Windows Media DRM
A
•Windows Vista and the Windows logo are trademarks of the Microsoft group of companies.
•The PlaysForSure logo, Windows Media and the Windows logo are trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries.
•Content providers are using the digital rights management technology for Windows Media contained in this device
About Wireless LAN
This is one wireless LAN standard set by the 802 working group that establishes LAN technology standards at the IEEE (Institute of Electrical and Electronics Engineers) of the United States. It uses the
2.4GHz band usable freely without a radio frequency license (ISM band), enabling communications at a maximum speed of 11 Mbps.
The value indicated above is the maximum theoretical value for the wireless LAN standard, and does not indicate the actual data transfer rate.
This is another wireless LAN standard set by the 802 working group that establishes LAN technology standards at the IEEE (Institute of Electrical and Electronics Engineers) of the United States, and is compatible with IEEE 802.11b. It also uses the 2.4 GHz band, but enables communications at a maximum speed of 54 Mbps.
The value indicated above is the maximum theoretical value for the wireless LAN standard, and does not indicate the actual data transfer rate.
Infrastructure Communications“Infrastructure Communications” refers to networks using wireless LAN access points.
This function can be used to connect to the Internet or a wired LAN via a wireless LAN access point. Wireless LAN access points include wireless broadband routers.
Signaltransferthroughwirelessinterconnectionofcomputersisreferred to as “ad hoc communications”. With such ad hoc communications there is no connection to the Internet. Ad hoc communications are suited for establishing simple temporary networks.
Network Names (SSID: Security Set Identifier)When forming wireless LAN networks, groups are formed to prevent interference, data theft, etc. This grouping is done by “SSID” or “Security Set Identifiers”. For further security, a WEP key is set and signal transfer is not possible unless the SSID and WEP key match.
WEP Key (Network Key)This is key information used for encrypting data when conducting data transfer. On the
ENGLISH
WPA |
|
| Getting |
| |||
This is a security standard established by the |
| ||
|
| ||
to the conventional SSID (network name) and WEP key (network key), |
| Started | |
it also uses a user identification function and encrypting protocol for |
| ||
stronger security. |
| ||
WPA2 |
|
| Connections |
This is a new version of the WPA established by the |
|
| |
compatible with more secure AES encryption. |
|
| |
|
| Setup | |
This is a simple authentication system for mutual authentication when |
| ||
|
| ||
a preset character string matches on the wireless LAN access point |
| Playback | |
and client. |
| ||
|
| ||
Passphrase |
|
| Remote |
This refers to the code key used |
| ||
a WPA authentication method. |
| ||
TKIP (Temporal Key Integrity Protocol) |
|
| Control |
|
| ||
This is a network key used for WPA. The encryption algorithm is RC4, |
|
| |
| Information | ||
the same as for WEP, but the security level is increased by changing |
| ||
|
| ||
the network key used for encryption for each packet. |
|
| |
AES (Advanced Encryption Standard) |
|
|
|
This is a next generation standard encryption method replacing the |
| Troubleshooting | |
|
| ||
current DES and 3DES, and because of its high security it is expected to |
|
| |
be applied widely to wireless LANs in the future. It uses the “Rijndael” |
|
| |
algorithm developed by two Belgian cryptographers to divide the data |
|
| |
into blocks of fixed lengths and encrypt each block. It supports data |
|
| |
lengths of 128, 192 and 256 bits and key lengths of 128, 192 and 256 |
|
| |
|
| ||
bits as well, offering extremely high encryption security. |
|
|
45