Linksys Network Router What is Spread Spectrum?, What is WEP?, What is a MAC Address?

Page 25

Wireless-G Range Expander

What is Spread Spectrum?

Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communications systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband transmission, but the trade-off produces a signal that is, in effect, louder and thus easier to detect, provided that the receiver knows the parameters of the spread-spectrum signal being broadcast. If a receiver is not tuned to the right frequency, a spread-spectrum signal looks like background noise. There are two main alternatives, Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS).

What is DSSS? What is FHSS? And what are their differences?

Frequency Hopping Spread Spectrum (FHSS) uses a narrowband carrier that changes frequency in a pattern that is known to both transmitter and receiver. Properly synchronized, the net effect is to maintain a single logical channel. To an unintended receiver, FHSS appears to be short-duration impulse noise. Direct Sequence Spread Spectrum (DSSS) generates a redundant bit pattern for each bit to be transmitted. This bit pattern is called a chip (or chipping code). The longer the chip, the greater the probability that the original data can be recovered. Even if one or more bits in the chip are damaged during transmission, statistical techniques embedded in the radio can recover the original data without the need for retransmission. To an unintended receiver, DSSS appears as low power wideband noise and is rejected (ignored) by most narrowband receivers.

Would the information be intercepted while transmitting on air?

Wireless networks feature two-fold protection. On the hardware side, as with Direct Sequence Spread Spectrum technology, it has the inherent security feature of scrambling. On the software side, the wireless series offers the encryption function (WEP) to enhance security and access control. Users can set it up depending upon their needs.

Can Linksys Wireless products support file and printer sharing?

Linksys Wireless products can work with Netware, Windows NT/2000, or other operating systems to support printer or file sharing.

What is WEP?

WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40-bit shared-key algorithm, as described in the IEEE 802.11 standard.

What is a MAC Address?

The Media Access Control (MAC) address is a unique number assigned by the manufacturer to any networking device, such as a network adapter, that allows the network to identify it at the hardware level. For all practical purposes, this number is usually permanent. Unlike IP addresses, which can change every time a computer logs on to the network, the MAC address of a device stays the same, making it a valuable identifier for the network.

Appendix A: Troubleshooting

22

Frequently Asked Questions

Image 25
Contents Copyright and Trademarks How to Use this Guideword definition Table of Contents List of Figures Welcome Chapter 1 Introductionrouter - a networking device that connects multiple networks together adapter - a device that adds network functionality to your PCWhat’s in this Guide? This appendix supplies the Range Expander’s warranty information Appendix F Warranty InformationAppendix G Regulatory Information This appendix supplies the Range Expander’s regulatory informationSSID your wireless networks name Chapter 2 Planning your Wireless NetworkNetwork Topology RoamingNetwork Layout Power Chapter 3 Getting to Know the Wireless-G Range Expanderwhen there is network activity no network with which to connect, this light will appear redFigure 3-3 The Two Prong Power Plate Figure 3-2 The Power Plate The Power Platewith Cord tcp/ip a set of instructions PCs use to communicate over a network Chapter 4 Connecting the Wireless-G Range ExpanderWall Mounting Chapter 5 Setting Up the Wireless-G Range Expander Figure 5-2 Connecting to an access point Click the Next button to continue or Exit to exit the Setup Wizard bit - a binary digit Figure 5-11 The Confirm New Settings screen Overview Chapter 6 Configuring the Wireless-G Range ExpanderBasic Setup The Setup Tabfirmware the programming code that runs a networking device subnet mask an address code that determines the size of the networkencryption encoding data transmitted in a network Figure 6-3 WEP Security screensoftware instructions for the computer download to receive a file transmitted over a network PasswordHelp upgrade to replace existing software or firmware with a newer versionCommon Problems and Solutions Appendix A TroubleshootingFrequently Asked Questions What IEEE 802.11b features are supported?What is Infrastructure? What is Ad-hoc?What is Roaming? What is ISM band?What is DSSS? What is FHSS? And what are their differences? What is Spread Spectrum?Can Linksys Wireless products support file and printer sharing? What is WEP?How do I resolve issues with signal loss? How do I reset the Range Expander?How do I avoid interference? Security Precautions Appendix B Wireless SecuritySecurity Threats Facing Wireless Networks SSID. There are several things to keep in mind about the SSID WPA Pre-Shared Key. If you do not have a RADIUS server, select the type of algorithm, TKIP or AES, enter a password in the Pre-Shared key field of 8-64 characters, and enter a Group Key Renewal period time between 0 and 99,999 seconds, which instructs the Router or other device how often it should change the encryption keys Appendix C Upgrading Firmware TCP/IP Appendix D Windows HelpShared Resources Network Neighborhood/My Network PlacesAppendix E Glossary Encryption - Encoding data transmitted in a network Router - A networking device that connects multiple networks together Appendix F Specifications Appendix G Warranty Information Appendix H Regulatory Information EN 609 50 Safety An FCC compliant telephone cord and modular plug is provided with this equipment. This equipment is designed to be connected to the telephone network or premises wiring using a compatible modular jack, which is FCC Part 68 compliant. Connection to the telephone network should be made by using the standard modular telephone jack Appendix H Regulatory Information Appendix I Contact Information WIRELESS 2.4 802 GHz .11g Wireless- GUser Guide Range Expander