Chapter 4: troubleshooting – Planet Technology Wireless USB Adapter WNL-U553 User Manual

Page 23

Advertising
background image

Chapter 4: Troubleshooting

This section provides solutions to problems usually encountered during the
installation and operation of the USB adapter. Read the description below to
diffuse your doubts.


What is the IEEE 802.11g standard?

802.11g is the latest IEEE standard for high-speed WLAN
communications that provides up to 54Mbps data rate in the 2.4GHZ
band. It has become the mainstream technology of current WLAN
networks. It uses OFDM modulation to reach higher data
transmission rate and backward compatible with 802.11b

What is the IEEE 802.11b standard?

The IEEE 802.11b WLAN standard subcommittee, which formulates
a standard for the industry. The objective is to enable WLAN
hardware from different manufacturers to interoperate.

What features does the IEEE 802.11 standard provide?

The product supports the following IEEE 802.11 functions:

CSMA/CA plus Acknowledge protocol

Multi-Channel Roaming

Automatic Rate Selection

RTS/CTS feature

Fragmentation

Power Management

What is Ad-hoc?

An Ad-hoc mode is a wireless network type in which a group of
computers equipped with wireless adapters are connected as an
independent wireless LAN without any access point. All computers
operating in this mode must be configured to share the same radio
channel and SSID.

What is Infrastructure?

The difference between Infrastructure network and Ad-hoc network
is that the former requires an Access point. The Infrastructure mode
is appropriate for enterprise-scale wireless access to a central
database or provides various wireless applications for mobile users.

What is BSS ID?

An Infrastructure network is called a Basic Service Set (BSS). All the
wireless stations in a BSS must share the same BSS ID.

What is TKIP?

It is another encryption method to overcome the inherent
weaknesses of WEP, a next generation of WEP. It adopts new
algorithm (Michael) to generate 128/192-bit encryption keys and
provides per-packet key mixing, a message integrity check and a
re-keying mechanism.

Advertising