Page 21 / 29 Scroll up to view Page 16 - 20
Dual-Band Wireless Access Point
2.
When the
Network
window appears, click the
Protocols
tab. Then, click
the
Add
button.
3.
Find the
IPX/SPX protocol
in the
Select Network Protocol
field. Click it
once and click the
OK
button.
1.
At the Windows 2000 desktop, right click
My Network Places
and select
Properties
. Then, right click
Local Area Connection
.
Choose
Properties
.
2.
If the
TCP/IP Protocol
is listed for your network adapter, go to step five.
Otherwise, click the
Install
button.
3.
When the
Component Type
window appears, select
Protocol
, and click the
Add
button.
4.
Select
Internet Protocol (TCP/IP)
from the list and click the
OK
button.
5.
When the
Local Area Connection Properties
window reappears, select
TCP/IP
, and click the
Properties
button.
6.
Select
Use the following IP Address
.
7.
Enter an IP Address for the computer, along with a Subnet Mask and
Default Gateway. Then, click the
OK
button. If you do not have these val-
ues, consult your network administrator.
8.
When the
Local Area Connection Properties
window reappears, click the
OK
button. TCP/IP has now been successfully installed.
1.
At the Windows 2000 desktop, right click
My Network Places
.
Then right
click
Local Area Connection
.
Choose
Properties
.
2.
If the
NWLink IPX/SPX/NetBIOS Compatible Transport Protocol
is listed
for your network adapter, click the
Cancel
button. Otherwise, click the
Install
button.
3.
When the Component Type window appears, select
Protocol
and click the
Install
button.
35
Instant Wireless™ Series
1.
Click the
Start
button, select
Settings
, and open the
Control Panel
. Inside
the Control Panel, double-click the
Network
icon.
2.
When the
Network
window appears, click the
Protocols
tab.
Then, click
the
Add
button.
3.
Find the
TCP/IP protocol
in the
Select Network Protocol
field. Click it
once and then click the
OK
button.
4.
When asked if you want to use DHCP, choose
No
.
5.
If asked to supply your Windows NT CD, do so. NT will copy the neces-
sary files to your system. You may have to switch between the Access
Point’s Setup CD and the NT CD.
6.
When TCP/IP appears in the
Network Protocols
window, click the
Bindings
tab. Windows will store your new bindings.
7.
Click the
Protocols
tab. Then, select
TCP/IP
.
8.
Click the
Properties
button. Select the type of network adapter you have
from the Adapters box and select
Specify an IP Address
.
9.
Enter the computer’s IP Address and Subnet Mask. Check with your net-
work administrator for your settings.
10. Enter your Default Gateway if you have one.
11. When you finish, click the
OK
button. If NT asks about WINS, ignore it.
12. When the
Network
window reappears, click the
Close
button. Restart your
computer when prompted.
TCP/IP has now been successfully installed.
1.
Click the
Start
button, select
Settings
, and open the
Control Panel
. Inside
the Control Panel, double-click the
Network
icon.
34
TCP/IP Setup for Windows 2000
IPX Setup for Windows 2000
TCP/IP Setup for Windows NT 4.0
Note:
a Default Gateway is not required. Check with your network
administrator.
IPX Setup for Windows NT 4.0
Page 22 / 29
Instant Wireless™ Series
4.
Select
NWLink IPX/SPX/NetBIOS Compatible Transport Protocol
from the list and click the
OK
button.
5.
When the
Network
window reappears, click the
OK
button. Restart your
computer. NWLink IPX/SPX/NetBIOS Compatible Transport Protocol has
now been successfully installed.
1.
Click the
Start
button and open the
Control Panel
.
2.
Double click the
Network and Internet Connections
icon.
3.
Double click the
Network Connections
icon.
4.
Right click the
Local Area Connection
icon and select
Properties
.
5.
If the
TCP/IP Protocol
is listed for your network adapter, go to step five.
Otherwise, click the
Install
button.
6.
When the
Component Type
window appears, select
Protocol
, and click the
Add
button.
7.
Select
Internet Protocol (TCP/IP)
from the list and click the
OK
button.
8.
When the
Local Area Connection Properties
window reappears, select
TCP/IP
, and click the
Properties
button.
9.
Select
Use the following IP Address
.
10. Enter an IP Address for the computer, along with a Subnet Mask and
Default Gateway. Then, click the
OK
button. If you do not have these val-
ues, consult your network administrator.
11. When the
Local Area Connection Properties
window reappears, click the
OK
button. TCP/IP has now been successfully installed..
36
Appendix C: Glossary
Adapter
- Printed circuit board that plugs into a PC to add to capabilities or
connectivity to a PC. In a networked environment, a network interface card is
the typical adapter that allows the PC or server to connect to the intranet and/or
Internet.
Ad-hoc Network
- An ad-hoc network is a wireless network or other small net-
work in which some of the network devices are part of the network only for the
duration of a communications session while in some close proximity to the rest
of the network.
Backbone
- The part of a network that connects most of the systems and net-
works together and handles the most data.
Bandwidth
- The transmission capacity of a given facility, in terms of how
much data the facility can transmit in a fixed amount of time; expressed in bits
per second (bps).
Beacon Interval
-
A beacon is a packet broadcast by the Access Point to keep
the network synchronized. A beacon includes the wireless LAN service area,
the AP address, the Broadcast destination addresses, a time stamp, Delivery
Traffic Indicator Maps, and the Traffic Indicator Message (TIM).
Bit
- A binary digit. The value - 0 or 1-used in the binary numbering system.
Also, the smallest form of data.
Browser
- A browser is an application program that provides a way to look at
and interact with all the information on the World Wide Web or PC. The word
"browser" seems to have originated prior to the Web as a generic term for user
interfaces that let you browse text files online.
BSS
(
B
asic
S
ervice
S
et) - A group of wireless Network PC Card users and an
Access Point.
Buffer
- A buffer is a shared or assigned memory area used by hardware
devices or program processes that operate at different speeds or with different
sets of priorities. The buffer allows each device or process to operate without
being held up by the other. In order for a buffer to be effective, the size of the
buffer and the algorithms for moving data into and out of the buffer need to be
Dual-Band Wireless Access Point
37
TCP/IP Setup for Windows XP
Page 23 / 29
quently. Using very short leases, DHCP can dynamically reconfigure networks
in which there are more computers than there are available IP addresses.
DHCP supports static addresses for computers containing Web servers that
need a permanent IP address.
Download
- To receive a file transmitted over a network. In a communications
session, download means receive, upload means transmit.
Driver
- A workstation or server software module that provides an interface
between a device and the upper-layer protocol software running in the comput-
er; it is designed for a specific device, and is installed during the initial instal-
lation of a network-compatible client or server operating system.
DSSS
(
D
irect-
S
equence
S
pread-
S
pectrum) - DSSS generates a redundant bit
pattern for each bit to be transmitted. This bit pattern is called a chip (or chip-
ping code). The longer the chip, the greater the probability that the original data
can be recovered. Even if one or more bits in the chip are damaged during
transmission, statistical techniques embedded in the radio can recover the orig-
inal data without -the need for retransmission. To an unintended receiver, DSSS
appears as low power wideband noise and is rejected (ignored) by most nar-
rowband receivers.
DTIM
(
D
elivery
T
raffic
I
ndication
M
essage) - A DTIM field is a countdown
field informing clients of the next window for listening to broadcast and mul-
ticast messages. When the AP has buffered broadcast or multicast messages for
associated clients, it sends the next DTIM with a DTIM Interval value.
AP
Clients hear the beacons and awaken to receive the broadcast and multicast
messages.
Dynamic IP Address
- An IP address that is automatically assigned to a client
station in a TCP/IP network, typically by a DHCP server. Network devices that
serve multiple users, such as servers and printers, are usually assigned static IP
addresses.
Encryption
- A security method that applies a specific algorithm to data in
order to alter the data's appearance and prevent other devices from reading the
information.
ESS
- More than one BSS in a network.
Dual-Band Wireless Access Point
39
38
Instant Wireless
TM
Series
considered by the buffer designer. Like a cache, a buffer is a "midpoint hold-
ing place" but exists not so much to accelerate the speed of an activity as to
support the coordination of separate activities.
CSMA/CA
(
C
arrier
S
ense
M
ultiple
A
ccess/
C
ollision
A
voidance) - In local
area networking, this is the CSMA technique that combines slotted time-divi-
sion multiplexing with carrier sense multiple access/collision detection
(CSMA/CD) to avoid having collisions occur a second time. This works best if
the time allocated is short compared to packet length and if the number of sit-
uations is small.
CSMA/CD
(
C
arrier
S
ense
M
ultiple
A
ccess/
C
ollision
D
etection) - The LAN
access method used in Ethernet. When a device wants to gain access to the
network, it checks to see if the network is quiet (senses the carrier). If it is not,
it waits a random amount of time before retrying. If the network is quiet and
two devices access the line at exactly the same time, their signals collide. When
the collision is detected, they both back off and each wait a random amount of
time before retrying.
CTS
(
C
lear
T
o
S
end) - An RS-232 signal sent from the receiving station to the
transmitting station that indicates it is ready to accept data.
Database
- A database is a collection of data that is organized so that its con-
tents can easily be accessed, managed, and updated.
DHCP
(
D
ynamic
H
ost
C
onfiguration
P
rotocol) - A protocol that lets network
administrators manage centrally and automate the assignment of Internet
Protocol (IP) addresses in an organization's network. Using the Internet's set of
protocol (TCP/IP), each machine that can connect to the Internet needs a
unique IP address. When an organization sets up its computer users with a con-
nection to the Internet, an IP address must be assigned to each machine.
Without DHCP, the IP address must be entered manually at each computer and,
if computers move to another location in another part of the network, a new IP
address must be entered. DHCP lets a network administrator supervise and dis-
tribute IP addresses from a central point and automatically sends a new IP
address when a computer is plugged into a different place in the network.
DHCP uses the concept of a "lease" or amount of time that a given IP address
will be valid for a computer. The lease time can vary depending on how long a
user is likely to require the Internet connection at a particular location. It's espe-
cially useful in education and other environments where users change fre-
Page 24 / 29
The IEEE fosters the development of standards that often become national and
international standards. The organization publishes a number of journals, has
many local chapters, and several large societies in special areas, such as the
IEEE Computer Society.
Infrastructure
- An infrastructure network is a wireless network or other small
network in which the wireless network devices are made a part of the network
through the Access Point which connects them to the rest of the network.
IP Address
- In the most widely installed level of the Internet Protocol
(Internet Protocol) today, an IP address is a 32-binary digit number that identi-
fies each sender or receiver of information that is sent in packet across the
Internet. When you request an HTML page or send e-mail, the Internet
Protocol part of TCP/IP includes your IP address in the message (actually, in
each of the packets if more than one is required) and sends it to the IP address
that is obtained by looking up the domain name in the Uniform Resource
Locator you requested or in the e-mail address you're sending a note to. At the
other end, the recipient can see the IP address of the Web page requestor or the
e-mail sender and can respond by sending another message using the IP address
it received.
ISM band
- The FCC and their counterparts outside of the U.S. have set aside
bandwidth for unlicensed use in the ISM (Industrial, Scientific and Medical)
band. Spectrum in the vicinity of 2.4 GHz, in particular, is being made avail-
able worldwide. This presents a truly revolutionary opportunity to place con-
venient high-speed wireless capabilities in the hands of users around the globe.
LAN
- A local area network (LAN) is a group of computers and associated
devices that share a common communications line and typically share the
resources of a single processor or server within a small geographic area (for
example, within an office building).
MAC
(
M
edia
A
ccess
C
ontrol)
Address
- A unique number assigned by the
manufacturer to any Ethernet networking device, such as a network adapter,
that allows the network to identify it at the hardware level.
Mbps
(
M
ega
B
its
P
er
S
econd) - One million bits per second; unit of measure-
ment for data transmission.
Multicasting
- Sending data to a group of nodes instead of a single destination.
Dual-Band Wireless Access Point
41
Instant Wireless
TM
Series
40
Ethernet
- IEEE standard network protocol that specifies how data is placed
on and retrieved from a common transmission medium. Has a transfer rate of
10 Mbps. Forms the underlying transport vehicle used by several upper-level
protocols, including TCP/IP and XNS.
FHSS
(
F
requency
H
opping
S
pread
S
pectrum) - FHSS continuously changes
the center frequency of a conventional carrier several times per second accord-
ing to a pseudo-random set of channels, while chirp spread spectrum changes
the carrier frequency. Because a fixed frequency is not used, illegal monitoring
of spread spectrum signals is extremely difficult, if not downright impossible
depending on the particular method.
Firmware
- Programming that is inserted into programmable read-only mem-
ory (programmable read-only memory), thus becoming a permanent part of a
computing device.
Fragmentation
- Breaking a packet into smaller units when transmitting over
a network medium that cannot support the original size of the packet.
Gateway
- A device that interconnects networks with different, incompatible
communications protocols.
Hardware
- Hardware is the physical aspect of computers, telecommunica-
tions, and other information technology devices. The term arose as a way to dis-
tinguish the "box" and the electronic circuitry and components of a computer
from the program you put in it to make it do things. The program came to be
known as the software.
Hub
- The device that serves as the central location for attaching wires from
workstations. Can be passive, where there is no amplification of the signals; or
active, where the hubs are used like repeaters to provide an extension of the
cable that connects to a workstation.
IEEE
(The
I
nstitute of
E
lectrical and
E
lectronics
E
ngineers) - The IEEE
describes itself as "the world's largest technical professional society, promoting
the development and application of electrotechnology and allied sciences for
the benefit of humanity, the advancement of the profession, and the well-being
of our members."
Page 25 / 29
Dual-Band Wireless Access Point
Server
- Any computer whose function in a network is to provide user access
to files, printing, communications, and other services.
Software
- Instructions for the computer. A series of instructions that performs
a particular task is called a "program." The two major categories of software are
"system software" and "application software." System software is made up of
control programs such as the operating system and database management sys-
tem (DBMS). Application software is any program that processes data for the
user.
A common misconception is that software is data. It is not. Software tells the
hardware how to process the data.
SOHO
(
S
mall
O
ffice/
H
ome
O
ffice) - Market segment of professionals who
work at home or in small offices.
Spread Spectrum
- Spread Spectrum technology is a wideband radio frequen-
cy technique developed by the military for use in reliable, secure, mission-crit-
ical communications systems. It is designed to trade off bandwidth efficiency
for reliability, integrity, and security. In other words, more bandwidth is con-
sumed than in the case of narrowband transmission, but the trade off produces
a signal that is, in effect, louder and thus easier to detect, provided that the
receiver knows the parameters of the spread-spectrum signal being broadcast.
If a receiver is not tuned to the right frequency, a spread-spectrum signal looks
like background noise. There are two main alternatives, Direct Sequence
Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS).
Static IP Address
- A permanent IP address that is assigned to a node in an IP
or a TCP/IP network.
Subnet Mask
- The method used for splitting IP networks into a series of sub-
groups, or subnets. The mask is a binary pattern that is matched up with the IP
address to turn part of the host ID address field into a field for subnets.
Switch
- 1. A data switch connects computing devices to host computers,
allowing a large number of devices to share a limited number of ports. 2. A
device for making, breaking, or changing the connections in an electrical cir-
cuit.
TCP
(
T
ransmission
C
ontrol
P
rotocol) - A method (protocol) used along with
the Internet Protocol (Internet Protocol) to send data in the form of message
units between computers over the Internet. While IP takes care of handling the
43
Instant Wireless™ Series
Network
- A system that transmits any combination of voice, video and/or data
between users.
Node
- A network junction or connection point, typically a computer or work
station.
OFDM -
OFDM (Orthogonal Frequency Division Muliplexing) works by
breaking one high-speed data stream into a number of lower-speed data
streams, which are then transmitted in parallel. Each lower speed stream is used
to modulate a subcarrier.
Essentially, this creates a multi-carrier transmission
by dividing a wide frequency band or channel into a number of narrower fre-
quency bands or sub-channels.
Packet
- A unit of data routed between an origin and a destination in a network.
Passphrase
- Used much like a password, a passphrase simplifies the WEP
encryption process by automatically generating the WEP encryption keys for
Linksys products.
PC Card
- A credit-card sized removable module that contains memory, I/O,
or a hard disk.
Port
- A pathway into and out of the computer or a network device such as a
switch or router. For example, the serial and parallel ports on a personal com-
puter are external sockets for plugging in communications lines, modems and
printers.
RJ-45
(
R
egistered
J
ack-
45
) - A connector similar to a telephone connector that
holds up to eight wires, used for connecting Ethernet devices.
Roaming
- The ability to use a wireless device and be able to move from one
access point's range to another without losing the connection.
Router
- Protocol-dependent device that connects subnetworks together.
Routers are useful in breaking down a very large network into smaller subnet-
works; they introduce longer delays and typically have much lower throughput
rates than bridges.
RTS
(
R
equest
T
o
S
end) - An RS-232 signal sent from the transmitting station
to the receiving station requesting permission to transmit.
42

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top