User Guide
2.4802GHz.11g Wireless-G
WIRELESS
Notebook Adapter
word definition
Copyright and Trademarks
This User Guide
Table of Contents
List of Figures
Figure 6-21 EAP-MD5 Authentication
adapter a device that adds network functionality to your PC
Chapter 1 Introduction
Welcome
What’s in this Guide?
This appendix supplies the Adapter’s regulatory information
Wireless-G Notebook Adapter
Appendix G Regulatory Information
Appendix H Contact Information
Network Topology
Chapter 2 Planning your Wireless Network
ssid your wireless networks name
Roaming
Network Layout
Wireless-G Notebook Adapter
Chapter 2 Planning your Wireless Network
Network Layout
Wireless-G Notebook Adapter
Chapter 3 Getting to Know the Wireless-G Notebook Adapter
Power
Chapter 3 Getting to Know the Wireless-G Notebook Adapter
Chapter 4 Software Installation and Configuration
software instructions for the computer
The Installation Procedure
Figure 4-4 The Setup Wizard’s Ad-Hoc Mode Screen
bit a binary digit
WPA-PSK
Wireless-G Notebook Adapter
Proceed to “Chapter 5 Hardware Installation.”
Figure 4-8 The Setup Wizard’s Congratulations Screen
Chapter 4 Software Installation and Configuration
Chapter 5 Hardware Installation
Connecting the Adapter
Link Information
Chapter 6 Using the Wireless Network Monitor
Accessing the Wireless Network Monitor
Internet traffic from your local area network
Wireless Network Status
encryption encoding data transmitted in a network
Wireless Network Statistics
byte a unit of data that is usually eight bits long
Site Survey
Site Information
Profiles
Profile Information
Creating a New Profile
Wireless-G Notebook Adapter
Chapter 6 Using the Wireless Network Monitor
1. On the Profiles screen, click New to create a new profile
Click Next to continue or Back to return to the previous screen
IP Address - This IP Address must be unique to your network
Page
Chapter 6 Using the Wireless Network Monitor
Figure 6-15 WPA-PSK Settings Figure 6-16 TKIP Settings
Wireless-G Notebook Adapter
WPA-PSK
WPA RADIUS features WPA used in coordination with a RADIUS server. This should only be used when a RADIUS server is connected to the Router. WPA Radius offers the TKIP encryption method with dynamic encryption keys. It offers five authentication methods EAP-TLS, EAP-TTLS, EAP-MD5, EAP-PEAP, and LEAP
EAP-TLS
RADIUS
EAP-MD5
You have successfully created a connection profile
1. My computer does not recognize the Wireless-G Notebook Adapter
Appendix A Troubleshooting
Common Problems and Solutions
2. The Wireless-G Notebook Adapter does not work properly
What is the 802.11g standard?
Can I play computer games with other members of the wireless network?
What is the 802.11b standard?
What 802.11b features are supported?
What is roaming?
What is ad-hoc mode?
What is infrastructure mode?
What is ISM band?
Would the information be intercepted while transmitting on air?
What is DSSS? What is FHSS? And what are their differences?
What is WEP?
Security Threats Facing Wireless Networks
Appendix B Wireless Security
Security Precautions
1. Disable Broadcast 2. Make it unique 3. Change it often
WPA-PSK. If you do not have a RADIUS server, Select the type of algorithm, TKIP or AES, and enter a password in the Passphrase field of 8-63 characters
Shared Resources
Appendix C Windows Help
TCP/IP
Network Neighborhood/My Network Places
Appendix D Glossary
Domain - A specific name for a network of computers
Packet - A unit of data sent over a network
Subnet Mask - An address code that determines the size of the network
Appendix E Specifications
802.11b CCK 11 Mbps, DQPSK 2 Mbps, DBPSK 1 Mbps 802.11g OFDM
Appendix F Warranty Information
Appendix G Regulatory Information
EC DECLARATION OF CONFORMITY EUROPE
SAFETY NOTICES
Appendix H Contact Information