background image

WPI-100G PCI Adapter

Wireless Broadband Anywhere

9

to the game’s user guide for more information.

What is the IEEE 802.11b standard?

It is one of the IEEE standards for wireless networks. The 802.11b standard allows

wireless networking hardware from different manufacturers to communicate, provided that

the hardware complies with the 802.11b standard. The 802.11b standard states a maximum

data transfer rate of 11Mbps and an operating frequency of 2.4GHz.

What is ad-hoc mode?

When a wireless network is set to ad-hoc mode, the wireless-equipped computers are

configured to communicate directly with each other. The ad-hoc wireless network will not

communicate with any wired network.

What is infrastructure mode?

The FCC and their counterparts outside of the U.S. have set aside bandwidth for

unlicensed use in the ISM (Industrial, Scientific and Medical) band. Spectrum in the

vicinity of 2.4 GHz, in particular, is being made available worldwide. This presents a truly

revolutionary opportunity to place convenient high-speed wireless capabilities in the hands

of users around the globe.

What is Spread Spectrum?

Spread Spectrum technology is a wideband radio frequency technique developed

 

by the

military for use in reliable, secure, mission-critical communications systems. It is designed

to trade off bandwidth efficiency for reliability, integrity, and security. In other words,

more bandwidth is consumed than in the case of narrowband transmission, but the trade-

off produces a signal that is, in effect, louder and thus easier to detect, provided that the

receiver knows the parameters of the spread-spectrum signal being broadcast. If a receiver

is not tuned to the right frequency, a spread-spectrum signal looks like background noise.

There are two main alternatives, Direct Sequence Spread Spectrum (DSSS) and Frequency

Hopping Spread Spectrum (FHSS).

What is roaming?

Roaming is the ability of a portable computer user to communicate continuously while

moving freely throughout an area greater than that covered by a single access point. Before

using the roaming function, the workstation must make sure that it is the same channel

number with the access point of dedicated coverage area.

Would the information be intercepted while transmitting on air?

WLAN features two-fold protection in security. On the hardware side, as with Direct

Sequence Spread Spectrum technology, it has the inherent security feature of scrambling.

On the software side, WLAN offers the encryption function (WEP) to enhance security

and access control.

Summary of Contents for WPI-100G

Page 1: ...WIRELESS 11G PCI ADAPTER WPI 100G User Guide Version 1 0 Aug 2003...

Page 2: ...e Mode 3 Getting to Know the Wireless G PCI Adapter 4 Software Installation and Confituration for Window 98SE Me and 2000 4 Driver Installation and Configuration for Windows XP 6 Driver Installation f...

Page 3: ...twork The Wireless G PCI Adapter connects you with Wireless G networks at an incredible 54Mbps And for added versatility it can also interoperate with all the 11Mbps Wireless B 802 11b products found...

Page 4: ...o share data or peripherals with a wired network or not If the computers on the wireless network need to be accessed by a wired network or need to share a peripheral such as a printer with the wired n...

Page 5: ...eement shown in Figure 4 2 click the Next button to continue the installation or click the Cancel button to end the installation Figure 4 2 3 The Setup Wizard will display a screen similar to that sho...

Page 6: ...k the Back button to change any settings Channel The channel you choose should match the channel set on the other devices in your wireless network If you are unsure about which channel to use select t...

Page 7: ...Install the software automatically Recommended Then click the Next button Figure 5 1 2 When Windows has finished installing the driver click the Finish button Figure 5 2 You have now completed the dr...

Page 8: ...etwork the screen in Figure 5 3 will appear Check the box next to Allow me to connect to the selected wireless network even though it is not secure Then click the Connect button and continue to step 4...

Page 9: ...d do the following Uninstall the driver software from your PC Restart your PC and repeat the hardware and software installation as specified in this User Guide 2 I cannot communicate with the other co...

Page 10: ...equency technique developed by the military for use in reliable secure mission critical communications systems It is designed to trade off bandwidth efficiency for reliability integrity and security I...

Page 11: ...annels Japan Network Protocol TCP IP IPX NDIS 4 NDIS 5 NDIS 5 1 NetBEUI Interface PCI Transmit Power 15 dBm Sensitivity 80 dBm LED ACT WEP Key Bits 64 Bit and 128 Bit Dimensions 4 8 x 8 66 x 0 91 122...

Page 12: ...antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an exp...

Reviews: