User manual LINKSYS WET11
DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!
If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual LINKSYS WET11. We hope that this LINKSYS WET11 user guide will be useful to you.
You may also download the following manuals related to this product:
LINKSYS WET11 INSTALL GUIDE (236 ko)
LINKSYS WET11 PRODUCT BROCHURE (181 ko)
LINKSYS WET11 INSTALLATION GUIDE (313 ko)
Manual abstract: user guide LINKSYS WET11
Detailed instructions for use are in the User's Guide.
[. . . ] ®
A Division of Cisco Systems, Inc.
2. 4 GHz Wireless-B
802. 11b
Ethernet Bridge
WIRELESS
Model No.
User Guide
WET11
Wireless-B Ethernet Bridge
Copyright and Trademarks
Specifications are subject to change without notice. Other brands and product names are trademarks or registered trademarks of their respective holders.
How to Use this Guide
Your guide to the Wireless-B Ethernet Bridge has been designed to make understanding networking with the Wireless-B Ethernet Bridge easier than ever. Look for the following items when reading this guide: This checkmark means there is a Note of interest and is something you should pay special attention to while using the Wireless-B Ethernet Bridge.
This exclamation point means there is a Caution or warning and is something that could damage your property or the Wireless-B Ethernet Bridge.
This question mark provides you with a reminder about something you might need to do while using the Wireless-B Ethernet Bridge. In addition to these symbols, there are definitions for technical terms that are presented like this: word: definition.
Also, each figure (diagram, screenshot, or other image) is provided with a figure number and description, like this: Figure 0-1: Sample Figure Description
Figure numbers and descriptions can also be found in the "List of Figures" section in the "Table of Contents".
WET11_v2-UG-30918NC JL
Wireless-B Ethernet Bridge
Table of Contents
Chapter 1: Introduction
Welcome What's in this Guide?
1
1 2
Chapter 2: Planning Your Wireless Network
Network Topology Ad-Hoc versus Infrastructure Mode
4
4 4
Chapter 3: Getting to Know the Wireless-B Ethernet Bridge
The Back Panel The Front Panel
6
6 7
Chapter 4: Connecting the Wireless-B Ethernet Bridge for Setup Chapter 5: Setting Up the Wireless-B Ethernet Bridge
Overview Setup Wizard
8 9
9 9
Chapter 6: Connecting the Wireless-B Ethernet Bridge for Network Use Chapter 7: Using the Wireless-B Ethernet Bridge Web-based Utility
Overview Starting the Web-based Utility Setup Password Advanced Status Help
13 14
14 14 15 17 18 19 20
Appendix A: Troubleshooting
Common Problems and Solutions Frequently Asked Questions
21
21 22
Appendix B: Wireless Security
A Brief Overview What Are the Risks?
25
25 25
Appendix C: Upgrading Firmware Appendix D: Windows Help Appendix E: Glossary
32 33 34
Wireless-B Ethernet Bridge
Appendix F: Specifications Appendix G: Warranty Information Appendix H: Regulatory Information Appendix I: Contact Information
40 42 43 46
Wireless-B Ethernet Bridge
List of Figures
Figure 2-1: Infrastructure Mode Figure 2-2: Ad-Hoc Mode Figure 2-3: Wireless Bridging Using Two Bridges Figure 3-1: Back Panel Figure 3-2: Front Panel Figure 4-1: Connect the Ethernet Network Cable Figure 4-2: Connect the Power Adapter Figure 5-1: Welcome Figure 5-2: Check Connection Figure 5-3: List of Bridges Figure 5-4: Password Figure 5-5: Mode Settings Figure 5-6: Wireless Settings Figure 5-7: IP Settings Figure 5-8: Security Settings Figure 5-9: WEP Key Figure 5-10: Confirmation Figure 5-11: Congratulations Figure 7-1: Access the Web-based Utility Figure 7-2: Setup Tab Figure 7-3: Site Survey Figure 7-4: WEP Encryption Figure 7-5: Password Tab Figure 7-6: Advanced Settings Tab Figure 7-7: Status Tab Figure 7-8: Help Tab Figure B-1: Warchalking Figure B-2: WEP Encryption 4 5 5 6 7 8 8 9 9 10 10 10 11 11 11 12 12 12 14 15 16 17 17 18 19 20 25 31
Wireless-B Ethernet Bridge
Chapter 1: Introduction
Welcome
Thank you for choosing the Wireless-B Ethernet Bridge. [. . . ] Based on that information, the node next selects the right wireless network access point and registers its address. Communications between end node and host computer can then be transmitted up and down the backbone. As the user moves on, the end node's RF transmitter regularly checks the system to determine whether it is in touch with the original wireless network access point or whether it should seek a new one. When a node no longer receives acknowledgment from its original wireless network access point, it undertakes a new search. Upon finding a new wireless network access point, it then re-registers, and the communication process continues. have set aside bandwidth for unlicensed use in the ISM (Industrial, Scientific and Medical) band. Spectrum in the vicinity of 2. 4 GHz, in particular, is being made available
Appendix A: Troubleshooting Frequently Asked Questions
23
Wireless-B Ethernet Bridge
worldwide. This presents a truly revolutionary opportunity to place convenient high speed wireless capabilities in the hands of users around the globe. Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communications systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband transmission, but the trade-off produces a signal that is, in effect, louder and thus easier to detect, provided that the receiver knows the parameters of the spread-spectrum signal being broadcast. If a receiver is not tuned to the right frequency, a spread-spectrum signal looks like background noise. There are two main alternatives, Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS). Frequency Hopping Spread Spectrum (FHSS) uses a narrowband carrier that changes frequency in a pattern that is known to both transmitter and receiver. Properly synchronized, the net effect is to maintain a single logical channel. To an unintended receiver, FHSS appears to be short-duration impulse noise. Direct Sequence Spread Spectrum (DSSS) generates a redundant bit pattern for each bit to be transmitted. The longer the chip, the greater the probability that the original data can be recovered. Even if one or more bits in the chip are damaged during transmission, statistical techniques embedded in the radio can recover the original data without the need for retransmission. To an unintended receiver, DSSS appears as low power wideband noise and is rejected (ignored) by most narrowband receivers. WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40/64 bit shared key algorithm, as described in the IEEE 802. 11 standard.
Appendix A: Troubleshooting Frequently Asked Questions
24
Wireless-B Ethernet Bridge
Appendix B: Wireless Security
A Brief Overview
Whenever data--in the form of files, e-mails, or messages--is transmitted over your wireless network, it is open to attacks. Wireless networking is inherently risky because it broadcasts information on radio waves. [. . . ] End-users must be provided with specific operations for satisfying RF exposure compliance. Note: Dual antennas used for diversity operation are not considered co-located.
Appendix H: Regulatory Information
43
Wireless-B Ethernet Bridge
INDUSTRY CANADA (CANADA) This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. The use of this device in a system operating either partially or completely outdoors may require the user to obtain a license for the system according to the Canadian regulations. [. . . ]
DISCLAIMER TO DOWNLOAD THE USER GUIDE LINKSYS WET11
Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual LINKSYS WET11 will begin.