this option, select Ad-hoc Computer-to-Computer, or whatever mode your adapter uses to communicate on a wireless network without an access point.

If you are using WEP (Wired Equivalent Privacy) encryption on your wireless network, you will need to temporarily disable WEP on your PC in order to configure the print server. If you are using an access point with WEP enabled and it does not allow non- wep clients to communicate with other non-wep clients, then you will also need to temporarily change the wireless mode of your computer to Ad-hoc (802.11) mode.

Note:

If no computers on your network can be set to Ad-hoc mode, you will need to temporarily disable WEP on your access point. When you are done con- figuring the print server, you can re-enable WEP on your computer and change the wireless mode back if necessary.

If you are using TCP/IP, note your computer’s IP address. The print server will need to be on the same IP segment as the other nodes on your network in order to communi- cate.

If you are using infrastructure mode, make sure you have a good signal between your computer and the access point. Most wireless adapters have a utility that shows the wireless signal strength. See your wireless adapter’s documentation for details.

If you are using a Macintosh with an Airport® base station or non-Apple access point:

If your Macintosh has an Airport wireless card installed, make sure that AirPort is enabled in the AppleTalk and TCP/IP Control Panels. If both your Macintosh and the AirPort base station or access point are connected to an existing Ethernet net- work, select Ethernet in the AppleTalk and TCP/IP Control Panel.

To use the printer in infrastructure mode, use the Airport application to select the Airport Network name that corresponds to the base station or access point from the AirPort Networks list.

To use the printer in computer-to-computer (Ad-hoc) mode, use the Airport appli- cation to create or join a computer-to-computer network. See your AirPort docu- mentation for details.

If you are using password protection, you will need to temporarily create a comput- er-to-computer network with no password protection to configure the print server, then re-join the network with the password protection.

In order to make the Apple Airport password protection compatible with the 64-bit WEP (Wired Equivalent Privacy) on the EtherWind, you will need to use 0x fol- lowed by the 10 digit WEP key.

If you are using a home gateway or router, you will want to configure the EtherWind from a PC on the same network segment that you want the EtherWind to be on.

2-2

Page 16
Image 16
TROY Group 802.11b manual

802.11b specifications

TROY Group 802.11b is a significant advancement in wireless networking technology, introduced in the late 1990s. Operating within the 2.4 GHz frequency band, 802.11b provided users with robust connectivity and established a foundation for future wireless standards. This protocol marked a transition from wired networking to wireless, enabling greater mobility and flexibility for users.

One of the main features of the 802.11b standard is its data transmission rate, which supports speeds of up to 11 Mbps. While this may seem modest by today’s standards, it was a groundbreaking achievement at the time. The 802.11b technology utilized Direct Sequence Spread Spectrum (DSSS) modulation, which allowed multiple data streams to coexist with minimal interference. This was crucial in environments with numerous wireless devices.

Security was another important consideration, and 802.11b incorporated Wired Equivalent Privacy (WEP) for data protection. WEP attempted to secure wireless transmissions by encrypting data packets, although it was later found to have vulnerabilities. Nevertheless, it was a starting point for securing wireless communication until more robust security protocols, such as WPA and WPA2, were developed.

The compatibility of 802.11b with earlier standards like 802.11 meant that devices could be mixed and matched, allowing for a smooth transition to wireless networks. With a typical range of around 100 to 300 feet, it was suitable for various environments, from homes to offices. In addition, the protocol facilitated peer-to-peer networking, allowing devices to communicate directly without the need for an access point.

In terms of hardware, 802.11b required compatible wireless network interface cards (NICs) and access points. These devices were increasingly integrated into laptops and desktops, leading to widespread adoption and the growing popularity of wireless networking in everyday life.

In conclusion, TROY Group 802.11b laid the groundwork for modern wireless communication. Its features, including data rates of up to 11 Mbps, DSSS modulation, and initial security measures like WEP, made it a pioneer in the industry. Although it has been succeeded by faster and more secure protocols, the legacy of 802.11b lives on as a crucial development in the evolution of wireless technology, setting the stage for the high-speed and secure connections that users enjoy today.