background image

 

21

both back off and wait a random amount of time before retrying. 

DHCP:

 Dynamic Host Configuration Protocol, which is a protocol that lets network 

administrators manage and allocate Internet Protocol (IP) addresses in a network.   
Every computer has to have an IP address in order to communicate with each other in 
a TCP/IP based infrastructure network. Without DHCP, each computer must be 
entered in manually the IP address. DHCP enables the network administrators to 
assign the IP from a central location and each computer receives an IP address upon 
plugged with the Ethernet cable everywhere on the network. 

DSSS: 

Direct Sequence Spread Spectrum. DSSS generates a redundant bit pattern for 

each bit to be transmitted. This bit pattern is called a chip (or chipping code). The 
longer the chip, the greater the probability that the original data can be recovered. 
Even if one or more bits in the chip are damaged during transmission, statistical 
techniques embedded in the radio can recover the original data without the need for 
retransmission. To an unintended receiver, DSSS appears as low power wideband 
noise and is rejected (ignored) by most narrowband receivers. 

Dynamic IP Address:

 An IP address that is assigned automatically to a client 

station in a TCP/IP network by a DHCP server.

 

Encryption:

 A security method that uses a specific algorithm to alter the data 

transmitted, thus prevent others from knowing the information transmitted. 

ESS:

 ESS stands for “Extended Service Set”. More than one BSS is configured to 

become Extended Service Set. LAN mobile users can roam between different BSSs in 
an ESS. 

ESSID:

 The unique identifier that identifies the ESS. In infrastructure association, the 

stations use the same ESSID as AP’s to get connected. 

Ethernet:

 A popular local area data communications network, originally developed 

by Xerox Corp., that accepts transmission from computers and terminals.    Ethernet 
operates on a 10/100 Mbps base transmission rate, using a shielded coaxial cable or 
over shielded twisted pair telephone wire. 

Fragmentation: 

When transmitting a packet over a network medium, sometimes the 

packet is broken into several segments, if the size of packet exceeds that allowed by 
the network medium. 

Fragmentation Threshold: 

The Fragmentation Threshold defines the number of 

bytes used for the fragmentation boundary for directed messages. The purpose of 
"Fragmentation Threshold" is to increase the transfer reliability thru cutting a MAC 
Service Data Unit (MSDU) into several MAC Protocol Data Units (MPDU) in smaller 
size. The RF transmission can not allow to transmit too big frame size due to the 
heavy interference caused by the big size of transmission frame. But if the frame size 
is too small, it will create the overhead during the transmission. 

Summary of Contents for PCI Adapter fxmicro

Page 1: ...X Micro WLAN 11g PCI Adapter User Manual...

Page 2: ...Getting Start 5 2 1 LED Indicators 5 2 2 Install the 108Mbps Wireless Network PCI Adapter 6 2 2 1 Utility Installation 6 2 2 2 Driver Installation 9 3 Configuration 12 3 1 Link Information 12 3 2 Conf...

Page 3: ...P Germany 2400 2483 5 MHz 1 13 100 mW EIRP 100 mW EIRP Austria 2400 2483 5 MHz 1 13 100 mW EIRP 100 mW EIRP Belgium 2400 2483 5 MHz 1 13 100 mW EIRP 100 mW EIRP Switzerland 2400 2483 5 MHz 1 13 100 mW...

Page 4: ...ision reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures Reorient or relocate the...

Page 5: ...k security with WEP and WPA support Auto switch between the two standards IEEE 802 11b and 802 11g Driver Utility support most commonly used operating systems including Windows 98SE ME 200 XP 1 2 Syst...

Page 6: ...hat the 108Mbps wireless Network PCI Adapter is NOT inserted into the PCI slot NOTE all the snapped images of installation mentioned in this manual are based on Windows XP For other windows operating...

Page 7: ...7 3 InstallShield Wizard will automatically start Please click Next to continue...

Page 8: ...8...

Page 9: ...your PC Open the computer case and then please insert the Wireless PCI Adapter into the empty PCI slot of your computer system Once the Wireless PCI Adapter is installed place the computer case back...

Page 10: ...10 2 Please click Continue Anyway...

Page 11: ...11 3 Please click Finish 4 To make sure if the installation is successful you could check it through the device management...

Page 12: ...as below after you launch the Utility program Status Shows the BSSID associated which can be used to identify the wireless network SSID Shows current SSID which must be the same for the wireless clien...

Page 13: ...Rate Shows the statistics of data transfer and the calculation is based on the number of packets transmitted and received 3 2 Configuration This is the page where you can change the basic settings of...

Page 14: ...smitted at 1Mbps that allows the PHY circuitry to reach steady state demodulation and synchronization of bit clock and frame start Two different preambles and headers are defined the mandatory support...

Page 15: ...red to select the Authentication mode from the next dropping list If WPA is selected configuration is enabled Please click the configuration The below window is pop up Then please select the certifica...

Page 16: ...iver shares the common key for data communication and the key is used for extended length of time Auto depend on the communication to establish and automatically use the proper authentication mode The...

Page 17: ...mmunications by simply mouse double click or click on the Connect button Click Refresh button to start scanning for available network again Profile You can create and manage the created profiles for H...

Page 18: ...18...

Page 19: ...reless networks Ad Hoc An independent wireless LAN network formed by a group of computers each with a network adapter AP Client One of the additional AP operating modes offered by 54Mbps Access Point...

Page 20: ...r Maps and the Traffic Indicator Message TIM Bit A binary digit which is either 0 or 1 for value is the smallest unit for data Bridge An internetworking function that incorporates the lowest 2 layers...

Page 21: ...rver Encryption A security method that uses a specific algorithm to alter the data transmitted thus prevent others from knowing the information transmitted ESS ESS stands for Extended Service Set More...

Page 22: ...instead of a single destination Multiple Bridge One of the additional AP operating modes offered by 54Mbps Access Point which allows a group of APs that consists of two or more APs to connect two or m...

Page 23: ...ID address field into a field for subnets TCP IP Transmission Control Protocol Internet Protocol The basic communication language or protocol of the Internet It can also be used as a communications pr...

Reviews: