Wireless Mode

Ad-Hoc (sometimes referred to as Peer-to-Peer, Computer-to-Computer, 802.11 Ad-Hoc, or IBSS compliant Ad-Hoc) modes are used when your wire- less enabled PC is printing straight to the printer.

Infrastructure mode is used when you have an Access point or base station as the hub of your wireless network.

Pseudo Ad-Hoc is only used for testing and some older 802.11b implementa- tions of Ad-Hoc. Auto mode attempts connection with each of the other methods in turn.

Note: If the options on your 802.11b enabled computer are Ad-Hoc, 802.11b Ad- Hoc, and Infrastructure, use the following to determine the settings of the print server:

Computer

Print Server

Ad-Hoc

Pseudo Ad-Hoc

802.11 Ad-Hoc

Ad-Hoc (802.11)

Infrastructure

Infrastructure

WEP Key

Disabled. The other Options are 64Bit WEP Key Size and 128Bit WEP Key Size. Be careful -- if one part of the wireless network has WEP enabled, they all must have it enabled with the same key or they cannot communicate.

WEP Key Index

This is which WEP key you want to use out of the 4 entered in the 128 / 64 WEP Key field.

128 Bit / 64 Bit WEP Key

This is the 64 or 128 bit WEP key that must match other nodes’ encryption keys in order to communicate: 10 characters for 64 bit, or 26 characters for 128 bit. The EtherWind uses a Hexadecimal value for WEP. All 802.11b devices have a way of translating their WEP or Security values to 10 (for 40-bit or 64-bit WEP) or 26 (for 128-bit WEP) digit HEX values. Ask the manufacturer of your wireless product how this is done for your PC and/or Access Point.

Loading the Firmware

1.Run the XAdmin32 utility from the Start menu, it should be found under

START>Programs>TROY Group>EtherWind>XAdmin32

11-5

Page 51
Image 51
TROY Group 802.11b manual Loading the Firmware, Wireless Mode

802.11b specifications

TROY Group 802.11b is a significant advancement in wireless networking technology, introduced in the late 1990s. Operating within the 2.4 GHz frequency band, 802.11b provided users with robust connectivity and established a foundation for future wireless standards. This protocol marked a transition from wired networking to wireless, enabling greater mobility and flexibility for users.

One of the main features of the 802.11b standard is its data transmission rate, which supports speeds of up to 11 Mbps. While this may seem modest by today’s standards, it was a groundbreaking achievement at the time. The 802.11b technology utilized Direct Sequence Spread Spectrum (DSSS) modulation, which allowed multiple data streams to coexist with minimal interference. This was crucial in environments with numerous wireless devices.

Security was another important consideration, and 802.11b incorporated Wired Equivalent Privacy (WEP) for data protection. WEP attempted to secure wireless transmissions by encrypting data packets, although it was later found to have vulnerabilities. Nevertheless, it was a starting point for securing wireless communication until more robust security protocols, such as WPA and WPA2, were developed.

The compatibility of 802.11b with earlier standards like 802.11 meant that devices could be mixed and matched, allowing for a smooth transition to wireless networks. With a typical range of around 100 to 300 feet, it was suitable for various environments, from homes to offices. In addition, the protocol facilitated peer-to-peer networking, allowing devices to communicate directly without the need for an access point.

In terms of hardware, 802.11b required compatible wireless network interface cards (NICs) and access points. These devices were increasingly integrated into laptops and desktops, leading to widespread adoption and the growing popularity of wireless networking in everyday life.

In conclusion, TROY Group 802.11b laid the groundwork for modern wireless communication. Its features, including data rates of up to 11 Mbps, DSSS modulation, and initial security measures like WEP, made it a pioneer in the industry. Although it has been succeeded by faster and more secure protocols, the legacy of 802.11b lives on as a crucial development in the evolution of wireless technology, setting the stage for the high-speed and secure connections that users enjoy today.