2.4802GHz.11g Wireless-G
WIRELESS
User Guide
Notebook Adapter
This User Guide
Copyright and Trademarks
word definition
Table of Contents
List of Figures
Figure 6-21 EAP-MD5 Authentication
Welcome
Chapter 1 Introduction
adapter a device that adds network functionality to your PC
What’s in this Guide?
Wireless-G Notebook Adapter
Appendix G Regulatory Information
This appendix supplies the Adapter’s regulatory information
Appendix H Contact Information
Chapter 2 Planning your Wireless Network
ssid your wireless networks name
Network Topology
Roaming
Wireless-G Notebook Adapter
Chapter 2 Planning your Wireless Network
Network Layout
Network Layout
Chapter 3 Getting to Know the Wireless-G Notebook Adapter
Power
Wireless-G Notebook Adapter
Chapter 3 Getting to Know the Wireless-G Notebook Adapter
Chapter 4 Software Installation and Configuration
software instructions for the computer
The Installation Procedure
Figure 4-4 The Setup Wizard’s Ad-Hoc Mode Screen
bit a binary digit
WPA-PSK
Proceed to “Chapter 5 Hardware Installation.”
Figure 4-8 The Setup Wizard’s Congratulations Screen
Wireless-G Notebook Adapter
Chapter 4 Software Installation and Configuration
Chapter 5 Hardware Installation
Connecting the Adapter
Accessing the Wireless Network Monitor
Chapter 6 Using the Wireless Network Monitor
Link Information
encryption encoding data transmitted in a network
Wireless Network Status
Internet traffic from your local area network
Wireless Network Statistics
byte a unit of data that is usually eight bits long
Site Survey
Site Information
Profiles
Profile Information
Wireless-G Notebook Adapter
Chapter 6 Using the Wireless Network Monitor
Creating a New Profile
1. On the Profiles screen, click New to create a new profile
Click Next to continue or Back to return to the previous screen
IP Address - This IP Address must be unique to your network
Page
Figure 6-15 WPA-PSK Settings Figure 6-16 TKIP Settings
Wireless-G Notebook Adapter
Chapter 6 Using the Wireless Network Monitor
WPA-PSK
WPA RADIUS features WPA used in coordination with a RADIUS server. This should only be used when a RADIUS server is connected to the Router. WPA Radius offers the TKIP encryption method with dynamic encryption keys. It offers five authentication methods EAP-TLS, EAP-TTLS, EAP-MD5, EAP-PEAP, and LEAP
EAP-TLS
RADIUS
EAP-MD5
You have successfully created a connection profile
Appendix A Troubleshooting
Common Problems and Solutions
1. My computer does not recognize the Wireless-G Notebook Adapter
2. The Wireless-G Notebook Adapter does not work properly
Can I play computer games with other members of the wireless network?
What is the 802.11b standard?
What is the 802.11g standard?
What 802.11b features are supported?
What is ad-hoc mode?
What is infrastructure mode?
What is roaming?
What is ISM band?
What is WEP?
What is DSSS? What is FHSS? And what are their differences?
Would the information be intercepted while transmitting on air?
Security Precautions
Appendix B Wireless Security
Security Threats Facing Wireless Networks
1. Disable Broadcast 2. Make it unique 3. Change it often
WPA-PSK. If you do not have a RADIUS server, Select the type of algorithm, TKIP or AES, and enter a password in the Passphrase field of 8-63 characters
Appendix C Windows Help
TCP/IP
Shared Resources
Network Neighborhood/My Network Places
Appendix D Glossary
Domain - A specific name for a network of computers
Packet - A unit of data sent over a network
Subnet Mask - An address code that determines the size of the network
Appendix E Specifications
802.11b CCK 11 Mbps, DQPSK 2 Mbps, DBPSK 1 Mbps 802.11g OFDM
Appendix F Warranty Information
Appendix G Regulatory Information
EC DECLARATION OF CONFORMITY EUROPE
SAFETY NOTICES
Appendix H Contact Information