Linksys WMP54GR manual What is ad-hoc mode?, What is infrastructure mode?, What is roaming?

Page 38

Wireless-G PCI Adapter with RangeBooster

What is ad-hoc mode?

When a wireless network is set to ad-hoc mode, the wireless-equipped computers are configured to communicate directly with each other. The ad-hoc wireless network will not communicate with any wired network.

What is infrastructure mode?

When a wireless network is set to infrastructure mode, the wireless network is configured to communicate with a wired network through a wireless access point.

What is roaming?

Roaming is the ability of a portable computer user to communicate continuously while moving freely throughout an area greater than that covered by a single access point. Before using the roaming function, the workstation must make sure that it is the same channel number with the access point of dedicated coverage area.

To achieve true seamless connectivity, the wireless LAN must incorporate a number of different functions. Each node and access point, for example, must always acknowledge receipt of each message. Each node must maintain contact with the wireless network even when not actually transmitting data. Achieving these functions simultaneously requires a dynamic RF networking technology that links access points and nodes. In such a system, the user’s end node undertakes a search for the best possible access to the system. First, it evaluates such factors as signal strength and quality, as well as the message load currently being carried by each access point and the distance of each access point to the wired backbone. Based on that information, the node next selects the right access point and registers its address. Communications between end node and host computer can then be transmitted up and down the backbone.

As the user moves on, the end node’s RF transmitter regularly checks the system to determine whether it is in touch with the original access point or whether it should seek a new one. When a node no longer receives acknowledgment from its original access point, it undertakes a new search. Upon finding a new access point, it then re-registers, and the communication process continues.

What is ISM band?

The FCC and their counterparts outside of the U.S. have set aside bandwidth for unlicensed use in the ISM (Industrial, Scientific and Medical) band. Spectrum in the vicinity of 2.4 GHz, in particular, is being made available worldwide. This presents a truly revolutionary opportunity to place convenient high-speed wireless capabilities in the hands of users around the globe.

What is Spread Spectrum?

Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communications systems. It is designed to trade off bandwidth efficiency for

Appendix A: Troubleshooting

32

Frequently Asked Questions

Image 38
Contents Wireless- G Word definition How to Use This User GuideCopyright and Trademarks Table of Contents Setup Wizard’s Welcome Screen Setup Wizard’s License Agreement10 Import a Profile Adapter a device that adds network functionality to your PC IntroductionWelcome What’s in this Guide? Wireless-G PCI Adapter with RangeBooster Roaming Planning your Wireless NetworkNetwork Topology Topology the physical layout of a networkNetwork Layout Starting the Setup Setup Wizard’s License AgreementConnecting the Adapter Setting up the AdapterWEP Key Needed for Connection Encryption encoding data transmitted in a networkCongratulations Manual Setup 10 Network SettingsWEP WPA Personal PSK2WPA Enterprise EAP-TLSRadius 19 Confirm New Settings Wireless Network Status screen Using the Wireless Network MonitorAccessing the Wireless Network Monitor Link InformationWireless Network Status Wireless Network Statistics More Information-Network StatisticsSite Survey Site InformationWPA-Personal Needed for Connection Profiles Profile InformationCreate a New Profile 12 Create a New ProfileWPA Personal Needed for Connection 13 Available Wireless Network Which can be used in conjunction with a Radius server Wpa wi-fi protected access a wireless security protocolUsing Tkip Temporal Key Integrity Protocol encryption 17 Wireless Security WEP 19 Wireless Security PSK2 EAP-TLS 22 Wireless Security Radius Using EAP-TLS 25 Congratulations Appendix a Troubleshooting Common Problems and SolutionsWhat is the Ieee 802.11g standard? Frequently Asked QuestionsWhat is the Ieee 802.11b standard? What Ieee 802.11b features are supported?What is roaming? What is ad-hoc mode?What is infrastructure mode? What is ISM band?What is WPA? What is DSSS? What is FHSS? And what are their differences?What is WEP? What is RADIUS?Appendix B Using Windows XP Wireless Configuration Select Use Linksys Wireless Network MonitorFigure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security Security Threats Facing Wireless Networks Appendix C Wireless SecuritySecurity Precautions Appendix C Wireless Security Wireless-G PCI Adapter with RangeBooster Network Neighborhood/My Network Places Appendix D Windows HelpShared Resources Appendix E Glossary Wireless-G PCI Adapter with RangeBooster Wireless-G PCI Adapter with RangeBooster 802.11g Ofdm Appendix F SpecificationsProtocols Storage Humidity Storage TempOperating Humidity Appendix G Warranty Information Limited WarrantyAppendix H Regulatory Information FCC StatementWireless-G PCI Adapter with Range Booster Wireless-G PCI Adapter with Range Booster Wireless-G PCI Adapter with Range Booster Wireless-G PCI Adapter with Range Booster Wireless-G PCI Adapter with Range Booster Appendix I Contact Information