Page 56 / 69 Scroll up to view Page 51 - 55
Dual-Band Wireless A+B Broadband Router
Appendix D: Finding the MAC
Address and IP Address for Your
Ethernet Adapter
This section describes how to find the MAC address for your Ethernet adapter
to do either MAC address filtering or MAC address cloning for the Router and
ISP.
You can also find the IP address of your computer’s Ethernet adapter.
The
IP address is used for filtering, forwarding, and DMZ.
Follow the steps in this
appendix to find the MAC address or IP address for your adapter in Windows
95, 98, Me, NT, 2000, and XP.
For Windows 95, 98, and Me:
1. Click on
Start
and
Run
. In the Open field, enter
winipcfg
. Then press the
Enter
key or the
OK
button.
2. When the IP Configuration window appears, select the Ethernet adapter
you are using to connect to the Router via a Category 5 Ethernet network
cable.
105
Instant Wireless
®
Series
7.
Click the
Wireless Network Connection
icon located in your computer’s
system tray.
8.
If this is the first time you are using this 802.1x connection, you will be
asked if you want to accept the wireless network connection. Click the
OK
button.
9.
Open your PC’s web browser and test your Internet connection. If you are
unable to connect to the Internet, double-check the settings you configured
through Windows XP and the Router’s web-based utility.
For more details about wireless networking or 802.1x on a Windows XP com-
puter, enter the keyword
wireless
or
802.1x
in the Windows XP search engine.
104
Figure D-1
Figure D-2
Figure C-25
Figure C-26
Page 57 / 69
Dual-Band Wireless A+B Broadband Router
2.
In the command prompt, enter
ipconfig /all
. Then press the
Enter
key.
3.
Write down the Physical Address as shown on your computer screen; it is
the MAC address for your Ethernet adapter.
This will appear as a series of
letters and numbers.
The MAC address/Physical Address is what you will use for MAC address
cloning or MAC filtering.
Write down the IP Address as shown on your computer screen. The exam-
ple in Figure E-5 shows the IP address of your Ethernet adapter as
192.168.1.100. Your computer may show something different.
107
Instant Wireless
®
Series
3.
Write down the Adapter Address as shown on your computer screen (see
Figure E-3).
This is the MAC address for your Ethernet adapter and will
be shown as a series of numbers and letters.
The MAC address/Adapter Address is what you will use for MAC address
cloning or MAC filtering.
Write down the IP Address as shown on your computer screen. The exam-
ple in Figure E-3 shows the IP address of your Ethernet adapter as
192.168.1.100. Your computer may show something different.
For Windows NT, 2000, and XP:
1. Click
Start
and
Run
. In the
Open
field, enter
cmd
. Press the
Enter
key or
click the
OK
button.
106
Figure D-5
Note
: The MAC address is also called the Physical
Address.
Figure D-3
Figure D-4
Note
: The MAC address is also called the Adapter
Address.
Page 58 / 69
Dual-Band Wireless A+B Broadband Router
(NIC) is the typical adapter that allows the PC or server to connect to the
intranet and/or Internet.
Ad-hoc Network
- An ad-hoc network is a group of computers, each with a
wireless adapter, connected as an independent 802.11 wireless LAN.
Ad-hoc
wireless computers operate on a peer-to-peer basis, communicating directly
with each other without the use of an access point.
Ad-hoc mode is also
referred to as an Independent Basic Service Set (IBSS) or as peer-to-peer
mode, and is useful at a departmental scale or SOHO operation.
Automatic Fall-back
- A feature provided by some wireless products to
increase connection reliability. Automatic fall-back enables a device to dynam-
ically shift between various data transfer rates. It works by decreasing the data
transfer rate when interference increases, distance increases, and other factors
undermine signal strength and quality.
Auto-MDI/MDIX
- On a network hub or switch, an auto-MDI/MDIX port
automatically senses if it needs to act as a MDI or MDIX port. The auto-
MDI/MDIX capability eliminates the need for crossover cables.
Auto-negotiate
- To automatically determine the correct settings. The term is
often used with communications and networking. For example, Ethernet
10/100 cards, hubs, and switches can determine the highest speed of the node
they are connected to and adjust their transmission rate accordingly.
Backbone
– The part of a network that connects most of the systems and net-
works together and handles the most data.
Bandwidth
- The transmission capacity of a given facility, in terms of how
much data the facility can transmit in a fixed amount of time; expressed in bits
per second (bps).
Beacon Interval
-
A beacon is a packet broadcast by the Access Point to keep
the network synchronized. A beacon includes the wireless LAN service area,
the AP address, the Broadcast destination addresses, a time stamp, Delivery
Traffic Indicator Maps, and the Traffic Indicator Message (TIM).
Bit
– A binary digit. The value—0 or 1—used in the binary numbering system.
Also, the smallest form of data.
Boot
– To cause the computer to start executing instructions. Personal comput-
ers contain built-in instructions in a ROM chip that are automatically executed
109
Instant Wireless
®
Series
108
Appendix E: Glossary
10BaseT
- An Ethernet standard that uses twisted wire pairs.
100BaseTX
- IEEE physical layer specification for 100 Mbps over two pairs of
Category 5 UTP or STP wire.
802.11a
- One of the IEEE standards for wireless networking hardware.
Products that adhere to a specific IEEE standard will work with each other,
even if they are manufactured by different companies. It specifies a maximum
data transfer rate of 54Mbps and an operating frequency of 5GHz. The 802.11a
standard uses the Orthogonal Frequency Division Multiplexing (OFDM) trans-
mission method. Additionally, the 802.11a standard supports 802.11 features
such as WEP encryption for security.
802.11b
- One of the IEEE standards for wireless networking hardware.
Products that adhere to a specific IEEE standard will work with each other,
even if they are manufactured by different companies. The 802.11b standard
specifies a maximum data transfer rate of 11Mbps, an operating frequency of
2.4GHz, and WEP encryption for security. 802.11b networks are also referred
to as Wi-Fi networks.
802.1x
- Based on the Extensible Authentication Protocol (EAP), the 802.1x
standard is one of the IEEE standards for network authentication and key man-
agement. It establishes a framework that supports multiple authentication meth-
ods. This standard can be incorporated into any type of network to enhance its
security.
For example, a wireless user may use one of the authentication methods to
access a wireless network protected by an authentication server. The user, also
called the supplicant, sends a request to an access point or wireless router, also
called the authenticator. The authenticator sends an identification request back
to the user. After the user sends the authenticator the identification message, the
authenticator forwards the user’s identification message to the authentication
server. If the server accepts the identification message, then the user is permit-
ted access to the wireless network. The 802.1x standard can also support encryp-
tion key management to strengthen wireless network encryption services.
Adapter -
Printed circuit board that plugs into a PC to add to capabilities or
connectivity to a PC. In a networked environment, a network interface card
Page 59 / 69
Dual-Band Wireless A+B Broadband Router
CSMA/CD
(
C
arrier
S
ense
M
ultiple
A
ccess/
C
ollision
D
etection) - The LAN
access method used in Ethernet. When a device wants to gain access to the net-
work, it checks to see if the network is quiet (senses the carrier). If it is not, it
waits a random amount of time before retrying. If the network is quiet and two
devices access the line at exactly the same time, their signals collide. When the
collision is detected, they both back off and each waits a random amount of
time before retrying.
CTS
(
C
lear
T
o
S
end) - An RS-232 signal sent from the receiving station to the
transmitting station that indicates it is ready to accept data.
Database
- A database is a collection of data that is organized so that its con-
tents can easily be accessed, managed, and updated.
Data Packet
- One frame in a packet-switched message. Most data communi-
cations is based on dividing the transmitted message into packets. For example,
an Ethernet packet can be from 64 to 1518 bytes in length.
Default Gateway
- The routing device used to forward all traffic that is not
addressed to a station within the local subnet.
DHCP
(
D
ynamic
H
ost
C
onfiguration
P
rotocol) - A protocol that lets network
administrators centrally manage and automate the assignment of Internet
Protocol (IP) addresses in an organization's network. Using the Internet’s set of
protocol (TCP/IP), each machine that can connect to the Internet needs a
unique IP address. When an organization sets up its computer users with a con-
nection to the Internet, an IP address must be assigned to each machine.
Without DHCP, the IP address must be entered manually at each computer and,
if computers move to another location in another part of the network, a new IP
address must be entered. DHCP lets a network administrator supervise and dis-
tribute IP addresses from a central point and automatically sends a new IP
address when a computer is plugged into a different place in the network.
DHCP uses the concept of a “lease” or amount of time that a given IP address
will be valid for a computer. The lease time can vary depending on how long a
user is likely to require the Internet connection at a particular location. It’s espe-
cially useful in education and other environments where users change fre-
quently. Using very short leases, DHCP can dynamically reconfigure networks
in which there are more computers than there are available IP addresses.
DHCP supports static addresses for computers containing Web servers that
need a permanent IP address.
111
Instant Wireless
®
Series
110
on startup. These instructions search for the operating system, load it, and pass
control to it.
Bottleneck
– A traffic slowdown that results when too many network nodes try
to access a single node, often a server node, at once.
Bridge
- A device that interconnects different networks together.
Broadband
- A data-transmission scheme in which multiple signals share the
bandwidth of a medium. This allows the transmission of voice, data, and video
signals over a single medium. Cable television uses broadband techniques to
deliver dozens of channels over one cable.
Browser
- A browser is an application program that provides a way to look at
and interact with all the information on the World Wide Web or PC. The word
“browser” seems to have originated prior to the Web as a generic term for user
interfaces that let you browse text files online.
Buffer
- A buffer is a shared or assigned memory area used by hardware
devices or program processes that operate at different speeds or with different
sets of priorities. The buffer allows each device or process to operate without
being held up by the other. In order for a buffer to be effective, the size of the
buffer and the algorithms for moving data into and out of the buffer need to be
considered by the buffer designer. Like a cache, a buffer is a “midpoint hold-
ing place” but exists not so much to accelerate the speed of an activity as to
support the coordination of separate activities.
Cable Modem
- A device that connects a computer to the cable television net-
work, which in turn connects to the Internet. Once connected, cable modem
users have a continuous connection to the Internet. Cable modems feature
asymmetric transfer rates: around 36 Mbps downstream (from the Internet to
the computer), and from 200 Kbps to 2 Mbps upstream (from the computer to
the Internet).
CAT 5
- ANSI/EIA (American National Standards Institute/Electronic
Industries Association) Standard 568 is one of several standards that specify
“categories” (the singular is commonly referred to as “CAT”) of twisted pair
cabling systems (wires, junctions, and connectors) in terms of the data rates
that they can sustain. CAT 5 cable has a maximum throughput of 100 Mbps and
is usually utilized for 100BaseTX networks.
CPU
(
C
entral
P
rocessing
U
nit) - The computing part of the computer. Also
called the “processor,” it is made up of the control unit and ALU.
Page 60 / 69
Dual-Band Wireless A+B Broadband Router
Dynamic Routing
- The ability for a router to forward data via a different route
based on the current conditions of the communications circuits. For example,
it can adjust for overloaded traffic or failing lines and is much more flexible
than static routing, which uses a fixed forwarding path.
EAP
(
E
xtensible
A
uthentication
P
rotocol) - An IETF standard that establishes
an authentication protocol for network access. Many authentication methods,
including passwords, certificates, and smart cards, work within this framework.
EAP-TLS
- One type of mutual authentication method using the Extensible
Authentication Protocol (EAP) and a security protocol called the Transport
Layer Security (TLS). EAP-TLS uses digital certificates and is more secure
than MD5 authentication, which uses passwords. EAP-TLS authentication sup-
ports dynamic WEP key management.
EAP-TTLS
- One type of mutual authentication method using the Extensible
Authentication Protocol (EAP) and Tunneled Transport Layer Security (TTLS).
EAP-TTLS uses a combination of certificates and another method, such as
passwords. It is more secure than MD5 authentication, which uses passwords,
and less secure than EAP-TLS authentication, which exclusively uses certifi-
cates. EAP-TTLS authentication supports dynamic WEP key management.
Encryption
- A security method that applies a specific algorithm to data in
order to alter the data’s appearance and prevent other devices from reading the
information.
Ethernet
- IEEE standard network protocol that specifies how data is placed
on and retrieved from a common transmission medium. Has a transfer rate of
10 Mbps. Forms the underlying transport vehicle used by several upper-level
protocols, including TCP/IP and XNS.
Fast Ethernet
- A 100 Mbps technology based on the 10Base-T Ethernet
CSMA/CD network access method.
FHSS
(
F
requency
H
opping
S
pread
S
pectrum) - FHSS continuously changes
(hops) the carrier frequency of a conventional carrier several times per second
according to a pseudo-random set of channels. Because a fixed frequency is not
used, and only the transmitter and receiver know the hop patterns, interception
of FHSS is extremely difficult.
Firewall
- A firewall is a set of related programs, located at a network gateway
server, that protects the resources of a network from users from other networks.
113
Instant Wireless
®
Series
112
DMZ
- (
D
e
M
ilitarized
Z
one) allows one IP address (or computer) to be
exposed to the Internet.
Some applications require multiple TCP/IP ports to be
open.
It is recommended that you set your computer with a static IP address if
you want to use DMZ Hosting.
DNS
- The Domain Name System (DNS) is the way that Internet domain
names are located and translated into Internet Protocol (IP) addresses. A
domain name is a meaningful and easy-to-remember “handle” for an Internet
address.
Domain
- A subnetwork comprised of a group of clients and servers under the
control of one security database. Dividing LANs into domains improves per-
formance and security.
Download
- To receive a file transmitted over a network. In a communications
session, download means receive, and upload means transmit.
Driver
- A workstation or server software module that provides an interface
between a network interface card and the upper-layer protocol software running
in the computer; it is designed for a specific NIC, and is installed during the
initial installation of a network-compatible client or server operating system.
DSSS
(
D
irect-
S
equence
S
pread
S
pectrum) - DSSS generates a redundant bit
pattern for all transmitted data. This bit pattern is called a chip (or chipping
code).
Even if one or more bits in the chip are damaged during transmission,
statistical techniques embedded in the receiver can recover the original data
without the need for retransmission. To an unintended receiver, DSSS appears
as low power wideband noise and is rejected (ignored) by most narrowband
receivers.
However, to an intended receiver (i.e. another wireless LAN end-
point), the DSSS signal is recognized as the only valid signal, and interference
is inherently rejected (ignored).
DTIM
(
D
elivery
T
raffic
I
ndication
M
essage) - A DTIM field is a countdown
field informing clients of the next window for listening to broadcast and mul-
ticast messages. When the AP has buffered broadcast or multicast messages for
associated clients, it sends the next DTIM with a DTIM Interval value.
AP
Clients hear the beacons and awaken to receive the broadcast and multicast
messages.
Dynamic IP Address
- An IP address that is automatically assigned to a client
station in a TCP/IP network, typically by a DHCP server. Network devices that
serve multiple users, such as servers and printers, are usually assigned static IP
addresses.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top