Airgo Networks AGN3022UB1100 Airgo 3000 Series USB Adapter 2X2 User Manual Installation and User Guide

Airgo Networks Inc. Airgo 3000 Series USB Adapter 2X2 Installation and User Guide

User Manual

   Installation and User Guide Wireless LAN Client Adapter Installation and User Guide: Wireless LAN Client  Published December 2005
      Copyright © 2004, 2005 by Airgo Networks. All Rights Reserved.   No part of this work may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of unless such copying is expressly permitted by U.S. copyright law. Page 2 of 46  Installation and User Guide:  Wireless LAN Client
Contents    Contents .......................................................................................................................................... 3 Preface............................................................................................................................................. 4 Overview......................................................................................................................................... 5 Device Types .............................................................................................................................. 5 Shipping Package Contents......................................................................................................... 5 System Requirements.................................................................................................................. 5 Inserting and Removing the Wireless LAN Client Adapter....................................................... 5 Checking Adapter Activity ..................................................................................................... 7 Installing the Wireless LAN Client Adapter Driver and Client Utility ...................................... 7 Installation Steps..................................................................................................................... 7 Custom Installation................................................................................................................... 13 Uninstalling the Client Utility and Drivers............................................................................... 15 Introduction to the Client Utility................................................................................................... 16 Service Set Identifiers............................................................................................................... 16 Wireless Bands and Channels................................................................................................... 16 Client Utility Overview............................................................................................................. 17 Accessing the Client Utility...................................................................................................... 17 Using the Tray Icon .............................................................................................................. 17 Navigating the User Interface................................................................................................... 19 Default View......................................................................................................................... 19 Networks Tab........................................................................................................................ 23 Profiles.................................................................................................................................. 27 Monitoring Network Status................................................................................................... 29 Configuration Overview ............................................................................................................... 33 Scanning for Available Networks............................................................................................. 33 Working with Profiles............................................................................................................... 34 Wireless Security...................................................................................................................... 36 Regulatory..................................................................................................................................... 39 Glossary ........................................................................................................................................ 40 Index ............................................................................................................................................. 46 Installation and User Guide:  Wireless LAN Client  Page 3 of 46
Preface    This guide explains how to install and configure the Wireless LAN Client Adapter, which provides PC laptop and desktop users with access to 802.11 access points. The guide is intended for business and consumer users who want to install and configure the Wireless LAN Client Adapter quickly and easily. It is also intended for users who are interested in advanced configuration and troubleshooting. The products include the following device options:  PC Card adapter for use in laptop and notebook computers  Mini PCI adapter for use in laptop computer mini-PCI expansion slots The Client Utility, a software tool designed to provide basic configuration options for the device, is shipped with each unit along with the device drivers. Organization of this Guide  This guide consists of the following chapters: Chapter 1 describes the features of the Wireless LAN Client Adapter and explains how to install it. Chapter 2 provides an overview of the Client Utility. Chapter 3 describes the configuration settings of the Client Utility. Glossary defines terms that apply to wireless and networking technology and the product suite. Conventions Used in this Guide This guide uses the following conventions for instructions and information. Notes, Cautions, and Warnings Notes, cautions, and time-saving tips use the following conventions and symbols.      NOTE: Notes contain helpful suggestions or information that is important to the task at hand.      CAUTION: Caution indicates that there is a risk of equipment damage or loss of data when certain actions are performed.      WARNING: Warnings are intended to alert you to situations that could result in injury (such as exposure to electric current, for example).   Installation and User Guide: Wireless LAN Client  Page 4 of 46
Overview    The Wireless LAN Client Adapter provides the communication link between your laptop and other devices in a wireless network. Depending on the adapter configuration, it can operate in the 2.4 GHz radio frequency band or in the 2.4 and 5 GHz frequency bands and can communicate with any device that meets the compatible IEEE 802.11 standards. The Airgo product number determines the operating bands for any given adapter. When used with Access Points as part of a wireless network installation, the Wireless LAN Client Adapter offers the following special features:  o Extended range  o Multi mode operation o Interference handling  The Client Utility, shipped with each Wireless LAN Client Adapter, includes tools for setting the basic configuration. Device Types The Wireless LAN Client Adapter is currently offered in two device types: • PC Card — Extended Type II PCMCIA CardBus (32-bit interface) for use in laptop and notebook computers. • Mini-PCI— Mini-PCI adapter for use in laptop computer mini-PCI expansion slots. Mini-PCI adapters are installed by factory personnel when the PC system is configured by the PC manufacturer. For mini-PCI adapter information, consult your PC manufactures’s documentation. • USB— Universal Serial Bus adapter for use in laptop or desktop computer USB ports. Shipping Package Contents The Wireless LAN Client Adapter shipping package contains the following items: • Wireless LAN Client Adapter • CD containing the device driver and Client Utility System Requirements Your PC must meet the following minimum requirements: • Windows XP SP1 or SP2 or Windows 2000 SP4 • 128 MB memory • CPU 750 MHz or greater • At least 10 MB disk capacity available for the driver and Client Utility software. • Type II or Type III CardBus slot for notebooks and laptops Inserting and Removing the Wireless LAN Client Adapter To insert the PC card: Installation and User Guide:  Wireless LAN Client  Page 5 of 46
     1 With the computer powered on or off, slide the PC card firmly into an available CardBus slot (Figure 1).   Figure 1: PC Card Installation   To safely remove the PC card while the computer is powered up: 2 Right-click the system tray icon entitled Safely Remove Hardware or Eject or Stop Hardware. The system prompts you to select the device to stop. 3 Select Wireless Adapter, and click Stop. 4 Click OK when asked to confirm. 5 Press the CardBus eject button on the side of your computer to release the slot locking mechanism and slide the PC card out.  To install the USB adapter: 1 Attach the USB cable to the USB adapter and then insert the remaining USB connector into the PC USB port.    Attach to USB PC port                                                                                        Attach to USB Wireless Adapter Figure 2: USB Adapter Installation  To safely remove the USB Adapter while the computer is powered up: 2 Right-click the system tray icon entitled Safely Remove Hardware or Eject or Stop Hardware. The system prompts you to select the device to stop. 3 Select Wireless Adapter, and click Stop. 4 Click OK when asked to confirm. Page 6 of 46  Installation and User Guide:  Wireless LAN Client
5 Remove the USB cable from the PC.  Checking Adapter Activity The LEDs on the PC Card and USB Adapter indicate the state of current communications. LED 1 is on the left and LED 2 is on the right when the PC Card is facing up (thick section on top, metallic contact on the bottom). On the USB Adapter LED 1 is on the bottom, LED 2 is in the middle and LED 3 is on the top when the USB Adapter is facing up (Cable to PC is on the bottom): • LED 1 — Shows solid green when the adapter is associated (connected) to the network. • LED 2 — Blinks green when the adapter is transmitting or receiving data. The blinking speed reflects the level of network activity. • LED 3 — On the USB Adapter only, indicates power is being successfully received from the attaching host.  Installing the Wireless LAN Client Adapter Driver and Client Utility Follow the steps in this section to install the software needed to support your Wireless LAN Client Adapter. The software includes: • Wireless LAN Client Adapter driver • Client Utility Installation Steps 1 Power up the computer in which the Wireless LAN Client Adapter will be installed. 2 Insert the Wireless LAN Client distribution CD, which should automatically start the Client Utility Setup. If the wizard does not start automatically, open the CD and double-click Setup.exe, the Client Utility Setup opens.  Installation and User Guide:  Wireless LAN Client  Page 7 of 46
       3 Click Install Software.   The Installation Wizard opens.     4 Click Next.  The License agreement window opens.   Page 8 of 46  Installation and User Guide:  Wireless LAN Client
  5 Review the license agreement, and then choose I accept the terms in the license agreement. 6 Click Next. 7 Enter a user name and organization name, and indicate whether access to the Client Utility will be permitted for all users or just the specified user.   Installation and User Guide:  Wireless LAN Client  Page 9 of 46
      8 Click Next. 9 Accept Complete as the setup type.     NOTE: If you select Complete, the software is automatically installed in the default location. To choose another location, select the Custom option; see Custom Installation in this chapter for additional information.    10 Click Next. 11 Click Install to begin installation. To review previous selections, click <Back.    Page 10 of 46  Installation and User Guide:  Wireless LAN Client
The wizard completes the installation of the driver and the Client Utility and presents the completion window.    Select Use Windows to manage my wireless network settings if you want to use Microsoft Wireless Zero Configuration (WZC) to manage the Client Adapter.     NOTE: For instructions on enabling or disabling WZC, see Appendix A, “Using the Client Utility With Windows XP.” You can change the WZC option at a later time by clicking Client Utility WZC button.  12 Click Finish to complete the software installation. 13 Now, insert the Wireless LAN Client Adapter. The Found New Hardware Wizard opens.  Installation and User Guide:  Wireless LAN Client  Page 11 of 46
       14 If your system has Windows XP Service Pack 2, a welcome window opens. Select No, not at this time to the question, Can Windows connect to Windows Update to search for software and Click Next. 15 For all installations, the following window now opens. Accept the default to install the software automatically. 16 Click Next. 17 Should a message appear regarding Windows logo testing, click Continue Anyway to install the Client Adapter drivers.    18 The installation proceeds. When the process is complete, the Completing the Found New Hardware Wizard window opens. 19 Click Finish.  Page 12 of 46  Installation and User Guide:  Wireless LAN Client
  The installation is now complete. Examine the LEDs to confirm that the Client Adapter is installed and working properly. See “Inserting and Removing the Wireless LAN Client Adapter”. Custom Installation Follow these steps if you want to change the default software installation location. 1 In the Customer Information window, select Custom, and click Next>.     Installation and User Guide:  Wireless LAN Client  Page 13 of 46
       2 Click Change… to select a new location.  3 Enter the path for the new location, or select a location for the pull-down “Look in:” window to select a path.    4 Click OK. Page 14 of 46  Installation and User Guide:  Wireless LAN Client
Uninstalling the Client Utility and Drivers Uninstall the Client Utility if you are upgrading to a newer version of the utility or wish to remove the Client Utility and Client Adapter drivers from the PC system. To do so, use the Windows Add or Remove Programs utility.  To access Add or Remove Programs: 1 Exit the Client Utility from the icon in the system tray. 2 Choose Start > Control Panel > Add or Remove Programs. 3 Select the Client Utility program, and click Remove. 4 Confirm that you want to remove the program, and follow the wizard instructions for program removal. Installation and User Guide:  Wireless LAN Client  Page 15 of 46
     Introduction to the Client Utility   The Wireless LAN Client Adapter connects your PC to a wireless local area network (WLAN) using radio frequency signals. An access point is a wireless device that forwards data from the wired network to your WLAN equipped PC using radio frequency signals and provides network connectivity between your PC and other wireless and wired users and resources. The IEEE 802.11 standard identifies two types of wireless networking types: In an infrastructure network, an access point links the wireless LAN to a wired network. By attaching to an existing network infrastructure, you can gain access to resources on the wired network, other wireless LANs, or the Internet. This is the network type to use when setting up a home network or accessing an office network.  In an ad-hoc wireless network, you establish communications between your PC and one or a small number of other wireless users without using an access point.       The Wireless LAN Client Adapter installed on your PC can communicate with any access point in infrastructure mode or other PCs in ad-hoc mode if those devices support the industry standard IEEE 802.11 wireless communications protocols. Service Set Identifiers The Service Set Identifier (SSID) is a name that uniquely identifies a wireless local area network. Each device in the wireless network must use the same SSID in order to participate in that network. The SSID can be up to 32 alphanumeric characters in length and is also known as the wireless network name.  The 802.11 standard specifies two types of network service sets identified by SSID:  Basic Service Set (BSS)—A collection of wireless devices operating with an access point in infrastructure mode (Basic Service Set - BSS) or without an access point in ad-hoc mode (Independent Basic Service Set - IBSS). Extended Service Set (ESS)—A collection of BSSs with wireless devices that can roam from one BSS to another while remaining connected to wireless network resources. Wireless Bands and Channels The IEEE 802.11 specification addresses wireless devices that operate in the 2.4 and 5 GHz radio frequency bands. Within each band (range of radio frequencies) individual channels carry a separate radio signal. Automatic and manual channel selection is provided, along with monitoring and analysis capabilities to assess the status of radio coverage and signal quality.     NOTE: The WLAN Client Adapter may be limited to a single frequency band or a restricted range of radio frequencies (channels) within a frequency band depending on regulatory requirements. See the Regulatory section of this document for additional regulatory information.  Page 16 of 46  Installation and User Guide:  Wireless LAN Client
Client Utility Overview The Client Utility enables you to perform the following functions:  Obtain a view of your wireless network, including the type of network, the access point or ad-hoc network with which you are associated, and information about the radio signals currently being transmitted and received.  Scan and connect to wireless networks within radio range of your wireless LAN adapter.  Create or select a profile, which stores the specifics of the network connection and security selections for your Wireless LAN Client Adapter. The Client Utility supports multiple profiles, enabling you to connect to different networks, whether at home, at work, or at wireless hotspot locations.       To use the profile features of the Client Utility on Windows XP, you must specify that Windows will not be managing the Client Adapter.  Accessing the Client Utility The Client Utility normally runs automatically when the Client Adapter is installed, and the application icon appears in the Windows system tray. If the Client Utility is not running, you can start it from the Start menu: Choose Start > Programs > ... > Client Utility . Using the Tray Icon When you start the Client Utility, a small signal icon becomes visible in the system tray on the Windows toolbar.        ↑ Application Icon  The color and signal strength indicators of this icon reflect the quality of the wireless connection:  Icon Description    No adapter present     Adapter present, radio on, no association    Adapter present, radio on, poor signal quality     Adapter present, radio on, good signal quality    Adapter present, radio on, excellent signal quality  The tray icon has a right-click menu that includes the following options:  Installation and User Guide:  Wireless LAN Client  Page 17 of 46
       The Exit selection closes the Client Utility. Reopen the Client Utility from the Windows Start>Programs.  The Auto Connect to Best Network selection provides for auto connection to a wireless network with the highest signal strength and most appropriate security settings.  The Use Windows to Manage This Adapter selection provides for the selection of Microsoft WZC for managing the adapter.  A window will appear for confirmation to allow Windows to manage the network connections for the adapter.    Click the Yes button to confirm.  Open the Wireless Network Monitor displays the default view for the Client Utility.  Page 18 of 46  Installation and User Guide:  Wireless LAN Client
Click to close the Client Utility on the desktop. The CU is still active. To exit the CU, right click the system tray CU icon and select the Exit option or press Alt+F4 to exit the CU when the CU is on the desktop.  Navigating the User Interface This section explains how to use the Client Utility interface.  Default View  The default view is the Status view. The Status view provides information about the current connection if one exists. The Client Utility will use the list of saved profiles in descending order to initiate an association. If none of the networks in the profile list are available networks, association with the Best Network will be initiated.     NOTE: Networks (SSIDs) in the profile list that do not have the Auto Connect option enabled will not be automatically scanned upon Client Utility initiation.      The security, network mode and Internet access is shown pictorially in the Status view. In addition, the following information is displayed: Installation and User Guide:  Wireless LAN Client  Page 19 of 46
      Item   Description Network Name (SSID)  If Status is Connected, lists the name of the network to which the Client Adapter is connected. Network Type  If Status is Connected, indicates the type (Infrastructure or Ad-Hoc) of network association. Authentication  If Status is Connected, indicates the security method used to authenticate this client to the network. Encryption  If Status is Connected, indicates the security method used to encrypt information transmitted and received by this client. Channel  If Status is Connected, lists the radio channel used for this connection. Max Transmit Rate  If Status is Connected, indicates the current transmit rate in megabits per second (Mbps) for this connection. AP Beacon Name If Status is Connected, lists the name of the AP transmitted in Beacon frames, if name is supported by the AP, to which the Client Adapter is connected, when the Network Type is Infrastructure. For an ad-hoc network type, this field will always be blank. AP Radio MAC  If Status is Connected, lists the Media Access Control (MAC) address of the WLAN device to which the Client Adapter is associated.  IP Address  If Status is Connected and an Internet Protocol (IP) address has been assigned either dynamically by a DHCP server or statically by manual input, the IP address is listed here in dotted decimal format. Signal Strength  If Status is Connected, the strength of the wireless connection is shown in decibels per meter (dBm) where the more negative the number, the lower the signal strength (power of the radio signal).  In addition to the Status tab, there is a tab for viewing available wireless networks (Networks tab), for creating profiles (Profiles tab) for association to networks that are commonly accessed by the client adapter, and for determining the health and performance of the current connection (Diagnostics tab).  In addition to the four selection tabs, there are four buttons:  Radio, Auto-Connect, WZC and Help. These buttons are toggles for the functions they affect.   Radio  The Radio button toggles the state of the radio from on to off or off to on.  The transition from on to off and off to on requires a few seconds. The color change in the Radio button will indicate the transition as follows:          The Radio is in the ON state.     The Radio is in the OFF state.  Page 20 of 46  Installation and User Guide:  Wireless LAN Client
  Auto-Connect  The Auto-Connect button can be used to force an association to the previously connected network or to the “best” network currently available or can be set to the off or disabled state.    Auto-Connect is in the enable/on state. Connection to the previously connected network or to the “best” network currently available will occur automatically.    Auto-Connect is in the disabled/off state. Connections will not be established automatically.   WZC  The WZC button toggles the management of the network connection between WZC and the Client Utility (Windows XP only).    Microsoft Windows Wireless Zero Configuration is currently managing the network connection.    The Client Utility is currently managing the network connection.  Help  The Help button provides context sensitive help for the current page. All help files can be printed. All help pages can be resized during viewing.  For AGN3xx based adapters an additional   tab will appear between the WZC and Help tabs.  Installation and User Guide:  Wireless LAN Client  Page 21 of 46
       Provides configuration options for the following:    Compression—provides real-time hardware data compression which increases data throughput using pre-compressed frames with no impact on host processor. OFF by default.  Concatenation-- provides for the merging of data from several packets into one which increases throughput by removing overhead due to inter frame spacing and preambles. The performance benefit is in enhancing throughput at higher data rates. ON by default.  Adaptive Channel Expansion-- provides increased data rates by increasing the RF bandwidth. The existing 20 MHz bandwidth is increased to 40 MHz by combining adjacent channels. Driver includes support for data rates up to 240 Mbps:  ♦ 802.11b:  1, 2, 5.5, 11 Mbps ♦ 802.11g: 1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, 54 Mbps ♦ Airgo True MIMO: Single Channel--24, 36, 40, 42, 48, 72, 80, 84, 96, 108, 120, 126 Mbps. Channel Expansion--48, 72, 80, 84, 96, 144, 160, 168, 192, 216, 240 Mbps.  Power Savings—provides battery life savings by powering off adapter components during periods of idle network activity. OFF by default.  Above the Copyright notice on the left is a Link Status area . Moving the mouse over this area will display the status in a text box.  The Link Status area shows whether a connection has been established to the AP/Gateway, and if so, the type of connection (either Infrastructure or Ad-hoc), whether a connection has been established to the Internet, and whether the connections are secure. The image changes with the current status. The Link Status area is visible in each view. Page 22 of 46  Installation and User Guide:  Wireless LAN Client
 On the right, the Signal Strength Indicator   shows incremental signal strength where each segment is equal to 5% of the maximum of 100% signal strength.  There are additional functions and indicators available in the default view. The Save to Profile button in the bottom right of the Status view creates a profile with the properties of the current connection.  The new profile will appear in the Profiles view. Networks Tab The Networks tab lists all the networks within radio range of your Client Adapter. The Networks view provides information about the networks available for association.  Item   Description  Infrastructure  Secured Infrastructure  Ad-Hoc Network Type Icons Network Name (SSID)  The name of each of the networks within radio range. Signal  The relative signal strength as a percentage. Security  The security method enforced for each of the networks. Channel  The channel number and 802.11 physical mode (a/b/g) of each network. QoS  Quality of Service capability advertised by each network.  The currently associated network appears colored.    Installation and User Guide:  Wireless LAN Client  Page 23 of 46
      Any of the following operations can be performed on the Networks list:  Item   Description Refresh  Causes the Client Adapter software to immediately scan for all the wireless networks within radio range. Detected networks are presented in the Networks list.  Connect  Opens appropriate security dialog boxes as necessary and attempts association with the selected SSID. Report Generates a color coded list of networks within radio range including the network SSID, BSSID(s), Security Mode, Support Rates, Basic Rate Set, Channel Mode, Network Type, Advertised Country Code, Advertised Channels and Maximum Output Power, True MIMO capability and Signal Strength as a percentage. The report generated can be resized, printed, saved and copied to the clipboard. Sort entries by column Click the column header. The arrow that appears indicates the sort order (upward facing for ascending and downward facing for descending). To change the sort order, click the column header again.    Clicking the   button will cause the Client Utility to scan for available networks.  Highlighting a particular network and clicking the   button will cause initiation of a connection to that network which, depending on the network parameters, may invoke the configuration dialog boxes for security parameters, etc.  When there is more than one radio (BSSID) for a given SSID, the connect button will have a selector arrow on the right hand side . Clicking on the selector arrow will provide a list of all radios (BSSIDs) their signal strength, channel and mode for the select SSID (Network Name).  Page 24 of 46  Installation and User Guide:  Wireless LAN Client
  Any of the BSSIDs may be selected. By default the BSSID with the best signal strength will be selected.     NOTE: The selection of a specific AP within an SSID (e.g. a BSSID) may prevent access to network-wide resources in a mobile environment.  Clicking the   button will generate a report for all of the networks in the Networks list. The report can be resized while viewing. Report information contains:      Report Information Item Description SSID  Network Name of each of the networks in radio range. BSSID  MAC addresses of the radios belonging to the SSIDs within radio range. Security  Security mode (WEP, WPA/WPA2 Personal, WPA/WPA2 Enterprise, or Disabled) for the BSSID. Supported Rates  All data rates supported by each BSSID. Basic Rates  Minimum data rates supported by each BSSID. Channel Mode  Radio channel and IEEE 802.11 physical mode (a/b/g) for each BSSID. Type  Network type (Infrastructure or Ad-Hoc) of each BSSID. Country  International Standards Organization (ISO) two character Country Code advertised by each BSSID. Installation and User Guide:  Wireless LAN Client  Page 25 of 46
     Item Description Channels Advertised operating channels and maximum output power for each BSSID.1True MIMO  Use of enhanced, True MIMO, data rates (Yes or No). Signal %  Strength of the radio signal, as a percentage.  Clicking the selector arrow   on the Print button provides several   print selections.  Clicking the   button will copy the report screen to the clipboard with an accompanying notification . Click OK to continue.  Clicking the   button will allow the report to be saved to a file. There are several options for saving the report file, including location, file name, file type and file encoding:                                                   1 The available channels are governed by regulatory law. The client adapter contains an ISO country code programmed into EEPROM which defines the operational channels for a given regulatory domain. Page 26 of 46  Installation and User Guide:  Wireless LAN Client
  Clicking the   button closed the Network report. Profiles The Profiles tab shows all the networks (SSIDs) for which a network profile is defined. Any of the following operations can be performed in the Profiles tab view:  Item   Description New  Click New to open the Create Connection Profile dialog box which launches the Profile Wizard. Modify To change information in an existing profile, highlight an entry and use the arrows at the bottom of the list to move the entry up or down. Import  Click Import to add profile configuration information from an external source. The .cfg profile exported is a text file that can be edited with any text editor. Item   Description Export  Click Export to save profile configuration information as an external .cfg file. Each profile is saved as a separate file in the selected location with a file name the same as the profile name and a file type of cfg. Delete  Click Delete to eliminate a profile. Installation and User Guide:  Wireless LAN Client  Page 27 of 46
      The icons adjacent to the Profile name indicate auto connect and connection state for the profile.  Icon Description    This Profile is the active profile.    Auto Connect is enabled for the profile.    Auto Connect is disabled for the profile.    The up   and down arrows move the selected profile up or down in the profile selection list. SSIDs in profiles at or near the top of the list which have auto connect enabled are scanned for before other SSIDs in the ordered profile list.  The remaining area on the Profiles tab displays read-only information about the profile and its settings: Page 28 of 46  Installation and User Guide:  Wireless LAN Client
 Profile Details  Item Description Network Type  The network type (Infrastructure or Ad-Hoc) for profile. Authentication The security method used to authenticate this client to the network for this profile. Encryption  The security method used to encrypt information transmitted and received by this client using this profile. Access Point The BSSID for this profile. The Client Utility provides for association to a specific Access Point within an SSID. NOTE: The selection of a specific AP within an SSID (e.g. a BSSID) may prevent access to network-wide resources in a mobile environment. Auto Connect The profile Auto Connect option is checked by default for each profile. To disable this option, click the checkbox. When the Auto Connect option for a profile is disabled (unchecked), the network (SSID) for this profile will not be automatically scanned for nor connected with when the Client Utility is launched. Monitoring Network Status Once a profile is activated and you are associated to the selected network, the Status tab presents status of the connection and the Diagnostics tab shows performance, client health and client software information.   Performance  Item Description Transmit Rate  The rate at which data was last being transferred from this client adapter. Beacons are always sent at 6 Mbps.  Receive Rate  The rate at which data was last being received from this client adapter. Beacons are always received at 6 Mbps. Transmitted Packets  The cumulative number of packets of data transmitted since the driver was loaded onto this client adapter. Received Packets  The cumulative number of packets of data received since the driver was loaded onto this client adapter. Signal Strength  The strength of the wireless connection in decibels per meter (dBm) where the more negative the number, the higher the signal strength (power of the radio signal).  Installation and User Guide:  Wireless LAN Client  Page 29 of 46
      Health  Item Description Installation Successful  The status of the client adapter driver and client utility. Radio Enabled  The status of the radio on the client adapter. IP Address Assigned  The status of IP address assignment. AP Connectivity OK  The status of an infrastructure connection (an AP found and associated for the SSID or BSSID). Internet Access OK  The status of an internet connection for the active wireless connection (successful ping to www.google.com).          Page 30 of 46  Installation and User Guide:  Wireless LAN Client
 Versions  Item Description Client Utility  The version of the Client Utility that is currently managing the network connection.  NDIS Driver  The version of the client adapter driver that is currently loaded on the adapter. Security Library  Version of the Meetinghouse Aegis Security library. PCI Identifier  The Vendor ID (PID/SVID) and System ID (SID) of the client adapter. MAC Address  The MAC address of the wireless client adapter.   For AGN3xx based adapters an additional   button is available in the Performance Check section to display advanced statistics.    The advanced button provides the following tabular information: Installation and User Guide:  Wireless LAN Client  Page 31 of 46
       Page 32 of 46  Installation and User Guide:  Wireless LAN Client
Configuration Overview    The Client Utility uses profiles to store connection parameters defining how your Wireless LAN Client Adapter associates to a wireless network. Each profile contains information about the target network including type of network connection and security settings. To make it easy to connect to wireless networks at home, office, or wireless hotspot locations, the Client Utility allows you to create multiple profiles, each profile contains information about a different network and its set of configuration values. When you move from one location to another, your Client Adapter automatically detects the currently available network(s) and applies the correct profile. The Profiles tab on the Client Utility contains an entry for each profile.  The following rules apply when connecting to a wireless network:   The Client Utility always attempts to connect to the last successfully connected network. If that network is not available, then the utility attempts to connect to a network with a configured profile, in the order in which the profiles are listed.   If there are no previously configured profiles, or if it is not possible to connect to any currently configured networks, the Client Adapter attempts to connect to an AP with the best signal quality, open authentication, and no encryption.  If all the connection options fail, or if you want to connect to a different available network, you can create a profile for the network with appropriate security parameters or double click that network from the Available Networks tab. Clicking Save to Profile on the Connection tab will make this network available for automatic connection in the future. Scanning for Available Networks Upon driver load, the Client Adapter scans for all networks within radio range and attempts to connect to one of them based on previously created profiles with auto-connect enabled. It associates to the first network it finds for which it can establish radio communications. Although association normally happens automatically; it is recommended that you keep the Client Utility running while you are connected. This enables you to verify the configuration and confirm that the SSID/BSSID to which you are connected is a trusted component of your network. Whenever the Client Utility is opened, an automatic scan is performed. You can also scan for networks on demand, at any time. To scan for available networks: Choose Start > Programs > ... > Client UtilityThis sequence displays the application icon in the system tray. Right click and select Open Wireless Network Monitor. The Client Utility will open to the default view (Status); select the Networks tab and click the Refresh button. Subsequent closing and reopening of the Client Utility from the system tray will return the Client Utility to the last open view. Installation and User Guide:  Wireless LAN Client  Page 33 of 46
     Working with Profiles Profiles store configuration information about how your Wireless LAN Client Adapter connects to specific wireless networks. Use the Profile Wizard to create new profiles or modify or delete existing ones. To utilize an available network to create a profile, double click that network from the Networks tab,  a prompt for security information, if required, will appear.   Use the Connect button to associate to that selected network. When the connection is complete, click the Save to Profile button on the Status tab to save the parameters of this connection in a profile for future use. When ever a profile is created or modified from the Profiles tab, the Profile Wizard will prompt for the following configuration parameters:   Field   Description Profile Name  The name to be associated with this profile. This will also be used as the filename should this profile be Exported to a .cfg file. Network Name (SSID) Service Set Identifier (SSID) is a name that uniquely identifies a wireless local area network. Each device in the wireless network must use the same SSID in order to participate in a cohesive wireless network.  Network Type The Network Type indicates the type of wireless network.  Infrastructure—Refers to a wireless network in which clients associate to access points or broadband gateways which usually interface to a wired local or wide area network, for Internet and email access, file sharing, and print and other services. Ad-Hoc—Refers to wireless network in which clients associate with each other, typically on a temporary basis and usually without a wired local or wide area network connection. BSSID  BSSID of specific AP/Gateway to connect to.  Default is “Best available” which is the one with the highest signal strength. Channel In infrastructure networks, the channel used for radio communications is determined at the access point and for ad-hoc networks; the channel is determined by the user who starts the network. The Profile Wizard presents a channel selection2 if the Network Type selected was Ad-Hoc. Network Mode If the Network Type selected was Ad-Hoc, in addition to selecting a radio channel on which the ad-hoc network will communicate, one or more of the IEEE 802.11 physical layer modes which include 802.11a, 802.11b and 802.11g needs to be selected. The valid network mode(s) for the client adapter is shown in the network mode pull-down list.                                                  2 Channel selection is governed by regulatory law. Page 34 of 46  Installation and User Guide:  Wireless LAN Client
Security The authentication and encryption settings provide options for configuring a secure connection between your PC and the wireless network. The following security options are configurable when using the Client Utility: Disabled—No authentication or encryption.  WEP (Wired Equivalent Privacy)—64 or 128-bit key based encryption.  WPA-Personal (Wi-Fi Protected Access)—Passphrase/PSK based authentication with TKIP encryption and AES encryption for forward compatibility. WPA2-Personal—Passphrase/PSK based authentication with AES encryption and TKIP encryption for backward compatibility.  WPA-Enterprise—RADIUS server based authentication using PSK and IEEE 802.1x; with TKIP encryption and AES encryption for forward compatibility. WPA2-Enterprise— RADIUS server based authentication using IEEE 802.1x/EAP with AES encryption and TKIP encryption for backward compatibility.  RADIUS (Remote Authentication Dial-In User Service)—Server based authentication using EAP TLS, or EAP TTLS, or EAP PEAP with no encryption.  See the Wireless Security section in this document for additional background information on wireless security options and guidelines for security settings in the enterprise, small office, and home environments. WEP Encryption WEP encryption based on shared WEP keys. The keys are 64-bit or 128-bit and must be specified in hexadecimal (base-16) format.  WEP Key 64-bit WEP requires: 10 hexadecimal digits including the characters A-F and 0-9 or 5 valid ASCII characters.  128-bit WEP requires: 26 hexadecimal digits including the characters A-F and 0-9 or 13 valid ASCII characters.  Tx Key Select from one of 4 Tx (transmit) encryption keys. The Tx encryption key of choice is typically provided by the network administrator.  Authentication Auto—System determined Open or Shared. Open—No authentication. Installation and User Guide:  Wireless LAN Client  Page 35 of 46
     Shared—Authentication based on a WEP key exchange. WPA/WPA2-Personal PSK Encryption WPA-Personal requires the support of TKIP (Temporal Key Integrity Protocol) as an encryption method. This client utility and driver also support AES (Advanced Encryption Standard) as a WPA-Personal encryption method. WPA2-Personal requires the support of AES as an encryption method. This client utility and driver also support TKIP as a WPA2-Personal encryption method. Authentication Passsphrase—Enter the pre-shared key required for network access. WPA/WPA2-Enterprise (RADIUS server required) Encryption WPA-Enterprise requires TKIP (Temporal Key Integrity Protocol) as an encryption method. This client utility and driver also support AES (Advanced Encryption Standard) as a WPA-Enterprise encryption method. WPA2-Enterprise requires AES as an encryption method. This client utility and driver also support TKIP as a WPA2-Enterprise encryption method.  Authentication Method Authentication using EAP TLS, or EAP TTLS, or EAP PEAP requiring certificates which must be maintained in the authentication server and supplicant. Login Name Network login provided by your network administrator.  Certificate Select the security certificate that has been installed on this PC to provide server authentication for this network name (SSID). RADIUS Authentication Method Authentication using EAP TLS, or EAP TTLS, or EAP PEAP requiring certificates which must be maintained in the authentication server and supplicant.  Login Name Network login provided by your network administrator.  Certificate Select the security certificate that has been installed on this PC to provide server authentication for this network name (SSID).  Wireless Security Although security is important in any network, the characteristics of wireless networks can make them vulnerable to attack. Unlike wired networks, which require a physical connection that can be secured with lock and key, wireless networks require only a radio signal for communication, and physical barriers do not provide protection. A concern since the introduction of the IEEE Page 36 of 46  Installation and User Guide:  Wireless LAN Client
802.11 wireless communication standard, wireless security continues to evolve, as shortcomings of existing security solutions are uncovered and new solutions are adopted.   Wireless security encompasses two major components: encryption and authentication. Encryption provides a mechanism for protecting data transferred across the wireless link from eavesdropping. Authentication provides a mechanism so that the identity of your PC or your identity, or both, are confirmed so that you may gain access to the network. Authentication   Effective authentication methods rely on manual distribution of shared or pre-shared authentication keys or automatic generation of keys by a RADIUS (Remote Authentication Dial-In User Service) server.  A shared or pre-shared key is an authentication string entered at the access point and client PCs. Authentication takes place by matching the key stored in each PC with the key stored in the access point.  Automatic key-generation methods rely upon digital certificates, which contain encoded user and encryption information to verify the identity of a user and match it with a database of secure user records. A certificate authority is the network service that manages digital certificates and guarantees their integrity. The IEEE 802.1X standard specifies certificate-based authentication using EAP (Extensible Authentication Protocol). EAP, in turn, comes in numerous variations. Most enterprises manage remote access to the certificate authority using a RADIUS (Remote Authentication Dial-In User Service) server. In this arrangement, client PC users install RADIUS client software on their local PCs to provide RADIUS server access. Funk Software and Microsoft are the major suppliers of RADIUS client software. For home or small office networks, shared or pre-shared keys can provide adequate authentication without the burden of centralized management and control. A built-in RADIUS security portal is provided in some Access Points to extend the management and scalability features of centralized management to administrators in small-to-mid sized office environments. Encryption    Encryption protects wireless data from being intercepted and deciphered during transmission, and thereby assures the security of your data. The Client Adapter is compatible with the following options: AES (Advanced Encryption Standard) -- Excellent, financial-grade security. TKIP (Temporal Key Integrity Protocol) -- Good security, used as an enhancement for legacy systems. WEP (Wired Equivalent Privacy) -- Minimal security, acceptable for non-critical data. Open or no encryption -- No protection, use for non-critical communications or in conjunction with other security protocols such as https or VPN/IPsec for corporate communications. The most effective encryption/authentication methods are part of the WPA (Wi-Fi Protected Access) cipher suite and are recommended for all environments in which security is an important consideration, whether in the enterprise, small office or home. WPA provides much more complete protection against discovery of encryption keys than does the WEP standards. WPA has progressed through two generations of encryption technology to date, with AES being the Installation and User Guide:  Wireless LAN Client  Page 37 of 46
     latest and most effective. TKIP is the encryption protocol that was first introduced with WPA, but it provides less comprehensive protection than does AES. The original 802.11 wireless communication specification standard included WEP for wireless security. Still widely used today, WEP security provides some security protection, but can be vulnerable to attack. Use WEP in cases where the access point does not support higher level security and security is a consideration in your network design. .The WEP algorithm requires an encryption key or keys to be used in the encrypting and decrypting of data. The Client Utility uses 64-bit or 128-bit encryption keys, which can be specified in hexadecimal (numeric) or ASCII format. Hexadecimal keys must be 10 hex digits in length (64-bit) or 26 hex digits in length (128-bit), where hex digits are in the range 0-9, A-F).  Example: 64-bit: 55772abbcc ; 128-bit: 12340987afcb45677fdc789045   ASCII characters must be 5 (64-bit) or 13 (128-bit) characters in length.  Page 38 of 46  Installation and User Guide:  Wireless LAN Client
Regulatory    FCC Certifications  This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:   Reorient or relocate the receiving antenna.   Increase the separation between the equipment and receiver.   Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.   Consult the dealer or an experienced radio/TV technician for help.   CAUTION:  Any changes or modifications not expressly approved by the grantee of this device could void the user’s authority to operate the equipment.  This device complies with Part 15 of the FCC rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) This device must accept any interference received, including interference that may cause undesired operation.   FCC RF Radiation Exposure Statement  This device complies with FCC radiation exposure limits set forth for an uncontrolled environment, and users must follow specific operating instructions for satisfying RF exposure compliance.  This transmitter must not be co-located or operating in conjunction with any other transmitter or antenna.  This equipment has been SAR – evaluated and is authorized for use in laptop and notebook computers.  Installation and User Guide:  Wireless LAN Client  Page 39 of 46
     Glossary    This glossary defines terms that apply to wireless and networking technology.  802.1x Standard for port-based authentication in LANs. Identifies each user and allows connectivity based on policies in a centrally managed server. 802.11 Refers to the set of WLAN standards developed by IEEE. The three commonly in use today are 802.11a, 802.11b, and 802.11g, sometimes referred to collectively as Dot11. access control list (ACL) A list of services used for security of programs and operating systems. Lists users and groups together with the access awarded for each. access point (AP) An inter-networking device that connects wired and wireless networks together. Also, an 802.11x capable device that may support one or more 802.11 network interfaces in it and coordinates client stations to establish an Extended Service Set 802.11 network Advanced Encryption Standard (AES) An encryption algorithm developed for use by U.S. government agencies; now incorporated into encryption standards for commercial transactions. ad-hoc network A group of nodes or systems communicating with each other without an intervening access point. Many wireless network cards support ad-hoc networking modes. authentication server A central resource that verifies the identity of prospective network users and grants access based on pre-defined policies. authentication zone A administrative grouping of resources for user authentication. backhaul The process of getting data from a source and sending it for distribution over the main backbone network. Wireless backhaul refers to the process of delivering data from a node on the wireless network back to the wired network. Also referred to as WDS. Basic Service Set (BSS) The set of all wireless client stations controlled by a single access point.  bridge A connection between two (or more) LANs using the same protocol. Virtual bridges are used as a means of defining layer 2 domains for broadcast messages. Each virtual bridge uniquely defines a virtual local area network (VLAN). Class of Service (COS) A method of specifying and grouping applications into various QoS groups or categories. client utility This application executes on a station and provides management and diagnostics functionality for the 802.11 network interfaces. Differentiated Services Code Point (DSCP) A system of assigning Quality of Service "Class of Service" tags. Page 40 of 46  Installation and User Guide:  Wireless LAN Client
Domain Name Service (DNS) A standard methodology for converting alphanumeric Internet domain names to IP addresses. Dynamic Host Configuration Protocol (DHCP) A communications protocol enabling IP address assignments to be managed both dynamically and centrally. With DHCP enabled on a node (a system, device, network card, or access point), when it boots or is connected to a network, an address is automatically assigned. Each assigned address is considered to be "leased" to a specific node; when the lease expires, a new IP can be requested and/or automatically reassigned. Without DHCP, IP addresses would need to be entered manually for each and every device on the network. dynamic IP address A TCP/IP network address assigned temporarily (or dynamically) by a central server, also known as a DHCP server. A node set to accept dynamic IPs is said to be a "DHCP client." Extensible Authentication Protocol (EAP) Standard that specifies the method of communication between an authentication server and the client, or supplicant, requesting access to the network. EAP supports a variety of authentication methods. Extensible Authentication Protocol Over LAN (EAPOL) Protocol used for 802.1x authentication. EAP-TLS  EAP using Transport Layer Security. EAP-based authentication method based on X.509 certificates, which provides mutual, secure authentication. Certificates must be maintained in the authentication server and supplicant. EAP-PEAP Protected EAP-based authentication method based on X.509 certificates. Uses a two-phase approach in which the server is first authenticated to the supplicant. This establishes a secure channel over which the supplicant can be authenticated to the server. Extended Service Set (ESS) A set of multiple connected BSSes. From the perspective of network clients, the ESS functions as one wireless network; clients are able to roam between the BSSs within the ESS.  ESSID Name or identifier of the ESS used in network configuration. hostname The unique, fully qualified name assigned to a network computer, providing an alternative to the IP address as a way to identify the computer for networking purposes. Hypertext Transfer Protocol (HTTP) Protocol governing the transfer of data on the World Wide Web between servers and browser (and browser enabled software applications). Hypertext Transfer Protocol over SSL (HTTPS) A variant of HTTP that uses Secure Sockets Layer (SSL) encryption to secure data transmissions. HTTPS uses port 443, while HTTP uses port 80. Independent Basic Service Set (IBSS) A set of clients communicating with each other or with a network via an access point. Installation and User Guide:  Wireless LAN Client  Page 41 of 46
     Internet Protocol (IP) The network layer protocol for routing packets through the Internet. IP address 32-bit number, usually presented as a period-separated (dotted decimal) list of three-digit numbers, which identifies an entity on the Internet according to the Internet Protocol standard.  local area network (LAN) A group of computers, servers, printers, and other devices connected to one another, with the ability to share data between them. management information bases (MIBs) A database of objects that can be monitored by a network management system. Both SNMP and RMON use standardized MIB formats that allows any SNMP and RMON tools to monitor any device defined by a MIB. maskbits Number of bits in the subnet prefix for an IP address, (provides the same information as subnet mask). Each triplet of digits in an IP address consists of 8 bits. To specify the subnet in maskbits, count the number of bits in the prefix. To specify using a subnet mask, indicate the masked bits as an IP address. Example: subnet mask 255.255.255.0 is equivalent to 24 maskbits, which is the total number of bits in the 255.255.255 prefix. Media Access Control (MAC) address A unique hardware-based equipment identifier, set during device manufacture. The MAC address uniquely identifies each node of a network. Access points can be configured with MAC access lists, allowing only certain specific devices to connect with the LAN through them, or to allow certain MAC-identified network cards or devices access only to certain resources.  MAC address authentication Method of authenticating clients by using the MAC address of the client station rather than a user ID. Network Address Translation (NAT) The translation of one IP address used within a network to another address used elsewhere. One frequent use of NAT is the translation of IPs used inside a company, versus the IP addresses visible to the outside world. This feature helps increase network security to a small degree, because when the address is translated, it is an opportunity to authenticate the request and/or to match it to known, authorized types of requests. NAT is also used sometimes to map multiple nodes to a single outwardly visible IP address. Network Interface Card (NIC) Generic term for network interface hardware that includes wired and wireless LAN adapter cards, PC Cardbus PCMCIA cards, and USB-to-LAN adapters. network management system (NMS) Software application that controls a network of multiple access points and clients. node Generic term for a network entity. Includes an access point, network adapter (wireless or wired), or network appliance (such as a print server or other non-computer device). Network Time Protocol (NTP)  NTP servers are used to synchronize clocks on computers and other devices. APs have the capability to connect automatically to NTP servers to set their own clocks on a regular basis. Page 42 of 46  Installation and User Guide:  Wireless LAN Client
Packet INternet Groper (PING) A utility that determines whether a specific IP address is accessible, and the amount of network time (measured in milliseconds) needed for response. PING is used primarily to troubleshoot Internet connections. policy-based networking The management of a network with rules (or policies) governing the priority and availability of bandwidth and resources, based both on the type of data being transmitted and the privileges assigned to a given user or group of users. This allows network administrators to control how the network is used in order to help maximize efficiency. Power over Ethernet (PoE) Power supplied to a device by way of the Ethernet network data cable instead of an electrical power cord. preamble type The preamble defines the length of the cyclic redundancy check (CRC) block for communication between the access point and a roaming network adapter. All nodes on a given network should use the same preamble type. Quality of Service (QoS) QoS is a term encompassing the management of network performance, based on the notion that transmission speed, signal integrity, and error rates can be managed, measured, and improved. In a wireless network, QoS is commonly managed through the use of policies. Remote Authentication Dial-In User Service (RADIUS) A client/server protocol and software that enables remote access servers to communicate with a central server in order to authenticate users and authorize service or system access. RADIUS permits maintenance of user profiles in a central repository that all remote servers can share.  radio frequency (RF) The electromagnetic wave frequency radio used for communications applications. roaming Analogous to the way cellular phone roaming works, roaming in the wireless networking environment is the ability to move from one AP coverage area to another without interruption in service or loss in connectivity. rogue AP An access point that connects to the wireless network without authorization. Secure Shell (SSH) Also known as the Secure Socket Shell, SSH is a UNIX-based command line interface for secure access to remote systems. Both ends of a communication are secured and authenticated using a digital certificate, and any passwords exchanged are encrypted. Service Set Identifier (SSID) The SSID is a unique identifier attached to all packets sent over a wireless network, identifying one or more wireless network adapters as "belonging" to a common group. Some access points can support multiple SSIDs, allowing for varying privileges and capabilities based on user roles. Secure Sockets Layer (SSL) A common protocol for message transmission security on the Internet. Existing as a program layer between the Internet's Hypertext Transfer Protocol (HTTP) and Transport Installation and User Guide:  Wireless LAN Client  Page 43 of 46
     Control Protocol (TCP) layers, SSL is a standard feature in Internet Explorer, Netscape, and most web server products. Simple Mail Transfer Protocol (SMTP) Protocol used to transfer email messages between email servers. Simple Network Management Protocol (SNMP) An efficient protocol for network management and device monitoring. SNMP trap A process that filers SNMP messages and saves or drops them, depending upon how the system is configured. Spanning Tree Protocol (STP) A protocol that prevents bridging loops from forming due to incorrectly configured networks. Station (STA) An 802.11 capable device that supports only one 802.11 network interface, capable of establishing a Basic Service Set 802.11 network (i.e., peer-to-peer network). static IP address A permanent IP address assigned to a node in a TCP/IP network. subnet A portion of a network, designated by a particular set of IP addresses. Provides a hierarchy for addressing in LANs. Also called a subnetwork. subnet mask A TCP/IP addressing method for dividing IP-based networks into subgroups or subnets (compare with maskbits). Each triplet of digits in an IP address consists of 8 bits. To specify using a subnet mask, indicate the masked bits as an IP address. To specify the subnet in maskbits, count the number of bits in the prefix. Example: subnet mask 255.255.255.0 is equivalent to 24 maskbits, which is the total number of bits in the 255.255.255 prefix. Temporal Key Integrity Protocol (TKIP) Part of the IEEE 802.11i encryption standard, TKIP provides improvements to WEP encryption, including per-packet key mixing, message integrity check, and a re-keying mechanism. Traffic Class Identifier (TCID) Part of the standard 802.11 frame header. The 3-bit TCID is used for mapping to class-of-service values. Transmission Control Protocol/Internet Protocol (TCP/IP) One of the most commonly used communication protocols in modern networking. Addresses used in TCP/IP usually consist of four triplets of digits, plus a subnet mask (for example, 192.168.25.3, subnet 255.255.255.0). Transport Layer Security (TLS) A protocol that provides privacy protection for applications that communicate with each other and their users on the Internet. TLS is a successor to the Secure Sockets Layer (SSL).  True MIMO™ The Airgo Networks, Inc. implementation of the data multiplexing technique known as Multiple Input Multiple Output (MIMO). MIMO uses multiple spatially-separated antennas to increase wireless throughput, range, and spectral efficiency by simultaneously transmitting multiple data streams on the same frequency channel. Page 44 of 46  Installation and User Guide:  Wireless LAN Client
Trunk In telecommunications, a communications channel between two switching systems. In a wireless network, a trunk is a wireless connection from one Access Point to another. Type of Service (ToS) Sometimes also called IP Precedence, ToS is a system of applying QoS methodologies, based on headers placed into transmitted IP packets. User Datagram Protocol (UDP) A connectionless protocol similar to TCP/IP, but without the same level of error checking. UDP is commonly used when some small degree of error and packet loss can be tolerated without losing program integrity, such as for online games. virtual LAN (VLAN) A local area network with a definition that addresses network nodes on some basis other than physical location or even whether the systems are wired together or operating using the same local equipment. VLANs are, on average, much easier to manage than a physically implemented LAN. In other words, moving a user from one VLAN to another is a simple change in software, whereas on a regular LAN, the computer or device would need to be connected physically to a different switch or router to accomplish the same thing. Network management software of some sort is used to configure and manage the VLANs on a given network.  Wired Equivalent Privacy (WEP) Security protocol for wireless local area networks (WLANs) defined in the 802.11b standard. Uses dynamically or manually assigned keys for encryption and authentication, as dictated by the capabilities of the client station. The WEP algorithms are vulnerable to compromise; therefore, WEP security is only recommended for legacy clients that do not support the newer generation security standards. Windows Internet Name Server (WINS) The Windows implementation of DNS, which maps IP addresses to computer names (NetBIOS names). This allows users to access resources by computer name instead of by IP address.  Wi-Fi  A play on the term "HiFi," Wi-Fi stands for Wireless Fidelity, a term for wireless networking technologies. Wi-Fi Protected Access Wi-Fi Alliance-sponsored security solution that addresses many of the WEP inadequacies. Originally promulgated as an interim solution, WPA is now included as part of the IEEE 802.11i standard. wireless local area network (WLAN) A type of local area network that employs radio frequencies to transmit data (usually encrypted), much like LANs transmit data over wires and fiber optic cables.   Installation and User Guide:  Wireless LAN Client  Page 45 of 46
     Index      Page 46 of 46  Installation and User Guide:  Wireless LAN Client

Navigation menu