Planet Networking & Communication WL-3560 User Manual page 22

Ieee802.11g wireless pcmcia card
Table of Contents

Advertisement

changed or dynamically assigned by the network, the MAC address of a networking
device is permanent.
ü
What is WEP?
Wired Equivalent Privacy (WEP) is a type of data encryption mechanism described in
the IEEE 802.11 standard.
ü
What is WPA (Wi-Fi Protected Access)?
WPA resolves the issue of weak WEP headers, which are called initialization vectors
(IV), and provides a way of insuring the integrity of the messages passed through MIC
(called Michael or message integrity check) using TKIP (the Temporal Key Integrity
Protocol) to enhance data encryption. WPA-PSK is a special mode of WPA for home
users without an enterprise authentication server and provides the same strong
encryption protection. WPA is not an official IEEE standard, but is based on and is
expected to be compatible with the upcoming 802.11i security standard.
ü
Could I implement the driver/utility installations on another operating system, e.g.
Windows 98SE, 2000 and ME? Are there any differences of driver/utility
installations among these different operating systems?
Yes, you can. All the installation mentioned in this user's manual could be implemented
on Windows 98SE/ME/200/XP and there will be no difference.
ü
Can Wireless products support printer sharing?
Wireless products perform the same function as LAN products. Therefore, Wireless
products can work with Netware, Windows NT/2000/XP, or other LAN operating
systems to support printer or file sharing.
ü
What is DSSS?What is FHSS?And what are their differences?
Frequency-hopping-spread-spectrum (FHSS) uses a narrowband carrier that changes
frequency in a pattern that is known to both transmitter and receiver. Properly
synchronized, the net effect is to maintain a single logical channel. To an unintended
receiver, FHSS appears to be short-duration impulse noise. Direct-sequence
spread-spectrum (DSSS) generates a redundant bit pattern for each bit to be
transmitted. This bit pattern is called a chip (or chipping code). The longer the chip, the
greater the probability that the original data can be recovered. Even if one or more bits
in the chip are damaged during transmission, statistical techniques embedded in the
radio can recover the original data without-the need for retransmission. To an
unintended receiver, DSSS appears as low power wideband noise and is rejected
(ignored) by most narrowband receivers.
ü
What is Spread Spectrum?
Spread Spectrum technology is a wideband radio frequency technique developed by the
military for use in reliable, secure, mission-critical communication systems. It is
designed to trade off bandwidth efficiency for reliability, integrity, and security. In other
18

Advertisement

Table of Contents
loading

Table of Contents