Page 21 / 30 Scroll up to view Page 16 - 20
Wireless-G Access Point
Appendix B: Setting Up the TCP/IP and
IPX Protocols
Before a computer can communicate with the Access Point, it must be config-
ured with the TCP/IP protocol. If you know how to set up TCP/IP on your com-
puters, do so now. Otherwise, use the guidelines below to help get TCP/IP
installed on all of the computers that need to communicate with the Access
Point. If you are unable to successfully install TCP/IP on one or more comput-
ers after following the directions, contact the manufacturer of your computers'
network operating system for further assistance. Check with your network
administrator for your TCP/IP settings.
The directions below provide general guidelines for coming up with IP address-
es and subnet masks. Check with your network administrator to see if you need
to use specific IP addresses or DHCP settings.
First, each computer on the network will require an IP address, which is a series
of numbers, separated by periods, identifying the PC on the network. To make
things simple, you should use the following numbering scheme:
192.168.1.X
In this example, X is a unique, arbitrarily assigned number from 1 to 254. Each
computer must have its own unique X number. Note: Never use 0, 250 or 255
for X. These numbers are reserved by TCP/IP for other uses.
For example, if you have three computers, you could number them as follows:
192.168.1.17
192.168.1.44
192.168.1.126
In this case, 17, 44, and 126 are arbitrary numbers between 1 and 254.
Each computer will also require a subnet mask, which is a numerical “filter”
that tells a computer what kinds of TCP/IP data packets to accept. If you’re not
sure which mask to use, the following mask is recommended:
255.255.255.0
35
Instant Wireless
®
Series
What is the maximum number of users the Access Point facilitates?
No more than 65, but this depends on the volume of data and may be less if
many users create a large amount of network traffic.
How many channels/frequencies are available with the Access Point?
Using 802.11b or draft 802.11g, there are eleven available channels, ranging
from 1 to 11.
34
Setting Up TCP/IP in Windows
Page 22 / 30
Wireless-G Access Point
1.
Click the
Start
button, select
Settings
, and open the
Control Panel
. Inside
the Control Panel, double-click the
Network
icon.
2.
When the
Network
window appears, click the
Protocols
tab.
Then, click
the
Add
button.
3.
Find the
TCP/IP protocol
in the
Select Network Protocol
field. Click it
once and then click the
OK
button.
4.
When asked if you want to use DHCP, choose
No
.
5.
If asked to supply your Windows NT CD, do so. NT will copy the neces-
sary files to your system. You may have to switch between the Access
Point’s Setup CD and the NT CD.
6.
When TCP/IP appears in the
Network Protocols
window, click the
Bindings
tab. Windows will store your new bindings.
7.
Click the
Protocols
tab. Then, select
TCP/IP
.
8.
Click the
Properties
button. Select the type of network adapter you have
from the Adapters box and select
Specify an IP Address
.
9.
Enter the computer’s IP Address and Subnet Mask. Check with your net-
work administrator for your settings.
10. Enter your Default Gateway if you have one.
11. When you finish, click the
OK
button. If NT asks about WINS, ignore it.
12. When the
Network
window reappears, click the
Close
button. Restart your
computer when prompted.
TCP/IP has now been successfully installed.
1.
Click the
Start
button, select
Settings
, and open the
Control Panel
. Inside
the Control Panel, double-click the
Network
icon.
37
Instant Wireless
®
Series
The following instructions are provided as examples for reference only. For
complete instructions on installing and troubleshooting TCP/IP and IPX, con-
sult your Windows operating system documentation.
1.
Click the
Start
button, select
Settings
, and open the
Control Panel
. Inside
the Control Panel, double-click the
Network
icon.
2.
If the
TCP/IP Protocol
is listed for your network adapter, go to step five.
Otherwise, click the
Add
button.
3.
When the
Component Type
window appears, select
Protocol
and click the
Add
button.
4.
Select
Microsoft
in the Manufacturers list and choose
TCP/IP
in the
Network Protocols list. Then, click the
OK
button.
5.
When the Network window reappears, click
TCP/IP
. Then, click the
Properties
button.
6.
Select
Specify an IP Address
.
7.
Enter an IP Address for the computer, along with a Subnet Mask. Click the
OK
button. If you do not have these values, consult your network adminis-
trator.
8.
When the Network window reappears, click the
OK
button. Restart your
machine. TCP/IP has now been successfully installed.
1.
Click the
Start
button, select
Settings
, and open the
Control Panel
. Inside
the Control Panel, double-click the
Network
icon.
2.
If the
TCP/IP Protocol
is listed for your network adapter, go to step four.
Otherwise, click the
Add
button.
3.
When the
Component Type
window appears, select
Protocol
and click the
Add
button.
4.
Select
Microsoft
in the Manufacturers list and choose
IPX/SPX protocol
in the Network Protocols list. Then, click the
OK
button.
36
TCP/IP Setup for Windows NT 4.0
Note:
a Default Gateway is not required. Check with your network
administrator.
IPX Setup for Windows NT 4.0
TCP/IP Setup for Windows 98 and Millennium
IPX Setup for Windows 98 and Millennium
Page 23 / 30
Wireless-G Access Point
4.
Select
NWLink IPX/SPX/NetBIOS Compatible Transport Protocol
from the list and click the
OK
button.
5.
When the
Network
window reappears, click the
OK
button. Restart your
computer. NWLink IPX/SPX/NetBIOS Compatible Transport Protocol has
now been successfully installed.
1.
Click the
Start
button and open the
Control Panel
.
2.
Double click the
Network and Internet Connections
icon.
3.
Double click the
Network Connections
icon.
4.
Right click the
Local Area Connection
icon and select
Properties
.
5.
If the
TCP/IP Protocol
is listed for your network adapter, go to step five.
Otherwise, click the
Install
button.
6.
When the
Component Type
window appears, select
Protocol
, and click the
Add
button.
7.
Select
Internet Protocol (TCP/IP)
from the list and click the
OK
button.
8.
When the
Local Area Connection Properties
window reappears, select
TCP/IP
, and click the
Properties
button.
9.
Select
Use the following IP Address
.
10. Enter an IP Address for the computer, along with a Subnet Mask and
Default Gateway. Then, click the
OK
button. If you do not have these val-
ues, consult your network administrator.
11. When the
Local Area Connection Properties
window reappears, click the
OK
button. TCP/IP has now been successfully installed..
39
Instant Wireless
®
Series
2.
When the
Network
window appears, click the
Protocols
tab. Then, click
the
Add
button.
3.
Find the
IPX/SPX protocol
in the
Select Network Protocol
field. Click it
once and click the
OK
button.
1.
At the Windows 2000 desktop, right click
My Network Places
and select
Properties
. Then, right click
Local Area Connection
.
Choose
Properties
.
2.
If the
TCP/IP Protocol
is listed for your network adapter, go to step five.
Otherwise, click the
Install
button.
3.
When the
Component Type
window appears, select
Protocol
, and click the
Add
button.
4.
Select
Internet Protocol (TCP/IP)
from the list and click the
OK
button.
5.
When the
Local Area Connection Properties
window reappears, select
TCP/IP
, and click the
Properties
button.
6.
Select
Use the following IP Address
.
7.
Enter an IP Address for the computer, along with a Subnet Mask and
Default Gateway. Then, click the
OK
button. If you do not have these val-
ues, consult your network administrator.
8.
When the
Local Area Connection Properties
window reappears, click the
OK
button. TCP/IP has now been successfully installed.
1.
At the Windows 2000 desktop, right click
My Network Places
.
Then right
click
Local Area Connection
.
Choose
Properties
.
2.
If the
NWLink IPX/SPX/NetBIOS Compatible Transport Protocol
is listed
for your network adapter, click the
Cancel
button. Otherwise, click the
Install
button.
3.
When the Component Type window appears, select
Protocol
and click the
Install
button.
38
TCP/IP Setup for Windows XP
TCP/IP Setup for Windows 2000
IPX Setup for Windows 2000
Page 24 / 30
Wireless-G Access Point
41
Instant Wireless
®
Series
40
Browser
- A browser is an application program that provides a way to look at
and interact with all the information on the World Wide Web or PC. The word
"browser" seems to have originated prior to the Web as a generic term for user
interfaces that let you browse text files online.
BSS
(
B
asic
S
ervice
S
et) - A group of wireless Network PC Card users and an
Access Point.
Buffer
- A buffer is a shared or assigned memory area used by hardware
devices or program processes that operate at different speeds or with different
sets of priorities. The buffer allows each device or process to operate without
being held up by the other. In order for a buffer to be effective, the size of the
buffer and the algorithms for moving data into and out of the buffer need to be
considered by the buffer designer. Like a cache, a buffer is a "midpoint holding
place" but exists not so much to accelerate the speed of an activity as to sup-
port the coordination of separate activities.
CSMA/CA
(
C
arrier
S
ense
M
ultiple
A
ccess/
C
ollision
A
voidance) - In local
area networking, this is the CSMA technique that combines slotted time-divi-
sion multiplexing with carrier sense multiple access/collision detection
(CSMA/CD) to avoid having collisions occur a second time. This works best if
the time allocated is short compared to packet length and if the number of sit-
uations is small.
CSMA/CD
(
C
arrier
S
ense
M
ultiple
A
ccess/
C
ollision
D
etection) - The LAN
access method used in Ethernet. When a device wants to gain access to the net-
work, it checks to see if the network is quiet (senses the carrier). If it is not, it
waits a random amount of time before retrying. If the network is quiet and two
devices access the line at exactly the same time, their signals collide. When the
collision is detected, they both back off and each wait a random amount of time
before retrying.
CTS
(
C
lear
T
o
S
end) - An RS-232 signal sent from the receiving station to the
transmitting station that indicates it is ready to accept data.
Database
- A database is a collection of data that is organized so that its con-
tents can easily be accessed, managed, and updated.
DHCP
(
D
ynamic
H
ost
C
onfiguration
P
rotocol) - A protocol that lets network
administrators manage centrally and automate the assignment of Internet
Protocol (IP) addresses in an organization's network. Using the Internet's set of
protocol (TCP/IP), each machine that can connect to the Internet needs a
Appendix C: Glossary
802.11b
- One of the IEEE standards for wireless networking hardware.
Products that adhere to a specific IEEE standard will work with each other,
even if they are manufactured by different companies. The 802.11b standard
specifies a maximum data transfer rate of 11Mbps, an operating frequency of
2.4GHz, and WEP encryption for security. 802.11b networks are also referred
to as Wi-Fi networks.
802.11g
- A proposed, but as yet unratified extension of the IEEE 802.11 stan-
dard for wireless networking hardware. The draft 802.11g specifications used
by Linksys specify a maximum data transfer rate of 54Mbps using OFDM
modulation, an operating frequency of 2.4GHz, backward compatibility with
IEEE 802.11b devices and WEP encryption for security.
Adapter
- Printed circuit board that plugs into a PC to add to capabilities or
connectivity to a PC. In a networked environment, a network interface card is
the typical adapter that allows the PC or server to connect to the intranet and/or
Internet.
Ad-hoc Network
- An ad-hoc network is a wireless network or other small net-
work in which some of the network devices are part of the network only for the
duration of a communications session while in some close proximity to the rest
of the network.
Backbone
- The part of a network that connects most of the systems and net-
works together and handles the most data.
Bandwidth
- The transmission capacity of a given facility, in terms of how
much data the facility can transmit in a fixed amount of time; expressed in bits
per second (bps).
Beacon Interval
-
A beacon is a packet broadcast by the Access Point to keep
the network synchronized. A beacon includes the wireless LAN service area,
the AP address, the Broadcast destination addresses, a time stamp, Delivery
Traffic Indicator Maps, and the Traffic Indicator Message (TIM).
Bit
- A binary digit. The value - 0 or 1-used in the binary numbering system.
Also, the smallest form of data.
Page 25 / 30
Wireless-G Access Point
43
Instant Wireless
®
Series
42
Dynamic IP Address
- An IP address that is automatically assigned to a client
station in a TCP/IP network, typically by a DHCP server. Network devices that
serve multiple users, such as servers and printers, are usually assigned static IP
addresses.
Encryption
- A security method that applies a specific algorithm to data in
order to alter the data's appearance and prevent other devices from reading the
information.
ESS
- More than one BSS in a network.
Ethernet
- IEEE standard network protocol that specifies how data is placed
on and retrieved from a common transmission medium. Has a transfer rate of
10 Mbps. Forms the underlying transport vehicle used by several upper-level
protocols, including TCP/IP and XNS.
FHSS
(
F
requency
H
opping
S
pread
S
pectrum) - FHSS continuously changes
the center frequency of a conventional carrier several times per second accord-
ing to a pseudo-random set of channels, while chirp spread spectrum changes
the carrier frequency. Because a fixed frequency is not used, illegal monitoring
of spread spectrum signals is extremely difficult, if not downright impossible
depending on the particular method.
Firmware
- Code that is written onto read-only memory (ROM) or program-
mable read-only memory (PROM).
Once firmware has been written onto the
ROM or PROM, it is retained even when the device is turned off.
Fragmentation
- Breaking a packet into smaller units when transmitting over
a network medium that cannot support the original size of the packet.
Gateway
- A device that interconnects networks with different, incompatible
communications protocols.
Hardware
- Hardware is the physical aspect of computers, telecommunica-
tions, and other information technology devices. The term arose as a way to dis-
tinguish the "box" and the electronic circuitry and components of a computer
from the program you put in it to make it do things. The program came to be
known as the software.
Hub
- The device that serves as the central location for attaching wires from
workstations. Can be passive, where there is no amplification of the signals; or
active, where the hubs are used like repeaters to provide an extension of the
cable that connects to a workstation.
unique IP address. When an organization sets up its computer users with a con-
nection to the Internet, an IP address must be assigned to each machine.
Without DHCP, the IP address must be entered manually at each computer and,
if computers move to another location in another part of the network, a new IP
address must be entered. DHCP lets a network administrator supervise and dis-
tribute IP addresses from a central point and automatically sends a new IP
address when a computer is plugged into a different place in the network.
DHCP uses the concept of a "lease" or amount of time that a given IP address
will be valid for a computer. The lease time can vary depending on how long a
user is likely to require the Internet connection at a particular location. It's espe-
cially useful in education and other environments where users change fre-
quently. Using very short leases, DHCP can dynamically reconfigure networks
in which there are more computers than there are available IP addresses.
DHCP supports static addresses for computers containing Web servers that
need a permanent IP address.
Download
- To receive a file transmitted over a network. In a communications
session, download means receive, upload means transmit.
Driver
- A workstation or server software module that provides an interface
between a device and the upper-layer protocol software running in the comput-
er; it is designed for a specific device, and is installed during the initial instal-
lation of a network-compatible client or server operating system.
DSSS
(
D
irect-
S
equence
S
pread-
S
pectrum) - DSSS generates a redundant bit
pattern for each bit to be transmitted. This bit pattern is called a chip (or chip-
ping code). The longer the chip, the greater the probability that the original data
can be recovered. Even if one or more bits in the chip are damaged during
transmission, statistical techniques embedded in the radio can recover the orig-
inal data without -the need for retransmission. To an unintended receiver, DSSS
appears as low power wideband noise and is rejected (ignored) by most nar-
rowband receivers.
DTIM
(
D
elivery
T
raffic
I
ndication
M
essage) - A DTIM field is a countdown
field informing clients of the next window for listening to broadcast and mul-
ticast messages. When the AP has buffered broadcast or multicast messages for
associated clients, it sends the next DTIM with a DTIM Interval value.
AP
Clients hear the beacons and awaken to receive the broadcast and multicast
messages.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top