background image

 

16 

 

 

Appendix A: FAQ about WLAN 

 

1.  What is Spread Spectrum? 

Spread Spectrum technology is a wideband radio frequency technique developed by the military 

for use in reliable, secure, mission-critical communications systems. It is designed to trade off 

bandwidth efficiency for reliability, integrity, and security. In other words, more bandwidth is 

consumed than in the case of narrowband transmission, but the trade-off produces a signal that is, 

in effect, louder and thus easier to detect, provided that the receiver knows the parameters of the 

spread-spectrum signal being broadcast. If a receiver is not tuned to the right frequency, a 

spread-spectrum signal looks like background noise. There are two main alternatives, Direct 

Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS). 

 

2.  What is DSSS? What is FHSS? And what are their differences? 

Frequency-Hopping Spread-Spectrum (FHSS) uses a narrowband carrier that changes frequency 

in a pattern that is known to both transmitter and receiver. Properly synchronized, the net effect is 

to maintain a single logical channel. To an unintended receiver, FHSS appears to be 

short-duration impulse noise. Direct-Sequence Spread-Spectrum (DSSS) generates a redundant 

bit pattern for each bit to be transmitted. This bit pattern is called a chip (or chipping code). The 

longer the chip, the greater the probability that the original data can be recovered. Even if one or 

more bits in the chip are damaged during transmission, statistical techniques embedded in the 

radio can recover the original data without the need for retransmission. To an unintended receiver, 

DSSS appears as low power wideband noise and is rejected (ignored) by most narrowband 

receivers. 

 

3.  Would the information be intercepted while transmitting on air? 

WLAN features two-fold protection in security. On the hardware side, as with Direct Sequence 

Spread Spectrum technology, it has the inherent security feature of scrambling. On the software 

side, WLAN offers the encryption function (WEP) to enhance security and access control. 

 

4.  What is WEP? 

WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 64-bit or 128-bit shared 

key algorithm, as described in the IEEE 802.11 standard.   

 

5.  What is infrastructure mode? 

When a wireless network is set to infrastructure mode, the wireless network is configured to 

communicate with a wired network through a wireless access point. 

Summary of Contents for DHSM-87B

Page 1: ...WLAN 802 11 1x1 SB BT3 0 SDIO Module DHSM 87B User Manual March 2012...

Page 2: ...ay be reproduced stored in a retrieval system or transmitted in any form or by any means whether electronic mechanical photocopying recording or otherwise without the prior writing of the publisher Pe...

Page 3: ...ion between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician...

Page 4: ...3 20cm between the radiator your body...

Page 5: ...The end user has to also be informed that any changes or modifications not expressly approved by the manufacturer could void the user s authority to operate this equipment If the size of the end produ...

Page 6: ...oduct available in the USA Canada market only channel 1 11 can be operated Selection of other channels is not possible This device and its antenna s must not be co located or operation in conjunction...

Page 7: ...rmed that any changes or modifications not expressly approved by the manufacturer could void the user s authority to operate this equipment IC statement is required to be available in the users manual...

Page 8: ...INSTALLATION UNINSTALLATION 8 3 CONNECTING TO AN EXISTING NETWORK 8 4 MODIFYING A WIRELESS NETWORK 9 4 1 MODIFYING GENERAL SETTINGS 9 4 2 MODIFYING SECURITY SETTINGS 10 5 WIFI BT SPECIFICATIONS 12 6...

Page 9: ...ng its network function without installing driver or utility 3 Connecting to an Existing Network 1 Use the remote control that came with your Blueray player to access the network configuration setting...

Page 10: ...y the settings below for your network Profile Name Identifies the configuration wireless network profile This name must be unique Profile names are not case sensitive Client Name Identifies the client...

Page 11: ...e options include EAP FAST EAP TLS EAP TTLS EAP SIM PEAP EAP GTC PEAP EAP MSCHAP V2 LEAP WPA WPA2 Passphrase Enables WPA WPA2 Passphrase security Click on the Configure button and fill in the WPA WPA2...

Page 12: ...ch means no time limit is imposed for finding the domain controller Note The authentication process times out whenever the authentication timer times out or the time for finding the domain controller...

Page 13: ...483GHz Japan 2 400 2 497GHz China 2 400 2 483GHz Channels support 802 11n b g US Canada 11 1 11 Major European country 13 1 13 France 4 10 13 Japan 11b 14 1 13 or 14th 11g 13 1 13 China 13 1 13 Operat...

Page 14: ...13 5 BT specification...

Page 15: ...z 2 0 max 2400 2500MHz 0 25 dBi peak WNC P N 81 EJZ15 G85 customer P N 25 91426 001 length 15 mm diameter 1 13 mm Connector RF connect AUX Antenna Wistron Neweb Corporation PIFA P N 113I554 22 51 2400...

Page 16: ...ntenna Aux Antenna BT Antenna Frequency MHz Horizontal Vertical Horizontal Vertical Horizontal Vertical dBi dBi dBi dBi dBi dBi 2400 0 22 1 88 0 14 2 44 1 41 4 14 2450 0 83 2 55 0 70 1 83 0 26 3 88 25...

Page 17: ...ed receiver FHSS appears to be short duration impulse noise Direct Sequence Spread Spectrum DSSS generates a redundant bit pattern for each bit to be transmitted This bit pattern is called a chip or c...

Page 18: ...ogy that links access points and nodes In such a system the user s end node undertakes a search for the best possible access to the system First it evaluates such factors as signal strength and qualit...

Reviews: