are supported?What is Ad-hoc? What is Infrastructure?What is Roaming? What is ISM band?What is Spread Spectrum? What is DSSS? What is FHSS? And what are their differences?Can Linksys Wireless products support file and printer sharing? What is WEP?How do I reset the Range Expander? How do I resolve issues with signal loss?How do I avoid interference? Appendix B Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks SSID. There are several things to keep in mind about the SSID WPA Pre-Shared Key. If you do not have a RADIUS server, select the type of algorithm, TKIP or AES, enter a password in the Pre-Shared key field of 8-64 characters, and enter a Group Key Renewal period time between 0 and 99,999 seconds, which instructs the Router or other device how often it should change the encryption keys Appendix C Upgrading Firmware Appendix D Windows Help TCP/IPShared Resources Network Neighborhood/My Network PlacesAppendix E Glossary Encryption - Encoding data transmitted in a network Router - A networking device that connects multiple networks together Appendix F Specifications Appendix G Warranty Information Appendix H Regulatory Information EN 609 50 Safety An FCC compliant telephone cord and modular plug is provided with this equipment. This equipment is designed to be connected to the telephone network or premises wiring using a compatible modular jack, which is FCC Part 68 compliant. Connection to the telephone network should be made by using the standard modular telephone jack Wireless-G Range Expander Appendix I Contact Information 2.4 802 GHz .11g Wireless- G WIRELESSUser Guide Range Expander