Home
        Linksys WMP54G
         Contents
1.          si   r   R       Figure 7 12      The Security Settings screen  Figure 7 13  will appear  Enable or disable    Wired Equivalent Privacy  WEP  encryption for your wireless network  If  you enable WEP  enter a Passphrase or WEP key  Click the Next button to  continue or the Back button to return to the previous screen     23    24    WEP  Disabled 64 bits WEP 128 bits WEP    If you do not want to use  WEP encryption  choose Disabled  To use WEP encryption  recommended  to increase network security   select 64 bits or 128 bits WEP from the  drop down menu  and enter either a Passphrase or WEP key     Passphrase   Instead of manually entering WEP keys  you can enter a  Passphrase  so that a WEP key is automatically generated  It 1s case sensi   tive and should not be longer than 16 alphanumeric characters  This  passphrase must match the passphrase of your wireless network and is com   patible with other Linksys wireless products only   If you have any non   Linksys wireless products  enter the WEP key s  manually on those prod   ucts      Key 1   This WEP key must match the WEP key of your wireless network   If you are using 64 bit WEP encryption  then the key must consist of exact   ly 10 hexadecimal characters  If you are using 128 bit WEP encryption   then the key must consist of exactly 26 hexadecimal characters  Valid hexa   decimal characters are    0    to    9    and    A    to    F           gt      Wireless G PCI Adapter  WLAN Monitor ve 1 2    LINKSYS    A Ci
2.     e Linksys vakuuttaa t  ten ett   Wireless G PCI Adapter tyyppinen laite on direktiivin  1999 5 EY oleellisten vaatimusten ja sit   koskevien n  iden direktiivien muiden ehto   jen mukainen    e Linksys Group d  clare le carte PCI sans fil G est conforme aux conditions essen   tielles et aux dispositions relatives    la directive 1999 5 EC    e Dans le cas d une utilisation priv  e     l ext  rieur d un b  timent  au dessus d un  espace public  aucun enregistrement n est n  cessaire pour une distance de moins  de 300m  Pour une distance sup  rieure    300m un enregistrement aupr  s de l IBPT  est requise  Pour une utilisation publique    l ext  rieur de b  timents  une licence de  l IBPT est requise  Pour les enregistrements et licences  veuillez contacter l IBPT    e France F    2 4 GHz Bande   les canaux 10  11  12  13  2457  2462  2467  et 2472 MHz respec   tivement  sont compl  tement libres d utilisation en France  en utilisation int  rieur    Pour ce qui est des autres canaux  ils peuvent   tre soumis    autorisation selon le  d  partment  L utilisation en ext  rieur est soumis    autorisation pr  alable et tres  restreint    Vous pouvez contacter l Autorit   de R  gulation des T  l  communications   http   www art telecom fr  pour de plus amples renseignements     2 4 GHz Band  only channels 10  11  12  13  2457  2462  2467  and 2472 MHz  respectively  may be used freely in France for indoor use  License required for out   door installations    Please contact ART  h
3.  DSL  or cable systems  or through leased lines or satellites  In its most  basic definition  the Internet could be considered a WAN     WEP  Wired Equivalent Privacy    A data privacy mechanism based on a 64   bit or 128 bit shared key algorithm  as described in the IEEE 802 11 standard     WLAN  Wireless Local Area Network    A group of computers and associat   ed devices that communicate with each other wirelessly     37    Standards   Modulation   Channels     802 11b   802 119    Network Protocol     Interface   Transmit Power   Sensitivity    LED     WEP Key Bits     802 119  802 11b  802 1 1b  CCK  11 Mbps   DQPSK  2 Mbps    DBPSK  1 Mbps   802 119  OFDM    11 Channels  USA    13 Channels  most of Europe    14 Channels  Japan    TCP IP  IPX  NDIS 4  NDIS 5  NDIS 5 1  NetBEUI  PCI   15 dBm    80 dBm   ACT    64 Bit and 128 Bit    Dimensions     Unit Weight   Certifications   Operating Temp      Storage Temp      Operating Humidity     Storage Humidity     122 mm x 220 mm x 23 mm   4 8  x 8 66  x 0 91      0 13 kg  4 5 oz     FCC  CE   0  C to 65  C  32  F to 150  F    40  C to 85  C   40  F to 185  F   0  to 95   Non Condensing    0  to 95   Non Condensing    39    40    Appendix D  Warranty Information    LIMITED WARRANTY   Linksys warrants to the original end user purchaser     You     that  for a period of two years    the    Warranty Period     Your Linksys product will be free of defects in materials and  workmanship under normal use  Your exclusive remedy and Link
4.  access point s range and into another and transparently  reassociate and reauthenticate to the new access point  This reassociation and  reauthentication should occur without user intervention and ideally without  interruption to network connectivity  A typical scenario would be a location  with multiple access points  where users can physically relocate from one area  to another and easily maintain connectivity     RTS  Request To Send    An RS 232 signal sent from the transmitting station  to the receiving station requesting permission to transmit     35    36    Server   Any computer whose function in a network is to provide user access  to files  printing  communications  and other services     Software   Instructions for the computer  A series of instructions that performs  a particular task is called a  program   The two major categories of software are   system software  and  application software   System software is made up of  control programs such as the operating system and database management sys   tem  DBMS   Application software is any program that processes data for the  user     A common misconception is that software is data  It is not  Software tells the  hardware how to process the data     SOHO  Small Office Home Office    Market segment of professionals who  work at home or in small offices     Spread Spectrum   Spread Spectrum technology is a wideband radio frequen   cy technique developed by the military for use in reliable  secure  mission crit   ical
5.  and locate an available PCI slot on the motherboard   Check with your computer manufacturer for instructions     3  Slide the PCI Adapter into the PCI slot  Make sure that all of its pins are  touching the slot s contacts  You may have to apply a bit of pressure to slide  the adapter all the way in  After the adapter is firmly in place  secure its fas   tening tab to your PC s chassis with a mounting screw  Then  close your PC     4  Attach the external antenna to the adapter   s antenna port   5  Power on your desktop PC   You have now completed the hardware installation for  the Adapter   If you want to check the link information  search for available wireless  networks  or make additional configuration changes  proceed to       Chapter 7  Using the WLAN Monitor for Windows 98SE  Me  and  2000        Chapter 7  Using the WLAN Monitor  for Windows 985E  Me  and 2000  ioven    Use the WLAN Monitor to check the link information  search for available  wireless networks  or create profiles that hold different configuration settings     Accessing the WLAN Monitor    After installing the Adapter  the WLAN Monitor icon will appear  in your system tray  Double click the icon  see Figure 7 1         Figure 7 1    The Link Information screen  Figure 7 2  will appear  From this screen  you can  find out how strong the current wireless signal is and how good the connec   tion   s quality is  You can also click the More Information button to view addi   tional status information about t
6.  and security     31    32    Driver   A workstation or server software module that provides an interface  between a network interface card and the upper layer protocol software running  in the computer  it is designed for a specific card  and is installed during the  initial installation of a network compatible client or server operating system     DSSS  Direct Sequence Spread Spectrum    DSSS generates a redundant bit  pattern for all data transmitted  This bit pattern is called a chip  or chipping  code   Even if one or more bits in the chip are damaged during transmission   statistical techniques embedded in the receiver can recover the original data  without the need for retransmission  To an unintended receiver  DSSS appears  as low power wideband noise and is rejected  ignored  by most narrowband  receivers  However  to an intended receiver  i e  another wireless LAN end   point   the DSSS signal is recognized as the only valid signal  and interference  is inherently rejected  ignored      Encryption   A security method that applies a specific algorithm to data in  order to alter the data s appearance and prevent other devices from reading the  information     Ethernet   IEEE standard network protocol that specifies how data is placed  on and retrieved from a common transmission medium  Has a transfer rate of  10 Mbps  Forms the underlying transport vehicle used by several upper level  protocols  including TCP IP and XNS     FHSS  Frequency Hopping Spread Spectrum    F
7.  click Advanced        Figure 4 4    Note  Steps 2 and 3 are the instructions and screenshots for Windows  XP with Service Pack 1 installed  If you have not installed Service  Pack 1  select the network you want  and click the Connect button  If    the network has WEP encryption enabled  enter the WEP key in the  Network key field  and then click the Connect button        3  The screen in Figure 4 5 will appear  Enter the WEP key of your wireless  network in the Network key field  and re enter it in the Confirm network key  field  Then  click the Connect button     Note  Wireless Zero Configuration does not support the use of a  passphrase  Enter the exact WEP key used by your access point        Wireless Network Connection 3    The following wireless network s  are available  To access a  wireless network  select it from the list  and then click Connect     Available wireless networks     i Linksys    This wireless network requires the use of a network key  WEP   To    access this network  type the key  then click Connect     Network key  ET E p     Confirm network key        Enable IEEE 802 1  authentication for this network   If you are having difficulty connecting to a network  click Advanced                             Figure 4 5  4  The screen in Figure 4 6 will  appear if your connection is i  Wireless Network Connection 3      active  Connected to  linksys    Signal Strength  Excellent       Figure 4 6    For more information about WEP  refer to your access point   s 
8.  communications systems  It is designed to trade off bandwidth efficiency  for reliability  integrity  and security  In other words  more bandwidth is con   sumed than in the case of narrowband transmission  but the trade off produces  a signal that is  in effect  louder and thus easier to detect  provided that the  receiver knows the parameters of the spread spectrum signal being broadcast   If a receiver is not tuned to the right frequency  a spread spectrum signal looks  like background noise  There are two main alternatives  Direct Sequence  Spread Spectrum  DSSS  and Frequency Hopping Spread Spectrum  FHSS      SSID  Service Set IDentifier    A unique name shared among all points in a  wireless network  The SSID must be identical for each point in the wireless net   work and is case sensitive     Storage   The semi permanent or permanent holding place for digital data     Subnet Mask   The method used for splitting IP networks into a series of sub   groups  or subnets  The mask is a binary pattern that is matched up with the IP  address to turn part of the host ID address field into a field for subnets     Switch   1  A data switch connects computing devices to host computers   allowing a large number of devices to share a limited number of ports  2  A  device for making  breaking  or changing the connections in an electrical cir   cuit     TCP  Transmission Control Protocol    A method  protocol  used along with  the IP  Internet Protocol  to send data in the form of me
9.  or 128 bit shared key algorithm  as described in the IEEE 802 11 standard     29    30    Appendix B  Glossary    802 11b   One of the IEEE standards for wireless networking hardware   Products that adhere to a specific IEEE standard will work with each other   even if they are manufactured by different companies  The 802 11b standard  specifies a maximum data transfer rate of 11Mbps  an operating frequency of  2 4GHz  and WEP encryption for security  802 11b networks are also referred  to as Wi Fi networks     802 11  g   A wireless networking standard that specifies a maximum data trans   fer rate of 54Mbps using OFDM modulation  an operating frequency of  2 4GHz  backward compatibility with IEEE 802 11b devices  and WEP  encryption for security     Adapter   Printed circuit board that plugs into a PC to add to capabilities or  connectivity to a PC  In a networked environment  a network interface card is  the typical adapter that allows the PC or server to connect to the intranet and or  Internet     Ad hoc Network   An ad hoc network is a group of computers  each with a  wireless adapter  connected as an independent 802 11 wireless LAN  Ad hoc  wireless computers operate on a peer to peer basis  communicating directly  with each other without the use of an access point  Ad hoc mode is also  referred to as an Independent Basic Service Set  IBSS  or as peer to peer  mode  and is useful at a departmental scale or SOHO operation     Backbone   The part of a network that conne
10. HSS continuously changes   hops  the carrier frequency of a conventional carrier several times per second  according to a pseudo random set of channels  Because a fixed frequency is not  used  and only the transmitter and receiver know the hop patterns  interception  of FHSS is extremely difficult     Fragmentation   Breaking a packet into smaller units when transmitting over  a network medium that cannot support the original size of the packet     Gateway   A device that interconnects networks with different  incompatible  communications protocols     Hardware   Hardware is the physical aspect of computers  telecommunica   tions  and other information technology devices  The term arose as a way to dis   tinguish the  box  and the electronic circuitry and components of a computer  from the program you put in it to make it do things  The program came to be  known as the software     Hop   The link between two network nodes     IEEE  The Institute of Electrical and Electronics Engineers    The IEEE  describes itself as  the world s largest technical professional society  promoting  the development and application of electrotechnology and allied sciences for  the benefit of humanity  the advancement of the profession  and the well being  of our members      The IEEE fosters the development of standards that often become national and  international standards  The organization publishes a number of journals  has  many local chapters  and several large societies in special areas  s
11. IP Address of the Adapter    Subnet Mask   The Subnet Mask of the Adapter    Default Gateway   The Default Gateway address of the Adapter   DNS   The DNS address of the Adapter    DHCP   The status of the DHCP client     16    Wireless Network Status   State   The status of the wireless network connection    SSID   The unique name of the wireless network    Network Type   The mode of the wireless network currently in use   Transfer Rate   The data transfer rate of the current connection   Channel   The channel to which the wireless network devices are set   WEP   The status of the WEP encryption security feature    MAC   The MAC address of the wireless network   s access point     Signal Strength   The Signal Strength bar indicates signal strength     Link Quality   The Link Quality bar indicates the quality of the wireless net   work connection     Click the Back button to return to the initial Link Information screen  Click the  X  Close  button in the upper right corner to exit the WLAN Monitor     The Site Survey     screen  Figure OE a   7 4  displ LINKSYS      7 3 1Sp om a A Division of Cisco Spputemna  les Wireless G PCI Adapter   list of infra  WLAN Monitor vec 12   structure and   ad hoc networks  Bodo is the list of last found wireless connections available to your Wireless G PCI    available for Adapter  To refresh the list  click Ihe Fhofraah button  To connect to one of the connection    on the list  select the desired connection then click Connect button to conn
12. OR FOR SPECIAL  INDIRECT  CONSE   QUENTIAL  INCIDENTAL OR PUNITIVE DAMAGES  HOWEVER CAUSED REGARDLESS  OF THE THEORY OF LIABILITY  ARISING OUT OF OR RELATED TO THE USE OF OR  INABILITY TO USE THE PRODUCT  EVEN IF LINKSYS HAS BEEN ADVISED OF THE  POSSIBILITY OF SUCH DAMAGES  IN NO EVENT WILL LINKSYS  LIABILITY EXCEED  THE AMOUNT PAID BY YOU FOR THE PRODUCT     The foregoing limitations will apply even if any warranty or remedy provided under this  Section fails of its essential purpose  Some jurisdictions do not allow the exclusion or lim   itation of incidental or consequential damages  so the above limitation or exclusion may  not apply to You     This Warranty is valid and may be processed only in the country of pur   chase     Please direct all inquiries to  Linksys  P O  Box 18558  Irvine  CA 92623     For help with the installation or operation of this product  contact Linksys  Technical Support at one of the phone numbers listed on the Technical Support  insert or one of the Internet addresses below     E mail   Europe europe support linksys com  United Kingdom  amp  Ireland uks linksys com   Latin America latam soporte linksys com  U S  and Canada support linksys com    For unlisted regions or the most up to date contact information  please visit the  website below     Web http   www linksys com international    41    LINKSYS       http   www linksys com       Copyright 2003 Linksys  All Rights Reserved     
13. PC s chassis with a mounting screw  Then  close your PC     4  Attach the external antenna to the adapter   s antenna port   5  Power on your desktop PC   You have now completed the hardware installation for    the Adapter  To install the driver for the Adapter  proceed to the next  section     Driver Installation for Windows XP        Driver Installation for Windows XP 2  When yas Found New Hardware Wizard  1n1sne    has    1  Windows XP will automatically detect the Adapter  Insert the Setup CD  installing the lk  aen ae gui lies  ROM into the CD ROM drive and the screen in Figure 4 1 should appear  driver  click the Te  Click the radio button next to Install the software automatically Finish button           He Wireless G PCI Adapter     Recommended   Then click the Next button     Found New Hardware Wizard    Welcome to the Found New    Hardware Wizard Click Finish to close the wizard     This wizard helps you install software for        Witeless G PCI Adapter    Figure 4 2      If your hardware came with an installation CD   lt  lt  or floppy disk  insert it now  You have now completed the driver installation for  the Adapter  To configure the Adapter  proceed to the next section   What do you want the wizard to do     Windows XP Wireless Zero Configuration           Install the software automatically  Recommended   O Install from a list or specific location  Advanced    z    Windows XP Wireless Zero Configuration    Chek Next to continue     For Windows XP users  Window
14. Questions    26    Appendix A  Troubleshooting    This chapter provides solutions to problems that may occur during the installa   tion and operation of the Wireless G PCI Adapter  Read the descriptions below  to solve your problems  If you can   t find an answer here  check the Linksys  website at www linksys com     1  The Wireless G PCI Adapter does not work properly    e Reinsert the Wireless G PCI Adapter into your PC   s PCI slot    e Right click on My Computer and select Properties  Select the device  manager and click on the Network Adapter  You will find the Wireless G  PCI Adapter if it is installed successfully  If you see the yellow exclama   tion mark  the resources are conflicting  You will see the status of the  Wireless G PCI Adapter  If there is a yellow question mark  please check  the following    e Make sure that your PC has a free IRQ  Interrupt ReQuest  a hardware   interrupt on a PC     e Make sure that you have inserted the right adapter and installed the prop   er driver    If the Wireless G PCI Adapter does not function after attempting the above  steps  remove the adapter and do the following    e Uninstall the driver software from your PC    e Restart your PC and repeat the hardware and software installation as  specified in this User Guide     2    cannot communicate with the other computers linked via Ethernet in the  Infrastructure configuration   e Make sure that the PC to which the Wireless G PCI Adapter is associated  is powered on   e Make s
15. Uniform Resource Locator you requested or in the  e mail address you re sending a note to  At the other end  the recipient can see  the IP address of the Web page requestor or the e mail sender and can respond  by sending another message using the IP address it received     IRQ  Interrupt ReQuest    A hardware interrupt on a PC  There are 16 IRQ  lines used to signal the CPU that a peripheral event has started or terminated   Except for PCI devices  two devices cannot use the same line     33    34    ISM band   The FCC and their counterparts outside of the U S  have set aside  bandwidth for unlicensed use in the ISM  Industrial  Scientific and Medical   band  Spectrum in the vicinity of 2 4 GHz  in particular  is being made avail   able worldwide  This presents a truly revolutionary opportunity to place con   venient high speed wireless capabilities in the hands of users around the globe     LAN  Local Area Network    A group of computers and associated devices that  share a common communications line and typically share the resources of a  single processor or server within a small geographic area  for example  within  an office building      MAC  Media Access Control  Address   A unique number assigned by the  manufacturer to any Ethernet networking device  such as a network adapter   that allows the network to identify it at the hardware level     Mbps  Megabits per second    One million bits per second  unit of measure   ment for data transmission     Motherboard   A moth
16. Wireless G  PCI Adapter       Use this Guide to install        WMP54G    COPYRIGHT  amp  TRADEMARKS   Specifications are subject to change without notice  Copyright    2003 Linksys  All Rights  Reserved  Linksys and the Linksys logo are registered trademarks of Linksys Group  Inc   Microsoft  Windows  and the Windows logo are registered trademarks of Microsoft  Corporation  All other trademarks and brand names are the property of their respective  proprietors     SAFETY AND REGULATORY NOTICES    FCC STATEMENT   The Wireless G PCI Adapter has been tested and complies with the specifications for a  Class B digital device  pursuant to Part 15 of the FCC Rules  Operation is subject to the  following two conditions      1  This device may not cause harmful interference  and   2  This device must accept any interference received  including interference that may  Cause undesired operation     These limits are designed to provide reasonable protection against harmful interference  in a residential installation  This equipment generates  uses  and can radiate radio fre   quency energy and  If not installed and used according to the instructions  may cause  harmful interference to radio communications  However  there is no guarantee that inter   ference will not occur in a particular installation  If this equipment does cause harmful  interference to radio or television reception  which is found by turning the equipment off  and on  the user is encouraged to try to correct the interfer
17. ar a Doane E entwcrh  The SSID run be mental fer gach  point in he  Wea  riia aad aA rnai       Figure 7 10       21    eZ    4  The Wireless Settings screen  Figure 7 11  will appear  If you chose    Infrastructure Mode  go to Step 5 now  If you chose Ad Hoc Mode  select  the correct operating channel for your network from the Channel drop   down menu  Then  select the Network Mode from the drop down menu   Click the Next button  and go to Step 5  Click the Back button to change  any settings     Channel   The channel you choose should match the channel set on the  other devices in your wireless network  If you are unsure about which chan   nel to use  select the default channel  Channel 11      Network Mode   Select Mixed Mode  and both Wireless G and Wireless   B computers will be allowed on the network  but the speed will be reduced   Select G Only Mode for maximum speed  but no Wireless B users will be  allowed on the network   5   E  s   L INKSYS      aT i cocoa Wireless G PCI Adapter  WLAN Monitor vec 12    Wireless Settings    Select a channel for your Ad Hoc wireless nebros  Channels 1 6 and 11 are  preted and al wreless denses mul vec the same channel    Please select the channel for your wrtigss notwork    Setec  a nelvecrk ayalabelty mode  bn Mired Mode  both Viirelass 4 and Wireless G equepped  compuiars can jan iha Ad Hoc network  Note fal when Viretess H nodes are mchvery  communicating  the banciidth aralable is Winokess3 members a roduodd Ii of the Wireless  
18. are two main alternatives  Direct Sequence Spread Spectrum   DSSS  and Frequency Hopping Spread Spectrum  FHSS      What is DSSS  What is FHSS  And what are their differences    Frequency Hopping Spread Spectrum  FHSS  uses a narrowband carrier that  changes frequency in a pattern that is known to both transmitter and receiver   Properly synchronized  the net effect 1s to maintain a single logical channel  To    an unintended receiver  FHSS appears to be short duration impulse noise   Direct Sequence Spread Spectrum  DSSS  generates a redundant bit pattern  for each bit to be transmitted  This bit pattern is called a chip  or chipping  code   The longer the chip  the greater the probability that the original data can  be recovered  Even if one or more bits in the chip are damaged during trans   mission  statistical techniques embedded in the radio can recover the original  data without the need for retransmission  To an unintended receiver  DSSS  appears as low power wideband noise and is rejected  ignored  by most nar   rowband receivers     Would the information be intercepted while transmitting on air    WLAN features two fold protection in security  On the hardware side  as with  Direct Sequence Spread Spectrum technology  it has the inherent security fea   ture of scrambling  On the software side  WLAN offers the encryption function   WEP  to enhance security and access control     What is WEP   WEP is Wired Equivalent Privacy  a data privacy mechanism based on a 64 bit 
19. by Intel and  first appeared on PCs in late 1993  PCI provides a high speed data path  between the CPU and peripheral devices  video  disk  network  etc    There are  typically three or four PCI slots on the motherboard  In a Pentium PC  there is  generally a mix of PCI and ISA slots or PCI and EISA slots  Early on  the PCI  bus was known as a  local bus      PCI provides  plug and play  capability  automatically configuring the PCI  cards at startup  When PCI is used with the ISA bus  the only thing that is gen   erally required is to indicate in the CMOS memory which IRQs are already in  use by ISA cards  PCI takes care of the rest     PCI allows IRQs to be shared  which helps to solve the problem of limited IRQs  available on a PC  For example  if there were only one IRQ left over after ISA  devices were given their required IRQs  all PCI devices could share it  In a PCI   only machine  there cannot be insufficient IRQs  as all can be shared     Plug and Play   The ability of a computer system to configure expansion  boards and other devices automatically without requiring the user to turn off  the system during installation     Port   A pathway into and out of the computer or a network device such as a  switch or router  For example  the serial and parallel ports on a personal com   puter are external sockets for plugging in communications lines  modems and  printers     Roaming   In an infrastructure mode wireless network  this refers to the abili   ty to move out of one
20. compt  s ant agi to G Onby Mode  no Wiiroless 6 compubers will be able do join       Figure 7 11    5  The Network Setting screen  Figure 7 12  will appear     If your network has a DHCP server  click the radio button next to Obtain  an IP address automatically  DHCP   Click the Next button to continue   or click the Back button to return to the previous screen     If your network does not have a DHCP server  click the radio button next to  Specify the IP address  Enter an IP Address  Subnet Mask  Default  Gateway  and DNS appropriate for your network  Enter each address in this  format  XXX XXX XxXx xxx  the x   s represent the numbers that make up each  address   You must specify the IP Address and Subnet Mask on this screen   If you are unsure about the Default Gateway and DNS addresses  then leave  these fields alone     IP Address   This IP Address must be unique to your network     Subnet Mask   The Adapter   s Subnet Mask must be the same as your wired  network   s Subnet Mask     Default Gateway   Enter the IP address of your network   s Gateway here   DNS   Enter the DNS addresses of your Ethernet  wired  network here     Click the Next button to continue or the Back button to return to the previ   ous screen     SE    LInKSyYS   Sec ee le Wireless G PCI Adapter  WLAN Monitor ver 12    Network Setting     Obtain an IP address automatically  DHCP     Setecl In option d you would like P sings io be magmei Automatically        Specify IP Settings    IP Address   Address
21. cts most of the systems and net   works together and handles the most data     Bandwidth   The transmission capacity of a given facility  in terms of how  much data the facility can transmit in a fixed amount of time  expressed in bits  per second  bps      Bit   A binary digit  The value   0 or l used in the binary numbering system   Also  the smallest form of data     BSS  Basic Service Set    An infrastructure network connecting wireless  devices to a wired network using a single access point     CSMA CA  Carrier Sense Multiple Access Collision Avoidance    In local  area networking  this is the CSMA technique that combines slotted time divi   sion multiplexing with carrier sense multiple access collision detection   CSMA CD  to avoid having collisions occur a second time  This works best if  the time allocated is short compared to packet length and if the number of sit   uations is small     CTS  Clear To Send    An RS 232 signal sent from the receiving station to the  transmitting station that indicates it is ready to accept data     Default Gateway   The routing device used to forward all traffic that is not  addressed to a station within the local subnet     DHCP  Dynamic Host Configuration Protocol    A protocol that lets network  administrators manage centrally and automate the assignment of Internet  Protocol  IP  addresses in an organization s network  Using the Internet s set of  protocol  TCP IP   each machine that can connect to the Internet needs a  unique IP a
22. d Hoc versus Infrastructure Mode    Unlike wired networks  wireless networks have two different modes in which  they may be set up  infrastructure and ad hoc  In an infrastructure configu   ration a WLAN and wired LAN communicate to each other through an access  point  In ad hoc configuration  wireless equipped computers communicate  directly with each other  Choosing between these two modes depends on  whether or not the wireless network needs to share data or peripherals with a  wired network or not     If the computers on the  wireless network need to  be accessed by a wired  network or need to share a  peripheral  such as a print   er  with the wired network  computers  the wireless  network should be set up  in infrastructure mode    See Figure 2 1   The  basis of infrastructure  mode centers around an  access point  which serves  as the main point of communications between a wired and wireless network   Access points transmit data to PCs equipped with wireless network adapters   which can roam within a certain radial range of the access point  Multiple  access points can be arranged to work in succession to extend the roaming  range  and can be set up to communicate with your Ethernet  wired  hardware  as well        Figure 2 1    If the wireless network is relatively small and needs to share resources only  with the other computers on the wireless network  then the ad hoc mode can  be used   See Figure 2 2   Ad hoc mode allows computers equipped with wire   less transm
23. ddress  When an organization sets up its computer users with a con   nection to the Internet  an IP address must be assigned to each machine   Without DHCP  the IP address must be entered manually at each computer and   if computers move to another location in another part of the network  a new IP  address must be entered  DHCP lets a network administrator supervise and dis   tribute IP addresses from a central point and automatically sends a new IP  address when a computer is plugged into a different place in the network     DHCP uses the concept of a  lease  or amount of time that a given IP address  will be valid for a computer  The lease time can vary depending on how long a  user 1s likely to require the Internet connection at a particular location  It s espe   cially useful in education and other environments where users change fre   quently  Using very short leases  DHCP can dynamically reconfigure networks  in which there are more computers than there are available IP addresses     DHCP supports static addresses for computers containing Web servers that  need a permanent IP address     DNS   The domain name system  DNS  is the way that Internet domain name  are located and translated into Internet Protocol  IP  addresses  A domain name  is a meaningful and easy to remember  handle  for an Internet address     Domain   A subnetwork comprised of a group of clients and servers under the  control of one security database  Dividing LANs into domains improves per   formance
24. ding the License Agreement  shown in Figure 5 2  click the Next  button to continue the installation  or click the Cancel button to end the  installation     LINKSYS    A Division of Cisco Systems  Inc  Setup Wizard ver 1 2  License Agreement    END USER LICENSE AGREEME  For Linksys Instant Wireless   Wireless G PCI Adapter    IMPORTANT  READ CAREFULLY  This Linksys End User License   Agreement EULA     is a legal agreement between you  ether an   individual or a single enhy  and and Linksys Comeoration For the Linksys  product identified above  which includes computer software and    E you accepi the terms of fhis Agreement  click Next to continue  I nol choose  Cancel and the Setup Wizard wil cios  To instal the Wireless G PCI Adapters  Soltware  you Mud accept les agreement       Figure 5 2    The Setup Wizard will display a screen similar to that shown in Figure 5 3   asking you to choose a wireless mode  Click the Infrastructure Mode  radio button if you want your wireless computers to network with comput   ers on your wired network using a wireless access point  Click the Ad Hoc  Mode radio button if you want multiple wireless computers to network  directly with each other  Do not use Ad Hoc mode if you want your wire   less computers to communicate with computers on your wired network     11    12    In the SSID field  enter the SSID of your wireless network  The SSID must  be identical for all devices in the network  The default setting is linksys  all  lowercase   Cl
25. documentation   or visit www linksys com     For more information about wireless networking on a Windows XP computer   enter the keyword wireless in the Windows XP search engine     Congratulations   Your PC is now connected to your wireless network     Chapter 9  Software Installation  and Configuration for Windows  985E  Me  and 2000    10    The Wireless G PCI Adapter   s Setup Wizard will guide you through the instal   lation procedure for Windows 98SE  Me  and 2000  The Setup Wizard will  install the WLAN Monitor and driver  as well as configure the Adapter        Insert the Setup Wizard CD ROM into your CD ROM drive  The Setup  Wizard should run automatically  and Figure 5 1 should appear  If it does not   click the Start button and choose Run  In the field that appears  enter  D  setup exe  if    D    is the letter of your CD ROM drive      LINKSYS    A Onision of Cisco Systems  Inc    Setup Wizard ver 1 2    Welcome    Welcome to the Setup Wizard for the Wireless G  PCI Adapter   To funchon property  thes instalation should be run before    physically installing the Adapter    O  Setup    To continue  press the Setup bution      User Guide            Copyright 2003 Cisco Systems  Inc  All rights reserved        Figure 5 1    Setup Wizard Instructions for Windows 98SE  Me  and 2000    l        To install the Adapter  click the Install button on the Welcome screen   Figure 5 1  Click User Guide to view the User Guide or click Exit to exit  the Setup Wizard     After rea
26. down the backbone     As the user moves on  the end node   s RF transmitter regularly checks the sys   tem to determine whether it is in touch with the original access point or whether  it should seek a new one  When a node no longer receives acknowledgment  from its original access point  it undertakes a new search  Upon finding a new  access point  it then re registers  and the communication process continues     What is ISM band    The FCC and their counterparts outside of the U S  have set aside bandwidth  for unlicensed use in the ISM  Industrial  Scientific and Medical  band   Spectrum in the vicinity of 2 4 GHz  in particular  is being made available  worldwide  This presents a truly revolutionary opportunity to place convenient  high speed wireless capabilities in the hands of users around the globe     What is Spread Spectrum    Spread Spectrum technology is a wideband radio frequency technique devel   oped by the military for use in reliable  secure  mission critical communica   tions systems  It is designed to trade off bandwidth efficiency for reliability   integrity  and security  In other words  more bandwidth is consumed than in the  case of narrowband transmission  but the trade off produces a signal that is  in  effect  louder and thus easier to detect  provided that the receiver knows the  parameters of the spread spectrum signal being broadcast  If a receiver is not  tuned to the right frequency  a spread spectrum signal looks like background  noise  There 
27. ect   connection     Sito lafermation    Network Type AdHoc  Channel 6   WEP Disabled  MAC 1E SE EB 49 F7 03    Surveyed at 4 17 03 PM             es    WMPSAG is Active       Figure 7 4    SSID   The SSID or unique name of the wireless network   Signal   The percentage of signal strength     17    18    Site Information   Network Type   The mode of the wireless network currently in use   Channel   The channel to which the wireless network devices are set   WEP   The status of the WEP encryption security feature    MAC   The MAC address of the wireless network   s access point   Surveyed at   The time at which the wireless network was scanned     Refresh   Click the Refresh button to perform a new search for wireless  devices     Connect   To connect to one of the networks on the list  select the wireless net   work  and click the Connect button  If the wireless network has WEP encryp   tion enabled  you will see the screen shown in Figure 7 5     In the WEP drop   down box  select  the type of WEP  encryption used by  the wireless net   work  64 bit  or  128 bit WEP     Linksys    Grins ef Gisco pete  less    Wireless G PCI Adapter  WLAN Monitor vee 12    Security Settings    Enter your network s security information in the fields below   0  FES    Passphrase      Tho Passphrase is coso sonsitive and should be fower than 16 characters   You may manually enter your WEP key in hexadecimal format below     Figure 7 5    If the wireless network uses a passphrase  enter the passp
28. ence by one or more of the  following measures     e Reorient or relocate the receiving antenna   e Increase the separation between the equipment or devices   e Connect the equipment to an outlet other than the receiver s   e Consult a dealer or an experienced radio TV technician for assistance    FCC Caution  Any change or modification to the product not expressly approved by  Linksys could void the user s authority to operate the device     EC DECLARATION OF CONFORMITY  EUROPE   Linksys declares that the Wireless G PCI Adapter conforms to the specifications listed  below  following the provisions of the European R amp TTE directive 1999 5 EC     e EN 301 489 1  301 489 17 General EMC requirements for Radio equipment   e EN 609 50 Safety  e ETS 300 328 2 Technical requirements for Radio equipment     Caution  This equipment is intended to be used in all EU and EFTA countries  Outdoor  use may be restricted to certain frequencies and or may require a license for operation   Contact local Authority for procedure to follow     Note  Combinations of power levels and antennas resulting in a radiated power level of  above 100 mW equivalent isotropic radiated power  EIRP  are considered as not com   pliant with the above mentioned directive and are not allowed for use within the European  community and countries that have adopted the European R amp TTE directive 1999 5 EC     For more details on legal combinations of power levels and antennas  contact Linksys  Corporate Compliance 
29. erboard is the physical arrangement in a computer that  contains the computer s basic circuitry and components     Network   A system that transmits any combination of voice  video and or data  between users     Node   A network junction or connection point  typically a computer or work  station     OFDM   Developed for wireless applications  Orthogonal Frequency Division  Multiplexing  OFDM  technology offers superior performance increased data  rates and more reliable transmissions than previous technologies  such as  DSSS  OFDM is a scheme in which numerous signals of different frequencies  are combined to form a single signal for transmission on the medium     OFDM works by breaking one high speed data stream into a number of lower   speed data streams  which are then transmitted in parallel  Each lower speed  stream is used to modulate a subcarrier  Essentially  this creates a multi carrier  transmission by dividing a wide frequency band or channel into a number of  narrower frequency bands or sub channels  OFDM 1s also used for other appli   cations  including powerline networking     Packet   A unit of data routed between an origin and a destination in a network     Passphrase   Used much like a password  a passphrase simplifies the WEP  encryption process by automatically generating the WEP encryption keys for  Linksys products     PCI  Peripheral Component Interconnect    A peripheral bus commonly used  in PCs  Macintoshes and workstations  It was designed primarily 
30. etwork devices are set    WEP   The status of the WEP encryption security feature     Connect   To connect to a wireless network using a specific profile  select the  profile  and click the Connect button     Edit   Select a profile  and click the Edit button to change an existing profile     New   Click the New button to create a new profile  See the next section      Creating a New Profile     for detailed instructions     19    Import   Click Wireless G Notebook Adapter WLAN Monitor       ee Py i j Look in     amp  My Documents  le Ac Er  profile that has My Pictures   been saved in  another location   From the screen  that appears   shown in Figure  7 7   select the  appropriate file   and click the  Open button     2  x                 Files of type    Linksys Wireless Profile    cfg     Figure 7 7    Export   To save the profile s  in ajx    a different location  click the Fes npt    Folle to port bu   Export button  On the screen that  appears  Figure 7 8   direct  Windows to the appropriate fold   er and click the OK button     JocUMeNts  a My Computer  H  Local Disk  C         ui WPC54G RC1113  D    E My Network Places       Figure 7 8    Delete   Click the Delete button to delete a profile     Click the X  Close  button in the upper right corner to exit the WLAN Monitor     Note  If you have more than one profile  all profiles will be auto   matically selected and exported to the same folder     2  When the Create connection          Creating a New Profile    1  On 
31. he current wireless connection  To search for  available wireless networks  click the Site Survey tab  To perform configura   tion changes  click the Profiles tab     LINKSYS    ee ee Wireless G PCI Adapter  WLAN Monitor vee 12  Link Information    Wa    The current links between your Wireless Network Adapter  AP Houler and Internet       Figure 7 2    15    Link Information    The Link Information screen displays signal strength and link quality informa   tion about the current connection and provides a button to click for additional  status information     Ad Hoc Mode or Infrastructure Mode   The screen indicates whether the  Adapter is currently working in ad hoc or infrastructure mode     Signal Strength   The Signal Strength bar indicates signal strength     Link Quality   The Link Quality bar indicates the quality of the wireless net   work connection     Click the X  Close  button in the upper right corner to exit the WLAN Monitor     Click the More  Information    LINKSYS    button to view A Cela of Cesco Syrien  bee Wireless G PCI Adapter  more informa  WLAN Monitor vee 12  tion about the  wireless net   work connec              Bere es the informaien abdul thee current link between the iWineesa G POI Adapter and fs  tion     screen wiroless network connection   similar to that         taz  wa    festa Conn  ot  d  shown in Figure z    eu Semen Inlas utue  7 3 will appear  Cu     2437 GHA   HAC 1E 8E EB 45 F 7 03       Figure 7 3    TCP IP Setting   IP Address   The 
32. hrase in the  Passphrase field  If the wireless network uses a WEP key  enter the WEP key  in the Key 1 field     Click the OK button to complete the network connection and return to the Site  Survey screen  or click the Cancel button to cancel the network connection and  return to the Site Survey screen     On the Site Survey screen  click the X  Close  button in the upper right corner  to exit the WLAN Monitor        The Profiles screen  Figure 7 6  lets you save different configuration profiles  for different network setups  You can also import or export profiles  The default    profile holds the initial configuration saved when you ran the Setup Wizard   es    Wireless G PCI Adapter  WLAN Monitor ver 12    LINKSYS    A Divisio af Ciscoe Systema  bee     Click the Prodihe name above and the Connect bution bestow fo use preeoonh qured  Wireless network settings  Use the menu below to manage your wireless network s    Profile Information    Network Type   Infrastructure  Transfer Rate   Auto  Channel   Auto   WEP   Disabled       Figure 7 6    Profile   Name of the connection profile   SSID   The wireless network   s unique name  as set in the connection profile     Profile Information   Network Type   The mode of the wireless network currently in use    Transfer Rate   The data transfer rate of the current connection   In Auto  mode  the Adapter dynamically shifts to the fastest data transfer rate possible  at any given time     Channel   The channel to which the wireless n
33. ick the Next button  or click the Back button to return to the  previous page      LINKSYS    Setup Wizard ve 1 2    Wireless Mode      Infrastiucture Mode  in infastructiore    moc  De Wineheis Gaines COTE ih each ode andl bo a waned  Peeve Wd Ai BOOS  pinl    C Ad Hoc Mode  An ad hoc network is a group of computers  nach wath a wingit adaphor  connected  as an independent BL Tl ire LAN  Ad hoc wireless comouien operate on a  Peer to peer bugis  commerecating directly with each other without the use of an access pont     Please enter the SSID for your wireless network     a    Figure 5 3    4  If you chose Infrastructure Mode  go to Step 5 now  If you chose Ad Hoc  Mode  you ll see a screen similar to that shown in Figure 5 4  Select the  correct operating channel for your network from the Channel drop down  menu  Then  select the Network Mode from the drop down menu  Click the  Next button  and go to Step 5  Click the Back button to change any settings     Channel   The    R   channel you LINKSYS  choose should A Division of Cisco Systems  inc  match the chan  Setup Wizard ver  12  nel set on the Ad Hoc Mode Settings  other devices in  Selec the Chass you plan to use for your wares meteor  You may choose any   your wireless chanel as iong as a fe computers ara on be same channel  Cick Ment io  network  If you CE a  are unsure about Select a meteors ovadablity mode in Mad Mode  beth Vrekss 5 and Wireles   which channel ae rad a ch conmuncaing  D bash te  to use  select the l
34. itters and receivers to communicate directly with each other  elimi   nating the need for an access point  The drawback of this mode is that  in Ad   Hoc mode  wireless equipped computers are not able to communicate with  computers on a wired network  And  of course  communication between the  wireless equipped computers 1s limited by the distance and interference direct   ly between them                     Figure 2 2    Chapter 3  Getting to Know the  Wireless G PCI Adapter    The PCI Adapter will install into your PC like any PCI adapter and  on the  mounting bracket  you will find two distinguishing items     ACT LED Green  The ACT LED lights up when the Adapter is powered  on     Antenna Port Attach the PCI Adapter   s antenna here and position it for  maximum performance  which is usually perpendicular to  the horizon     Chapter 4  Hardware and Driver  Installation and Configuration for  Windows KP       After installing the Adapter into your PC  you will install the driver and con   figure the Adapter     Hardware Installation for Windows XP       1  Turn off your desktop PC     2  Open your PC case and locate an available PCI slot on the motherboard   Check with your computer manufacturer for instructions     3  Slide the PCI Adapter into the PCI slot  Make sure that all of its pins are  touching the slot s contacts  You may have to apply a bit of pressure to slide  the adapter all the way in  After the adapter is firmly in place  secure its fas   tening tab to your 
35. ose ro Must    conde wi D Be D Rn De nian   9 J a  default channel BEDT Mixed mode   Channel 6      Figure 5 4          Network Mode   Select Mixed Mode  and both Wireless G and Wireless   B computers will be allowed on the network  but the speed will be reduced   Select G Only Mode for maximum speed  but no Wireless B users will be  allowed on the network     The Setup    Wizard will ask    you to review  your settings  as  in Figure 5 5   before it starts  to copy files   Click the Next  button to save  these settings   or click the  Back button to  change any set   tings       After the files    have been suc   cessfully copied   the screen in  Figure 5 6 will  appear  Click  the Exit button           LINKSYS    Setup Wizard vec 1 2  Finalize Settings    Review ihe setings below belare completing the installation for the WLAN Monitor   Gack Back io change any matings  of Met l   complets your installation    Wireless Mode  ntractructure  SSID linksys  Channel Arte      il  Figure 5 5      INKSYS    ul Ci Systems  lin    Setup Wizard vor  1 2    Congratulations    The installation of the Wireless G PCI Adapter is  complete     Figure 5 6    Proceed to    Chapter 6  Hardware Installation for Windows 98SE  Me  and    2000        13    14    Chapter 6  Hardware Installation for  Windows 985E  Me  and 2000    Make sure that you do Chapter 5 and install the software with the  Setup Wizard before you install the hardware        1  Turn off your desktop PC     2  Open your PC case
36. rrus of Cinco Speen  lex    Security Settings    Enter your network s security information in the fields below       Passphrase   ssphrrse    Tho Passphrase is coso sonsitive and should be fower than 16 characters   You may manually enter your WEP key in hexadecimal format below        Figure 7 13      The Confirm R     New Settings _ aeaea  screen  Figure  7 14  will  appear  To save  the new settings   click the Yes  button  To can   cel the settings  and return to the  Profiles screen   click the No  button  To edit  the new settings   click the Back  button     LINKSYS   A Cerin of Cinco Spot  int    Wireless G PCI Adapter  WLAN Monitor vee 12    Figure 7 14      The Congratulations screen  Figure 7 15  will appear next  Click Activate    new settings now to implement the new settings immediately and return to  the Link Information screen  Click Activate new settings later to keep the  current settings active  and return to the Profiles screen so that you can edit  your profile or create another profile       R   gp  Wireless G PCI Adapter  WLAN Monitor vee 12    LINKSYS     Carini cf Cisco Septem  Inc    Congratulations    2  A GHz    Your Wireless G PCI Adapter has successfully been configured     Achivenbe Fur  Behings mow    Aecbvete mew  Settings lain       Figure 7 15    You have successfully created a connection profile  Click the X  Close  but     ton in the upper right corner to exit the WLAN Monitor        20    Common Problems and Solutions    Frequently Asked 
37. s XP has a built in configuration tool   Use Windows XP Wireless Zero Configuration  in the system tray at    res    Figure 4 1 the bottom of your screen  to configure the Adapter        1  After installing the Adapter  the Windows XP Wireless Zero Configuration  icon will appear in your computer   s system tray  see Figure 4 3   Double   click the icon     i  Wireless Network Connection 3    One or more wireless networks are available     To see a list of available networks  click here        Figure 4 3    2  The screen that appears will show any available wireless network  Select the  network you want     If you have already enabled WEP encryption on your network  skip ahead  to step 3     If you have NOT  APRS ec aed ie     enabled WEP encryp  ernie a ae    e folowing wireless network s  are ava   To access a  tion on your network  wireless network  select it from the list  and then click Connect     the screen in Figure 4 4  will appear  Check the  box next to Allow me to  connect to the selected  wireless network  even  though it is not secure   Then click the Connect    Available wireless networks     A This wireless network is not secure  Because a network    key  WEP  is not used for authentication or for data  encryption  data sent over this network might be subject to    unauthorized access   button and continue to  step 4   V  Allow me to connect to the selected wireless network   even though it is not secure    If you are having difficulty connecting to a network 
38. ssage units  datagram   between network devices over a LAN or WAN  While IP takes care of handling  the actual delivery of the data  routing   TCP takes care of keeping track of the  individual units of data  called packets  that a message is divided into for effi   cient delivery over the network  TCP is known as a  connection oriented  pro   tocol due to requiring the receiver of a packet to return an acknowledgment of  receipt to the sender of the packet resulting in transmission control     TCP IP  Transmission Control Protocol Internet Protocol    The basic com   munication language or set of protocols for communications over a network   developed specifically for the Internet   TCP IP defines a suite or group of  protocols and not only TCP and IP     Throughput   The amount of data moved successfully from one place to  another in a given time period     Topology   A network s topology is a logical characterization of how the  devices on the network are connected and the distances between them  The  most common network devices include hubs  switches  routers  and gateways   Most large networks contain several levels of interconnection  the most impor   tant of which include edge connections  backbone connections  and wide area  connections     WAN  Wide Area Network   A communications network that covers a rela   tively large geographic area  consisting of two or more LANs  Broadband com   munication over the WAN is often through public networks such as the tele   phone 
39. syss entire liability  under this warranty will be for Linksys at its option to repair or replace the product or  refund Your purchase price less any rebates     If the product proves defective during the Warranty Period call Linksys Technical Support  in order to obtain a Return Authorization Number  BE SURE TO HAVE YOUR PROOF OF  PURCHASE ON HAND WHEN CALLING  When returning a product  mark the Return  Authorization Number clearly on the outside of the package and include a copy of your  original proof of purchase  RETURN REQUESTS CANNOT BE PROCESSED WITHOUT  PROOF OF PURCHASE  You are responsible for shipping defective products to Linksys   Linksys pays for UPS Ground shipping from Linksys back to You only  Customers locat   ed outside of the United States of America and Canada are responsible for all shipping  and handling charges     ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY OR FITNESS  FOR A PARTICULAR PURPOSE ARE LIMITED TO THE DURATION OF THE WARRANTY  PERIOD  ALL OTHER EXPRESS OR IMPLIED CONDITIONS  REPRESENTATIONS AND  WARRANTIES  INCLUDING ANY IMPLIED WARRANTY OF NON INFRINGEMENT  ARE  DISCLAIMED  Some jurisdictions do not allow limitations on how long an implied war   ranty lasts  so the above limitation may not apply to You  This warranty gives You specif   ic legal rights  and You may also have other rights which vary by jurisdiction     TO THE EXTENT NOT PROHIBITED BY LAW  IN NO EVENT WILL LINKSYS BE LIABLE  FOR ANY LOST DATA  REVENUE OR PROFIT  
40. the Profiles screen  shown in Figure 7 6  click the New button to create  a new profile        Create connection profile       profile screen appears  Figure   Enter a name for the new profile    7 9   enter a name for the new      profile  Click OK to save the   profile name or click Cancel    to return to the previous  screen     Figure 7 9    3  The Choose a network type screen  Figure 7 10  shows a choice of two    wireless modes  Click the Infrastructure Mode radio button if you want  your wireless computers to communicate with computers on your wired  network via a wireless access point  Click the Ad Hoc Mode radio button  if you want multiple wireless computers to communicate directly with each  other  Click the Next button to continue or the Back button to return to the  previous screen     Infrastructure Mode   This mode allows wireless and wired networks to  communicate through an access point     Ad Hoc Mode   This mode allows wireless equipped computers to com   municate directly with each other  No access point is used     R   LINKSYS     A Covi of Cinco Sepeteemn  int    Wireless G PCI Adapter  WLAN Monitor vee 12    Choose a network type  tf Infrastructure Mode  nocturne mode  Tee wanted Gentes commune val Gach other and Lo    wingi  nihrork wil in Sots pimi  0 AdHoc Mode  In Adho mode  Be winekas Grice commurmciia direct with each oher wiog he ase of    an BODES por    Please enter the SSID for your wireless network   SSID Sora Sat WISE   A gaat erat  shang am
41. ttp   www art telecom fr  for procedure to follow     WMP54G_V2 eu UG 30815B KL    Table of Contents    Chapter 1  Introduction  The Wireless G PCI Adapter  Features    Chapter 2  Planning Your Wireless Network  Network Topology  Ad Hoc versus Infrastructure Mode    Chapter 3  Getting to Know the  Wireless G PCI Adapter    Chapter 4  Hardware and Driver Installation and  Configuration for Windows XP   Overview   Hardware Installation for Windows XP   Driver Installation for Windows XP   Windows XP Wireless Zero Configuration    Chapter 5  Software Installation and Configuration  for Windows 98SE  Me  and 2000   Overview   Setup Wizard Instructions for Windows 98SE  Me  and 2000    Chapter 6  Hardware Installation for Windows  98SE  Me  and 2000    Chapter 7  Using the WLAN Monitor for Windows  98SE  Me  and 2000   Overview   Accessing the WLAN Monitor   Link Information   Site Survey   Profiles   Creating a New Profile    NYO nw A    10  10  11    14    15  15  15  16  17  19  21    Chanter 1  Introduction    Appendix A  Troubleshooting 26 The Linksys Wireless G PCI Adapter installs in most desktops and lets you put  Common Problems and Solutions 26 your computer almost anywhere in the building  without the cost and hassle of  Frequently Asked Questions 26 running network cables  Now you don t have to drill holes in your walls and   climb through the attic or cellar to get connected to the network  Once you re   Appendix B  Glossary 30 connected  you can keep in touch with yo
42. uch as the  IEEE Computer Society     Infrastructure Network   An infrastructure network is a group of computers  or other devices  each with a wireless adapter  connected as an 802 11 wireless  LAN  In infrastructure mode  the wireless devices communicate with each  other and to a wired network by first going through an access point  An infra   structure wireless network connected to a wired network is referred to as a  Basic Service Set  BSS   A set of two or more BSS in a single network is  referred to as an Extended Service Set  ESS   Infrastructure mode is useful at  a corporation scale  or when it is necessary to connect the wired and wireless  networks     IP  Internet Protocol    The method or protocol by which data is sent from one  computer to another on the Internet  It is a standard set of rules  procedures  or  conventions relating to the format and timing of data transmission between two  computers that they must accept and use to be able to understand each other     IP Address   In the most widely installed level of the Internet Protocol  IP   today  an IP address is a 32 binary digit number that identifies each sender or  receiver of information that is sent in packet across the Internet  When you  request an HTML page or send e mail  the Internet Protocol part of TCP IP  includes your IP address in the message  actually  in each of the packets 1f more  than one is required  and sends it to the IP address that is obtained by looking  up the domain name in the 
43. ur e mail  access the Internet  use   instant messaging to chat with friends  and share files and other resources such   Appendix C  Specifications 38 as printers and network storage with other computers on the network   Environmental 39   The Wireless G PCI Adapter connects you with Wireless G networks at an   Appendix D  Warranty Information 40 incredible 54Mbps  And for added versatility  it can also interoperate with all   the 11Mbps Wireless B  802 11b  products found in homes  businesses  and   Appendix E  Contact Information 41 public wireless hotspots around the country  And in either mode  your wireless   communications are protected by up to 128 bit encryption  so your data stays  secure     So don t hassle with running cables through your house   get your desktop con   nected the easy way with the Linksys Wireless G PCI Adapter     e Operates in the 2 4Ghz frequency spectrum with throughput of up to 54  Mbps    e Complies with IEEE 802 11g standards  and backwards compatible with  IEEE 802 11b products    e Up to 128 bit WEP encryption  e 32 bit PCI Interface    e Compatible with Windows 98SE  Millennium  2000 and XP    Chapter 2  Planning Your Wireless    Network    A wireless local area network  WLAN  is exactly like a regular local area net   work  LAN   except that each computer in the WLAN uses a wireless device to  connect to the network  Computers in a WLAN share the same frequency  channel and SSID  which is an identification name for wireless devices     A
44. ure that your Wireless G PCI Adapter is configured on the same  channel and with the same security options as with the other computers in  the Infrastructure configuration     Can   run an application from a remote computer over the wireless network   This will depend on whether or not the application is designed to be used over  a network  Consult the application   s user guide to determine if 1t supports oper   ation over a network     Can   play computer games with other members of the wireless network   Yes  as long as the game supports multiple players over a LAN  local area net   work   Refer to the game   s user guide for more information     What is the IEEE 802 11b standard    It is one of the IEEE standards for wireless networks  The 802 11b standard  allows wireless networking hardware from different manufacturers to commu   nicate  provided that the hardware complies with the 802 11b standard  The  802 11b standard states a maximum data transfer rate of 11 Mbps and an oper   ating frequency of 2 4GHz     What IEEE 802 11b features are supported    The product supports the following IEEE 802 11b functions   e CSMA CA plus Acknowledge protocol   e Multi Channel Roaming   e Automatic Rate Selection   e RTS CTS feature   e Fragmentation   e Power Management    What is ad hoc mode    When a wireless network is set to ad hoc mode  the wireless equipped com   puters are configured to communicate directly with each other  The ad hoc  wireless network will not communicate 
45. with any wired network     What is infrastructure mode    When a wireless network is set to infrastructure mode  the wireless network is  configured to communicate with a wired network through a wireless access  point     What is roaming    Roaming is the ability of a portable computer user to communicate continu   ously while moving freely throughout an area greater than that covered by a sin   gle access point  Before using the roaming function  the workstation must make  sure that it is the same channel number with the access point of dedicated cov   erage area     21    28    To achieve true seamless connectivity  the wireless LAN must incorporate a  number of different functions  Each node and access point  for example  must  always acknowledge receipt of each message  Each node must maintain contact  with the wireless network even when not actually transmitting data  Achieving  these functions simultaneously requires a dynamic RF networking technology  that links access points and nodes  In such a system  the user   s end node under   takes a search for the best possible access to the system  First  1t evaluates such  factors as signal strength and quality  as well as the message load currently  being carried by each access point and the distance of each access point to the  wired backbone  Based on that information  the node next selects the right  access point and registers its address  Communications between end node and  host computer can then be transmitted up and 
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
IFS WMC303-1W-1T-1200 Quick Start Guide  Cisco Systems E1550 User's Manual    Guide d`utilisation 5122  Home Automation RC-81 User's Manual  pesando los alimentos - Weight Watchers Canada  Samsung TX-P2670WH User's Manual  TAFCO WINDOWS NU2-049V-W Installation Guide  フレキクランパ取扱説明書ver4.0  契約の交渉・締結というプロセスには、多くの関係者がかかわりをもち    Copyright © All rights reserved. 
   Failed to retrieve file