28
hoc wireless LAN is applicable at a departmental scale for a branch or
SOHO operation.
5.
What is Infrastructure?
An integrated wireless and wireless and wired LAN is called an
Infrastructure configuration. Infrastructure is applicable to enterprise
scale for wireless access to central database, or wireless application for
mobile workers.
6.
What is BSS ID?
A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers
in a BSS must be configured with the same BSS ID.
7.
What is WEP?
WEP is Wired Equivalent Privacy, a data privacy mechanism based on
a 40 bit shared key algorithm, as described in the IEEE 802 .11
standard.
8.
What is TKIP?
TKIP is a quick-fix method to quickly overcome the inherent
weaknesses in WEP security, especially the reuse of encryption keys.
TKIP is involved in the IEEE 802.11i WLAN security standard, and the
specification might be officially released by early 2003.
9.
What is AES?
AES (Advanced Encryption Standard), a chip-based security, has been
developed to ensure the highest degree of security and authenticity for
digital information, wherever and however communicated or stored,
while making more efficient use of hardware and/or software than
previous encryption standards. It is also included in IEEE 802.11i
standard. Compare with AES, TKIP is a temporary protocol for
replacing WEP security until manufacturers implement AES at the
hardware level.
10.
Can Wireless products support printer sharing?
Wireless products perform the same function as LAN products.
Therefore, Wireless products can work with Netware, Windows 2000,
or other LAN operating systems to support printer or file sharing.
11.
Would the information be intercepted while transmitting on air?
WLAN features two-fold protection in security. On the hardware side,
as with Direct Sequence Spread Spectrum technology, it has the
Summary of Contents for HD65U
Page 6: ...V EU Countries Not intended for use None ...
Page 14: ...7 3 Click Next to continue ...
Page 16: ...9 ...
Page 17: ...10 6 A new icon will appear near the clock of system tray ...
Page 19: ...12 you want to use if it s shown then click Connect ...
Page 23: ...16 4 Please click Agree when it prompts you for the license agreement ...
Page 24: ...17 5 Please click install ...
Page 25: ...18 6 Please type in your Mac User Account Password ...
Page 26: ...19 7 Click Continue Installation 8 The software should now install ...
Page 27: ...20 9 After the software completes the program will prompt you to restart Click Restart ...
Page 31: ...24 ...