Wireless Network Applet; About The Wireless Network; Terminology - Intermec 730 User Manual

700 series color mobile computer
Hide thumbs Also See for 730:
Table of Contents

Advertisement

Wireless Network Applet

About the Wireless Network

Terminology

700 Series Color Mobile Computer User's Manual
S To disable or unmap a currently mapped application from a correspon-
ding button, select "unassigned" from the applicable drop-down list.
S To restore these buttons to their defaults, tap Defaults in the lower
right corner.
Note; You cannot map an application to more than one button. Should
you assign the same application to two buttons, a verification prompt will
appear after the second button to confirm whether you want to remap the
application. If you tap Yes, the applet changes the first button to "unas-
signed" and map the application to the second button.
Note: All changes are activated immediately upon selection.
Note: See Chapter 4, "Network Support," for information about the
802.11b or 802.11b/g radio module.
Your wireless adapter (network interface card) connects to wireless net-
works of two types: infrastructure networks and ad-hoc networks.
S Infrastructure networks get you onto your corporate network and the
internet. Your 700 Color Computer establishes a wireless connection to
an access point, which links you to the rest of the network. When you
connect to a network via an access point, you are using the 802.11b or
802.11b/g infrastructure mode.
S Ad-hoc networks are private networks shared between two or more cli-
ents, even with no access point.
Each wireless network is assigned a name (or Service Set Identifier —
SSID) to allow multiple networks to coexist in the same area without in-
fringement.
Intermec recommends using security measures with wireless networks to
prevent unauthorized access to your network and to ensure your privacy of
transmitted data. The following are required elements for secure networks:
S Authentication by both the network and the user
S Authentication is cryptographically protected
S Transmitted data
There are many schemes available for implementing these features.
Below and on the next page are terms you may encounter as you configure
your wireless network:
S CKIP (Cisco Key Integrity Protocol)
This is Cisco's version of the TKIP protocol, compatible with Cisco
Airnet products.
Appendix
A
Configurable Settings
235

Advertisement

Table of Contents
loading

This manual is also suitable for:

750740741760761751 ... Show all

Table of Contents