WIRELESS
2.4802GHz.11g Wireless-G
User Guide
Notebook Adapter
Copyright and Trademarks
This User Guide
word definition
Table of Contents
List of Figures
Figure 6-21 EAP-MD5 Authentication
Chapter 1 Introduction
Welcome
adapter a device that adds network functionality to your PC
What’s in this Guide?
Appendix G Regulatory Information
Wireless-G Notebook Adapter
This appendix supplies the Adapter’s regulatory information
Appendix H Contact Information
ssid your wireless networks name
Chapter 2 Planning your Wireless Network
Network Topology
Roaming
Chapter 2 Planning your Wireless Network
Wireless-G Notebook Adapter
Network Layout
Network Layout
Power
Chapter 3 Getting to Know the Wireless-G Notebook Adapter
Wireless-G Notebook Adapter
Chapter 3 Getting to Know the Wireless-G Notebook Adapter
software instructions for the computer
Chapter 4 Software Installation and Configuration
The Installation Procedure
bit a binary digit
Figure 4-4 The Setup Wizard’s Ad-Hoc Mode Screen
WPA-PSK
Figure 4-8 The Setup Wizard’s Congratulations Screen
Proceed to “Chapter 5 Hardware Installation.”
Wireless-G Notebook Adapter
Chapter 4 Software Installation and Configuration
Connecting the Adapter
Chapter 5 Hardware Installation
Chapter 6 Using the Wireless Network Monitor
Accessing the Wireless Network Monitor
Link Information
Wireless Network Status
encryption encoding data transmitted in a network
Internet traffic from your local area network
byte a unit of data that is usually eight bits long
Wireless Network Statistics
Site Information
Site Survey
Profile Information
Profiles
Chapter 6 Using the Wireless Network Monitor
Wireless-G Notebook Adapter
Creating a New Profile
1. On the Profiles screen, click New to create a new profile
Click Next to continue or Back to return to the previous screen
IP Address - This IP Address must be unique to your network
Page
Wireless-G Notebook Adapter
Figure 6-15 WPA-PSK Settings Figure 6-16 TKIP Settings
Chapter 6 Using the Wireless Network Monitor
WPA-PSK
WPA RADIUS features WPA used in coordination with a RADIUS server. This should only be used when a RADIUS server is connected to the Router. WPA Radius offers the TKIP encryption method with dynamic encryption keys. It offers five authentication methods EAP-TLS, EAP-TTLS, EAP-MD5, EAP-PEAP, and LEAP
EAP-TLS
RADIUS
EAP-MD5
You have successfully created a connection profile
Common Problems and Solutions
Appendix A Troubleshooting
1. My computer does not recognize the Wireless-G Notebook Adapter
2. The Wireless-G Notebook Adapter does not work properly
What is the 802.11b standard?
Can I play computer games with other members of the wireless network?
What is the 802.11g standard?
What 802.11b features are supported?
What is infrastructure mode?
What is ad-hoc mode?
What is roaming?
What is ISM band?
What is DSSS? What is FHSS? And what are their differences?
What is WEP?
Would the information be intercepted while transmitting on air?
Appendix B Wireless Security
Security Precautions
Security Threats Facing Wireless Networks
1. Disable Broadcast 2. Make it unique 3. Change it often
WPA-PSK. If you do not have a RADIUS server, Select the type of algorithm, TKIP or AES, and enter a password in the Passphrase field of 8-63 characters
TCP/IP
Appendix C Windows Help
Shared Resources
Network Neighborhood/My Network Places
Appendix D Glossary
Domain - A specific name for a network of computers
Packet - A unit of data sent over a network
Subnet Mask - An address code that determines the size of the network
802.11b CCK 11 Mbps, DQPSK 2 Mbps, DBPSK 1 Mbps 802.11g OFDM
Appendix E Specifications
Appendix F Warranty Information
Appendix G Regulatory Information
EC DECLARATION OF CONFORMITY EUROPE
SAFETY NOTICES
Appendix H Contact Information