background image

 

15 

 
 

8.  What is AES? 

AES (Advanced Encryption Standard), a chip-based security, has been developed to 
ensure the highest degree of security and authenticity for digital information, wherever 
and however communicated or stored, while making more efficient use of hardware 
and/or software than previous encryption standards. It is also included in IEEE 802.11i 
standard. Compare with AES, TKIP is a temporary protocol for replacing WEP security 
until manufacturers implement AES at the hardware level. 
 

9.  Can Wireless products support printer sharing

  

Wireless products perform the same function as LAN products. Therefore, Wireless 
products can work with Netware, Windows 2000, or other LAN operating systems to 
support printer or file sharing. 

 

10. Would the information be intercepted while transmitting on air

 

WLAN features two-fold protection in security. On the hardware side, as with Direct 
Sequence Spread Spectrum technology, it has the inherent security feature of 
scrambling. On the software side, WLAN series offer the encryption function (WEP) to 
enhance security and Access Control. Users can set it up depending upon their needs. 
 

11. What is DSSS

What is FHSS

And what are their differences

 

Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that changes 
frequency in a pattern that is known to both transmitter and receiver. Properly 
synchronized, the net effect is to maintain a single logical channel. To an unintended 
receiver, FHSS appears to be short-duration impulse noise. Direct-sequence spread-
spectrum (DSSS) generates a redundant bit pattern for each bit to be transmitted. This 
bit pattern is called a chip (or chipping code). The longer the chip is, the greater the 
probability that the original data can be recovered. Even if one or more bits in the chip 
are damaged during transmission, statistical techniques embedded in the radio can 
recover the original data without-the need for retransmission. To an unintended 
receiver, DSSS appears as low power wideband noise and is rejected (ignored) by 
most narrowband receivers. 
 

12. What is Spread Spectrum

 

Spread Spectrum technology is a wideband radio frequency technique developed by 
the military for use in reliable, secure, mission-critical communication systems. It is 
designed to trade off bandwidth efficiency for reliability, integrity, and security. In other 
words, more bandwidth is consumed than in the case of narrowband transmission

,

 but 

the trade off produces a signal that is, in effect, louder and thus easier to detect, 
provided that the receiver knows the parameters of the spread-spectrum signal being 
broadcast. If a receiver is not tuned to the right frequency, a spread –spectrum signal 
looks like background noise. There are two main alternatives, Direct Sequence Spread 
Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS). 

 

Summary of Contents for EW-7106PC

Page 1: ...W Wi ir re el le es ss s L LA AN N C Ca ar rd db bu us s A Ad da ap pt te er r User Manual Version 1 0 Dec 2002...

Page 2: ...arranties merchantability or fitness for any particular purpose Any software described in this manual is sold or licensed as is Should the programs prove defective following their purchase the buyer a...

Page 3: ...an outlet on a circuit different from that to which the receiver is connected 4 Consult the dealer or an experienced radio technician for help FCC Caution This equipment must be installed and operated...

Page 4: ...tention must be paid to the dangers of electric shock and static electricity when working with electrical equipment All guidelines of this and of the computer manufacture must therefore be allowed at...

Page 5: ...ONTENTS 2 2 INSTALLATION PROCEDURE 3 2 1 WINDOWS 98SE ME 2000 3 2 1 1 Install the Driver 3 2 1 2 Install the Utility 3 2 2 WINDOWS XP 4 3 CONFIGURATION UTILITY 7 3 1 CONFIGURATION 7 3 2 LINK STATE 9 3...

Page 6: ...128 bit WEP Data Encryption function for high level of security Support TKIP and AES advanced WLAN Security Supports peer to peer communication among any wireless users no Access Point required Automa...

Page 7: ...Contents Before you begin the installation please check the items of your package The package should include the following items One Wireless Cardbus Adapter One CD Driver Utility User s Manual One Q...

Page 8: ...Insert the adapter into the Cardbus port of your computer the system will automatically find the device and search for its driver 2 Please select the Driver Win2000 folder select the folder based on...

Page 9: ...esktop In the taskbar 2 2 Windows XP The installation process in Windows XP is similar with the process in windows 98SE Me 2000 Please refer to the instructions described in section 2 1 Due to the Win...

Page 10: ...ireless Network Connection Properties screen uncheck the setting Use Windows to configure my wireless network settings Note that if you want to change back to the Windows XP built in utility check the...

Page 11: ...6 Note If you don t disable the XP s Utility you can still see the link status and statistics during communication process from the adapter s utility...

Page 12: ...about the wireless LAN Parameter Description Network Type Infrastructure This operation mode requires the presence of an 802 11 Access Point All communication is done via the Access Point Ad Hoc Sele...

Page 13: ...d to the WLAN network periodly The beacon period is fixed in 100ms Power Save CAM Continuous Access Mode Adapter will always set in active mode Max Enable the adapter in the power saving mode when it...

Page 14: ...o be set Basic Click Apply button to save the above configurations click Undo button to cancel the settings Note The data rate is auto fallback among the range of the used data rate in case obstacles...

Page 15: ...the bar the more radio signal been received by the adapter This indicator helps to find the proper position of the wireless device for quality network operation Signal Quality This bar indicates the...

Page 16: ...a temporary quick fix method defined in IEEE 802 11i standard to quickly overcome the inherent weaknesses in WEP security AES has been developed to ensure the highest degree of security and authentici...

Page 17: ...ave to continue setting the AES Key Length and the encryption keys Auth Algorithm This setting has to be consistent with the wireless devices which the adapter intends to connect Open System No authen...

Page 18: ...ansmitted in the wireless network Fill the text box by following the rules below 64 bit Input 10 digit Hex values in the A F a f and 0 9 range as the encryption keys For example 0123456aef 128 bit Inp...

Page 19: ...independent wireless LAN Ad hoc wireless LAN is applicable at a departmental scale for a branch or SOHO operation 4 What is Infrastructure An integrated wireless and wireless and wired LAN is called a...

Page 20: ...to both transmitter and receiver Properly synchronized the net effect is to maintain a single logical channel To an unintended receiver FHSS appears to be short duration impulse noise Direct sequence...

Reviews: