Notebook Adapter
2.4802GHz.11g Wireless-G
WIRELESS
User Guide
Copyright and Trademarks
This User Guide
word definition
Table of Contents
List of Figures
Figure 6-21 EAP-MD5 Authentication
Chapter 1 Introduction
Welcome
adapter a device that adds network functionality to your PC
What’s in this Guide?
Appendix H Contact Information
Wireless-G Notebook Adapter
Appendix G Regulatory Information
This appendix supplies the Adapter’s regulatory information
Roaming
Chapter 2 Planning your Wireless Network
ssid your wireless networks name
Network Topology
Network Layout
Wireless-G Notebook Adapter
Chapter 2 Planning your Wireless Network
Network Layout
Chapter 3 Getting to Know the Wireless-G Notebook Adapter
Chapter 3 Getting to Know the Wireless-G Notebook Adapter
Power
Wireless-G Notebook Adapter
software instructions for the computer
Chapter 4 Software Installation and Configuration
The Installation Procedure
bit a binary digit
Figure 4-4 The Setup Wizard’s Ad-Hoc Mode Screen
WPA-PSK
Chapter 4 Software Installation and Configuration
Proceed to “Chapter 5 Hardware Installation.”
Figure 4-8 The Setup Wizard’s Congratulations Screen
Wireless-G Notebook Adapter
Connecting the Adapter
Chapter 5 Hardware Installation
Chapter 6 Using the Wireless Network Monitor
Accessing the Wireless Network Monitor
Link Information
Wireless Network Status
encryption encoding data transmitted in a network
Internet traffic from your local area network
byte a unit of data that is usually eight bits long
Wireless Network Statistics
Site Information
Site Survey
Profile Information
Profiles
1. On the Profiles screen, click New to create a new profile
Wireless-G Notebook Adapter
Chapter 6 Using the Wireless Network Monitor
Creating a New Profile
Click Next to continue or Back to return to the previous screen
IP Address - This IP Address must be unique to your network
Page
WPA-PSK
Figure 6-15 WPA-PSK Settings Figure 6-16 TKIP Settings
Wireless-G Notebook Adapter
Chapter 6 Using the Wireless Network Monitor
WPA RADIUS features WPA used in coordination with a RADIUS server. This should only be used when a RADIUS server is connected to the Router. WPA Radius offers the TKIP encryption method with dynamic encryption keys. It offers five authentication methods EAP-TLS, EAP-TTLS, EAP-MD5, EAP-PEAP, and LEAP
EAP-TLS
RADIUS
EAP-MD5
You have successfully created a connection profile
2. The Wireless-G Notebook Adapter does not work properly
Appendix A Troubleshooting
Common Problems and Solutions
1. My computer does not recognize the Wireless-G Notebook Adapter
What 802.11b features are supported?
Can I play computer games with other members of the wireless network?
What is the 802.11b standard?
What is the 802.11g standard?
What is ISM band?
What is ad-hoc mode?
What is infrastructure mode?
What is roaming?
What is DSSS? What is FHSS? And what are their differences?
What is WEP?
Would the information be intercepted while transmitting on air?
Appendix B Wireless Security
Security Precautions
Security Threats Facing Wireless Networks
1. Disable Broadcast 2. Make it unique 3. Change it often
WPA-PSK. If you do not have a RADIUS server, Select the type of algorithm, TKIP or AES, and enter a password in the Passphrase field of 8-63 characters
Network Neighborhood/My Network Places
Appendix C Windows Help
TCP/IP
Shared Resources
Appendix D Glossary
Domain - A specific name for a network of computers
Packet - A unit of data sent over a network
Subnet Mask - An address code that determines the size of the network
802.11b CCK 11 Mbps, DQPSK 2 Mbps, DBPSK 1 Mbps 802.11g OFDM
Appendix E Specifications
Appendix F Warranty Information
Appendix G Regulatory Information
EC DECLARATION OF CONFORMITY EUROPE
SAFETY NOTICES
Appendix H Contact Information