Wireless Network
‘%.
Access Point
Use this guide to install: WAP11 ves 2.2 40=00
11 1
EFTA00578359
COPYRIGHT & TRADEMARKS
Copyright 2002 Linksys, All Rights Reserved. Instant Wireless"" is a registered trade•
mark of Linksys. Microsoft. Windows, and the Windows logo are registered trademarks
of Microsoft Corporation. All other trademarks and brand names are the property of their
respective proprietors.
LIMITED WARRANTY
Linksys guarantees that every Wireless Network Access Point is free from physical
defects in material and workmanship under normal use for one year from the date of pur•
chase. If the product proves defective during this warranty period. call Linksys Technical
Support In order to obtain a Return Authorization Number. BE SURE TO HAVE YOUR
PROOF OF PURCHASE AND A BARCODE FROM THE PRODUCT'S PACKAGING ON
HAND WHEN CALLING. RETURN REQUESTS CANNOT BE PROCESSED WITHOUT
PROOF OF PURCHASE. When returning a product, mark the Return Authorization
Number dearly on the outside of the package and include a copy of your original proof
of purchase. All customers located outside of the United States of America and Canada
shall be held responsible for shipping and handling charges.
IN NO EVENT SHALL LINKSYS' LIABILITY EXCEED THE PRICE PAID FOR THE PROD•
UCT FROM DIRECT, INDIRECT, SPECIAL, INCIDENTAL• OR CONSEQUENTIAL DAM•
AGES RESULTING FROM THE USE OF THE PRODUCT. ITS ACCOMPANYING SOFT.
WARE, OR ITS DOCUMENTATION. LINKSYS DOES NOT OFFER REFUNDS FOR ANY
PRODUCT. Unksys makes no warranty or representation, expressed, implied, or statuto•
ry. with respect to its products or the contents or use of this documentation and all
accompanying software, and specifically disclaims its quality, performance• mer•
chantability. or fitness for any particular purpose. Linksys reserves the right to revise or
update its products, software, or documentation without obligation to notify any individ•
ual or entity. Please direct all inquiries to:
Unksys P.O. Box 18556, Irvine, CA 92623.
FCC STATEMENT
This product has been tested and complies with the specifications for a Class B digital
device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide rea•
sonable protection against harmful Interference In a residential installation. This equip•
ment generates. uses, and can radiate radio frequency energy and, If not installed and
used according to the instructions. may cause harmful interference to radio communi•
cations. However, there Is no guarantee that Interference will not occur in a particular
installation. If this equipment does cause harmful interference to radio or television
reception, which is found by turning the equipment off and on. the user is encouraged to
try to correct the interference by one or more of the following measures:
• Reorient or relocate the receiving antenna
• Increase the separation between the equipment or devices
• Connect the equipment to an outlet other than the receiver's
• Consult a dealer or an experienced radio/TV technician for assistance
FCC Radiation Exposure Statement
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled
environment. This equipment should be installed and operated with minimum distance
20cm between the radiator and your body.
UG-WAPI 1 ver. 2.2-081402C KL
EFTA00578360
Wireless Network Access Point
INDUSTRY CANADA (CANADA)
This Class B digits apparatus complies with Canadian ICES-003.
Cet apparel numdrique do la classe B est conforms Ala norms NMB.003 du Canada.
Table of Contents
The use of this device in a system operating either partially or completely outdoors may require
the user to obtain a license for the system according to the Canadian regulations.
Chapter 1: Introduction 1
EC DECLARATION OF CONFORMITY (EUROPE) The Instant Wireless' Network Access Point
Unksys Group declares that the Instant WireiesSrm Series products included in the Instant Features
WirelessnA Seriesconform to the specifications listed below, following the provisions of the EMC
Directive 89/336/EEC and Low Vokage Directive 73/23:EEC: Package Contents
System Requirements
ETS 300426, 301 489.1 General EMC requirements for Radio equipment.
EN 609 50 Safety
ETS 300.328-2 Technical requirements for Radio equipment. Chapter 2: Planning Your Wireless Network 3
Network Topology 3
Note: This equipment is intended to be used in al EU and EFTA countries. Outdoor use may Roaming 3
be restricted to certain frequencies andor may require a license for operation. For more
details. contact Unksys Corporate Compliance.
Chapter 3: Getting to Know the Wireless Network Access Point 4
Note: Combinations of power levets and antennas resulting in a radiated power level of above The Wireless Network Access Point's Ports 4
100 mW are considered as not compliant with the above mentioned dfrective and are not
allowed for use within the European community and countries that have adopted the European The Wireless Network Access Point's LEDs 5
R&TTE directive 1999 EC and/or the CEPT recommendation Rec 70.03. For more details on
legal combinations of power levels and antennas, contact Linksys Corporate Compliance. Chapter 4: Connecting the Wireless Network Access Point 6
Unksys Group"' vakuuttaa talon eta Instant Wireless IEEE 802.11 PC Card tyyppinen bite on
direktiivin 199915iEY. direktivin 89/336EEC ja direktiivin 73/23/EEC oleeisten vaatimusten ja Chapter 5: Setting Up the Wireless Network Access Point 7
sita koskevien naiden direktiivien muiden ehtojen mukainen.
Unksys GrotpTm declare que la carte PC Instant Wireless IEEE 802.11 est conforms aux con-
ditions essentielles et aux dispositions relatives A la directive 1999/5/EC, la directive Chapter 6: Configuring the Wireless Network Access Point 14
89/336/EEC, et A la directive 73/23/EEC. The Setup Tab 14
Belgique B L'utilisation en extiwieur est autorise sur le canal 11 (2462 MHz). 12 (2467 MHz). et The Password Tab 19
13 (2472 MHz).
Dans le cas dune utilisation wives, A lexterieur dun Oakmont, au•dessus dun espace public. The Status Tab 20
aucun enregistrement nest necessaire pour une distance de moms de 300m. Pour une cis- The Help Tab 22
lance sup/Mauro A 300m un onregistrement aupres de l'IBPT est require. Pour une utilisation The Filter Tab 23
pubbque A lexterieur do batiments. une licence do FIBPT est moguls°. Pour les enregistrements
et licences. veuillez contactor l'IBPT. The Wireless Tab 25
France F: Banda de frequence rostreinte: souls les canaux 10, 11, 12, 13 (2457, 2462, 2467,
et 2472 MHz respectivement) doivent eke utilises en France. Appendix A: Troubleshooting 28
Toute utilisation. qu'elle snit interieure ou exterieure. est soumise A autorisation. Vous pouvez
contactor Mutorite de Regulation des Telecommuniations Frequently Asked Questions 28
(atµiyhwww.arldelecom.frn) pour la procedure A vivre.
France F: Restricted frequency band: only channels 10, 11. 12. 13 (2457. 2462. 2467. and Appendix El: Setting Up the TCP/IP Protocol 32
2472 MHz respectively) may be used in France. License required for every indoor and outdoor
mstalations. Please contact ART for procedure to follow. Setting Up TCP/IP in Windows 32
Deutschland D: Anmeldung im Outdoor•Bereich notwending. aber nicht genehmi- TCP/IP Setup for Windows 95, 98, and Millennium 33
gungspllichtig. Site mit Handler die Vorgehensweise abstirnmen. TCP/IP Setup for Windows NT 4.0 34
Germany D: License required for outdoor installations. Check with reseller for procedure to fol-
low TCP/IP Setup for Windows 2000 35
Rata I: necessana la concessions ministerial° anche per l'uso interno. Yonkers) con i riven-
ditori la procedure da seguire. L'uso per installazione in estemi none' permessa. Appendix C: Glossary 36
Italy I: License required for indoor use. Use with outdoor installations not allowed.
the Netherlands NL License required for outdoor installations. Check with reseler for proce-
dure to follow.
Nederlands NL Licentie verpicht voor gebruik met buitenantennes. Neem contact op met
verkoper voor juiste procedure
EFTA00578361
Instant Wireless"' Series Wireless Network Access Point
Chapter 1: Introduction
Appendix D: Specifications 44 The Instant Wireless"' Network Access Point
Environmental 15
Don't be bound by cabling restrictions any longer! The Instant Wirelessrm
Appendix E: Warranty Information 46
Network Access Point from Linksys delivers the freedom to configure your net-
work your way. Utilization of state-of-the-art wireless technology gives you the
Appendix F: Contact Information 47
ability to set up workstations in ways you never thought possible; no cables to
install means fewer expenses and fewer hassles.
The Instant WirelesslM Network Access Point's high-powered antennae offer a
range of operation of up to 1500 feet, providing seamless roaming throughout
your LAN infrastructure. Advanced user authentication ensures a high level of
security for wireless networking, while easy-to-use Windows-based diagnostics
and statistics tools ensure that you'll always be in control. Best of all, the
Instant Wirelesim Network Access Point features easy installation—just plug
it in and you're ready to go!
When all these features come together in one compact, lightweight, and power-
efficient unit, you have the ultimate in flexible networking—the Linksys
Instant WirelessTm Network Access Point.
Features
• Highly Efficient Dipole Antennae Provide Extensive Range of Operation
• Enjoy Your Wireless Office Beyond the Range of Ethernet Networking
• Auto Fall-Back Data Rate for Long-Distance Communication and Noisy
Environments
• High-Speed Data Transfer Rate Up to 11 Mbps
• Interoperable with IEEE 802.1lb (DSSS) 2.4GHz-Compliant Equipment
• Features Roaming and Network Traffic Filtering
• Extensive Operating Range Supports up to 300 ft. (Indoors) and 500 feet
(Outdoors)
• Up to 256-Bit Wired Equivalent Privacy Supported
• Free Software Driver Upgrades
• Compatible with Virtually All Major Operating Systems
• Free Technical Support-24 Hours a Day, 7 Days a Week for North America
Only
• 1-Year Limited Warranty
1
EFTA00578362
Instant Wireless" Series Wireless Network Access Point
Chapter 2: Planning Your
Wireless Network
Network Topology
A wireless LAN is a group of computers, each equipped with one Instant
Wireless"" Series adapter. Computers in a wireless LAN must be configured
to share the same radio channel.
The Instant Wireless's'' Series adapters provide access to a wired LAN for wire-
less workstations. An integrated wireless and wired LAN is called an
Infrastructure configuration. A group of Instant Wireless*" Series adapter
users and an Instant WirelessTM Wireless Network Access Point compose a
Basic Service Set (BSS). Each Instant Wireless"" Series adapter PC in a BSS
can talk to any computer in a wired LAN infrastructure via the Instant
Wireless"" Wireless Network Access Point.
Figure 1-1
An infrastructure configuration extends the accessibility of an Instant
Package Contents Wireless"" Series adapter PC to a wired LAN, and doubles the effective wire-
less transmission range for two Instant Wireless"" Series adapter PCs. Since
• One Instant Wireless' Wireless Network Access Point the Wireless Network Access Point is able to forward data within its BSS, the
• One AC Power Adapter effective transmission range in an infrastructure LAN is doubled.
• One Setup Wizard CD-ROM (with User Guide) Roaming
• Two Detachable Antennae
• One Quick Installation and Registration Card (not shown) Infrastructure mode also supports roaming capabilities for mobile users. More
• One CAT 5 Ethernet Cable (not shown) than one BSS can be configured as an Extended Service Set (ESS). This con-
tinuous network allows users to roam freely. All PCs equipped with an Instant
System Requirements Wireless*" Series adapter must be configured with the same SSID and use the
same radio channel.
• A Windows 95, 98, Millennium, NT version 4.0, 2000. or XP PC
• Internet Explorer ver. 4.0 or higher Before enabling a network with roaming capability, choosing a feasible radio
• One CD-ROM Drive channel and optimum Wireless Network Access Point position is recommend-
ed. Proper Wireless Network Access Point positioning combined with a clear
radio signal will greatly enhance performance.
2 3
EFTA00578363
Instant Wireless" Series Wireless Network Access Point
Chapter 3: Getting to Know the The Wireless Network Access Point's LEDs
Wireless Network Access Point
The Wireless Network Access Point's Ports
The Access Point's ports, where a network cable is connected, am located on
the Access Point's rear panel.
Figure 3-2
Power Red. The Power LED lights up when the Access Point is
powered on.
ACT Green. If the LED is flickering, the Access Point is actively
sending or receiving data to or from one of the devices on the
Figure 3-1
network.
Dipole Antenna
Connectors These two round connections are where the antennae are LINK Amber. The LINK LED serves two purposes. If the LED is
connected to the Access Point. continuously lit up, the Access Point is successfully connect-
ed to a device through the LAN port. If the LED is flicker-
LAN This LAN (Local Area Network) port connects to ing, it is an indication of any network activity.
Ethernet network devices, such as a hub, switch, or
router.
Power The Power port is where you will connect the power
adapter.
Reset Button Them are two ways to Reset the Access Point's factory
defaults. Briefly press the Reset Button for approximately
ten seconds, or use the Password tab of the Access Point's
Web-Based Utility.
Important: Resetting the Access Point will erase all of your settings
(WEP Encryption. Wireless and LAN settings, etc.) and replace
them with the factory defaults.
4 5
EFTA00578364
Instant Wireless" Series Wireless Network Access Point
Chapter 4: Connecting the Chapter 5: Setting Up the
Wireless Network Access Point Wireless Network Access Point
Have You: Connected the Access Point to a hub, switch or router
I. Locate an optimum location for the Access Point. The best place for the
Access Point is usually at the center of your wireless network, with line of on your wired network as shown in Chapter 4: Connecting the
sight to all of your mobile stations.
Now that you've connected the Access Point to your wired network, you are
2. Fix the direction of the antenna. Try to place it in a position which can
ready to begin setting it up. This Setup Wizard will take you through all the
best cover your wireless network. Normally, the higher you place the anten-
na, the better the performance will be. The antenna's position enhances the steps necessary to get the Access Point connecting your wireless network to
receiving sensitivity. Both antennae should be perpendicular to the ground your wired network and communicating more efficiently.
and parallel to each other.
Note: While the Access Point has been designed to work correct-
3. Connect a standard Ethernet network cable to the Access Point. Then, ly right out of the box, setting it up on a wireless computer will
connect the other end of the Ethernet cable to a switch or hub. The Access require you to use the Linksys default settings. These settings can
Point will then be connected to your 10/100 Network. then be changed with the Web-based Browser Utility.
4. Connect the AC Power Adapter to the Access Point's Power Socket. 1. Insert the Setup Wizard CD into your PC's CD-ROM drive. Optimally. your
Only use the power adapter supplied with the Access Point. Use of a differ- PC should be on your wired network.
ent adapter may result in product damage.
Now that the hardware installation is complete. proceed to Chapter 5: Setting 2. The screen in Figure 5-I should appear on your monitor. If it does not, this
Up the Wireless Network Access Point for directions on how to setup the means the autorun is not functioning. Start the autorun manually by click-
Access Point. ing the Start button, selecting Run, and typing dAsetup.exe (where "D" is
your PC's CD-ROM drive). Click the Setup button to continue this Setup
Note: In order for all other wireless devices to communicate with Wizard. Clicking the User Guide button opened this User Guide. To access
the Access Point. those devices must be operating in the the Linksys web site on an active Internet connection, click the Linksys
Infrastructure Mode. If any wireless devices are configured in Web button or to exit this Setup Wizard, click the Exit button.
the Ad Hoc Mode, they will not be recognized by the Access Point.
6 7
EFTA00578365
Instant Wireless^" Series Wireless Network Access Point
4. The next screen to appear, shown in Figure 5.3, will display a list of access
C points on your network along with the status information for each access
Lry LINKEM3 point. If this is the only access point on your network, it will be the only one
74(417 displayed. If there are more than one displayed select the Access Point by
ON Ilk
clicking on it and click the Yes button to continue or No to exit the Setup
Wizard.
Welcome WAP11
I u
illy to* or. Mesa ACAS kr pa El• Ras riniad Yr* OmilaWc
Coils N OW l ••••• tom me egnmp Lpla •• ca.•••• • Ow
▪ •••• -ear 11•• ••••••
2?m, a. • ma eel
•
Figure 5-1
3. The following screen, shown in Figure 5.2, displays how there are two ways
to configure the Access Point in this Setup Wizard. Optimally, you should
perform this setup through a PC on your wired network. You can also set up
the Access Point through one of the PCs on your wireless network. Click
Figure 5-3
the Next button to continue or Exit to exit the Setup Wizard.
5. As shown in Figure 5.4, the Basic Settings screen will now appear. Enter
your wireless network's SSID, select the channel at which the network
broadcasts its wireless signal, and enter a unique access point name for the
L'l l_ir itc.r.Y5 Access Point. Then, click the Next button to continue or Back to previous
illusins Maim Pion,
page.
24(;ti ,
• SSID. The SSID is the unique name shared among all points in a wire-
Flaw do you intend toconnect vow Wireless less network. The SSID must be identical for all points in the wireless
Access Point? s.,.,,, hales Ili I wiling
ton • Side. laid. MIMI
network. It is case sensitive and must not exceed 32 characters, which
le a S tINSIV- pe
a ore • mo
n o may be any keyboard character. Make sure this setting is the same for all
/34 4.1 % .01 OaIda. • MSS, ...Skim. points in your wireless network.
'l b IS••••
anipsar • /SIM pa. Onill
La' p•I NillOWidal••••• nets*
• Channel. Select the appropriate channel from the list provided to corre-
...141.S.• bee a
tate Vft0/0. wrelnOntil Salk
'et spond with your network settings, between I and I I (in North America).
•• woes.
All points in your wireless network must use the same channel in order
to function correctly.
Figure 5-2
8 9
EFTA00578366
Instant Wireless" Series Wireless Network Access Point
• IP Address. This IP address must be unique to your network. (The
default IP address of 192.168.1.251.) As this is a private IP address,
L'I Lit rticsys • ANII•11 /111•01mr so.
there is no need to purchase a separate IP address from your service
er a. ms Mors Pill set
'14 C417 provider.
Banc Settlings
•1. am awe. Pee ap e,. =Is male••• rye • IP Mask. The Access Point's IP Mask (also known as a Subnet Mask)
ma. i•••••••• •••••• ?raglanMI
enre[Y ••••• d••• •••••••••••••• must be the same as your Ethernet network.
',most o••••• snit • wow •••••••••••••
moms Ss ••••••••• Our ••••••••••••••••
•••••••••••••fleposw
to /••• in•••••••• MSS..
.••••••• soNs ...war so ow...Y*0
• Gateway. This setting only appears when the DHCP, Automatically
W af tag c••••• NIS( ••••••••••
•••••• 'a et • Is
obtain an IP Address, option is enabled; it indicates the status of the
C=
fsity•p•••••••••powar 0••••••••• gateway and is not user-adjustable.
)•••••• ••• iv on wok
)08, 1•••••••• oa••••••• ••••••••
std. wows Omen I • /so Item •••••
0 so
C=3
••/••••• I Woe ••• *pm ARO= Son
••••••••••••••••••••••••••••••••• L'. 7. The Security Settings screen (Figure 5.6) will appear next. From this
.•••• Pa. •••••••
screen, you will set the Wired Equivalent Privacy (WEP) encryption for
your wired network. Select a WEP configuration method and a passphrase.
Then. click the Next button to continue or Back to previous page.
Figure 5-4
• Access Point Name. You may assign any name to the Access Point.
Unique, memorable names are helpful, especially if you are employing Levrtsts • bael, WOW ' fee*.
Margins Moans Poe'
multiple access points on the same network.
74(1117
Seamy Scrawl (optima— mint
6. As shown in Figure 5-5, the IP Settings screen will appear next. Unless your net-
work has a DHCP server, you will want to click the radio button beside Set IP •••• Irlua• MD" • • •••••••
a rola /mow - visessaw • ...so...,
• ••••••••••••• ••••
•••
•••
Address Manually to select this option. Enter an IP Address and IP Mask appro- Payers rein.
priate to your network. Then. click the Next button to continue or Back to pre- "UMW WPM. MI, •-•• .•••••
vious pagc. •••••••11 ••••••
/•••••••• w_ ••••• In- W ••••
tr Mir • f••••••
L'1 LirfricsNes • —a—.sow ••••••••• WM.. SO OM onn....
•• MCP ••• n. oar.— • ••••••••••• 0 so
IftsliesammtPet Scrap Wizard — ••••• ailmr ••• 1•••••••••
e" 4 MR
(4?III - --a
•-• -
C
_a--
M----
(*ego • *J.. •••••••• aw•• •
swis •5.•Y••••••• ••• ...••••••••••••.
sa• •• • ••••• •••• •••• •
Figure 5-6
• •••••S •••••• •••••••• oleos • • sm. PC"
no• rik• • • WEP (Disable/64-bit WEP/128-bit WEP/256-bit WEP). In order to
▪ l••••••• Sap Pew •• veal
utilize WEP encryption, select the WEP setting from the pull-down
fl op n rr•.r lee reel • ea
W ino •••Iti, peg an MPS Oa
same *v.* M 6.4 Noe •
menu. If you do not wish to utilize WEP encryption, make sure Disable
••• VOA ••
any. b. (*Sys, •••
So bane w•. is selected. The Access Point's WEP encryption is unique to Linksys and
may conflict with other vendors' WEP encryption.
Figure 5-5
10 11
EFTA00578367
Instant VVirelest Series Wireless Network Access Point
• Passphrase. This is the code used when logging a wireless device onto 9. The next screen (Figure 5.8) will allow you to review your settings. If these
the wireless network. It is a text string with a maximum of 16 alphanu- settings are correct, click the Yes button to save these settings. If there are
meric characters. The WEP Key Settings are based upon the Passphrase any problems with the settings, click the No button and you will return to
determined by you. Type that here. This passphrase may not work with the screen shown in Figure 5.2.
non-Linksys products due to possible incompatibility with other vendors'
passphrase generators.
8. The following Security Settings screen, shown in Figure 5.7, will allow you
to enter your WEP key. Each point in your wireless network must use the
same WEP key for the network to function properly. Verify that the appro-
priate key is entered and click the Next button to continue or Back to pre-
vious page.
4•H ,
1%1 P fA. 122 et 2% bib'
humor, ••••••••• bow roan momor •
Kr lop Isopies• Opmellid•Owa
Figure 5-8
C. oile • .4 Ina • wey d • w
Mr esign darwwwe wwwwwwetbni en.
10. At this point, the configuration performed with the Setup Wizard is com-
Tell IPSO el.• My a lire se
••••• now es Wine w plete, as shown in Figure 5-9. To configure any other Access Points in your
n ation 'Cave v network, you can run this Setup Wizard again. Click the Exit button to exit
Pinerena•OUlin Mum/ p lets 5•••
P p elOm Moan' eft
C
the Setup Wizard.
rossaiiss•6100
Lul I tracsvc..
Figure 5-7 r, ,--1-ts
almigt . 1117,- * ' i
^)- r . '
Congratulations
CI:,
\dip 1,
Figure 5-9
nine
-
12 13
EFTA00578368
Instant Wireless" Series Wireless Network Access Point
Chapter 6: Configuring the • Obtain an IP Address Automatically. Click this radio button to allow the
Access Point to obtain a dynamic IP address from a DHCP server.
Wireless Network Access Point • Specify an IP Address. This IP address must be unique to your network.
We suggest you use the default IP address of 192.168.1.25 I . As this is a pri-
Note: The Access Point is designed to function properly after vate IP address, there is no need to purchase a separate IP address from
using the Setup Wizard. This chapter is provided solely for those your service provider. Verify the address and click the Apply button to save
who wish to perform more advanced configuration or monitoring. changes.
• Subnet Mask. The Access Point's Subnet Mask (or IP Mask) must be the
The Access Point has been designed to be functional right out of the box, with same as your Ethernet network. Verify this is correct and click the Apply
the default settings in the Setup Wizard. However, if you'd like to change these button to set it.
settings, the Access Point can be configured through your web browser with the
Web-Based Utility. This chapter explains how to configure the Access Point in • Gateway. This setting only appears when the DHCP client is enabled and
this manner. the IP Address is obtained automatically. It indicates the status of the gate-
way and is not user-adjustable.
Connect to I '1 160.1.251
Open your web browser
• II r •In.• O.. se •••••, *sin t” ir •
and type the IP Address
• caw: irnammorflo OPOecoo• 4-1
you entered in the Setup
Wizard. Press the Enter
key and the following
screen, shown in Figure Letts VeAin I
6-I, will appear. Leave
the User Name field
Wit rat 12 •••
blank. The first time etsswiced
you open the Web- Now •• a- sneaks*.
Based Utility, use the . terraix• my p4sw.74 •••••• W •••••••
Oral
default password teener
admin. You can set a
new password on the Oral MED
Obeid•
screen shown in Figure
MO: .••••••••••
6-7. Figure 6-1
The Setup Tab Lisp road Lao. 0.0 YIN *aim
nut.. man rep. •Wit
-don flee.-w•••• saw
The first screen that appears, shown in Figure 6-2, is the "Setup" tab. This OAS •• •••••••• Pme ••••••nm 11•0.1• Nibs a... n a. • .
tearN--- o• warns....- NOV • al :la
allows you to change the Access Point's general settings. Change these settings SO.
as described here and click the Apply button to apply your changes or Cancel Lam®
Oct NOV to on iktri ordloner
00 tame is nose non dorr• or•ortsor not woos- I •
to cancel your changes. If you require online help, click the Help button.
• Access Point Name. You may assign any name to the Access Point.
Unique, memorable names are helpful, especially if you are employing
multiple access points on the same network. Verify this is the name you
wish to use and click the Apply button to set it. Figure 6-2
14 15
EFTA00578369
Instant Wireless'' Series Wireless Network Access Point
• SSID. The SSID is the unique name shared among all points in a wire- ICIIIM MM IE I
less network. The SSID must be identical for all points in the wireless ,e• •w— MO. Offil• ••••• • ji$44.•704 ta p•vt•
network. It is case sensitive and must not exceed 32 alphanumeric char- • OS. 411•11 lite son no we is is
acters, which may be any keyboard character. Make sure this setting is the 44R• •
same for all points in your wireless network. .
Mon WEI,
••••00•••• I Oaado
• Channel. Select the appropriate channel from the list provided to corre- CI
spond with your network settings, between I and I 1 (in North America).
All points in your wireless network must use the same channel in order
try I If m 01 II IQ
to function correctly. t_s n 01 M m
.o.
g
• WEP. The WEP Encryption method is Disabled by default. To enable
Ac
i_e_erler=
20
WEP, or make it mandatory, click the WEP Key Setting button.
Clicking the Backup button will store the Access Point's configuration to your Figure 6-4
PC's hard drive. You can restore this information by clicking the Restore but-
ton. The Mode pull-down menu will allow you to set the Passphrase in Hexadecimal
or ASCII characters. Hexadecimal characters on your keyboard are the letters
Click the Apply button to apply your changes or Cancel to cancel your "A" through "F— and the numbers "0" through "9", while ASCII characters are
changes. If you require online help, click the Help button. any character on your keyboard.
SETTING WEP ENCRYPTION: There are two ways to create WEP Encryption keys. The first method is by typ-
/MC lazuli Internet Explorer ing a Passphrase into that field and clicking the Generate button. This will gen-
Setting WEP Encryption through erate WEP Encryption keys based upon that passphrase. A second method is to
Da 'nu Vita Chatqii MEP +uu• to •y -ddwy?
the Web-based Browser Utility is type the WEP Encryption key in the available fields manually.
done by clicking the WEP Key
a I ore. SETTING THE AP MODE:
Setting button on the Setup
Screen as shown in Figure 6-2. Figure 6-3
The Access Point offers four modes of operation: Access Point, Access Point
A screen will pop up, asking you to confirm the WEP change to mandatory, as Client, Wireless Bridge, and Wireless Bridge Point to MultiPoint. For all bridg-
shown in Figure 6.3. Click the OK button to enable WEP Encryption or ing modes, make sure the channel, SSID, and WEP keys are the same.
Cancel to return to the Setup Screen.
• Access Point - The Operational Mode is set to Access Point by default.
This will open the WEP Key Setting screen, Figure 6-4. From this screen, you This connects your wireless PCs to a wired network. In most cases, no
can select the type of WEP encryption to use as well as set the Passphrase for change is necessary.
that encryption.
• Access Point Client - When set to Access Point Client mode. the Access Point
From the pull-down menu at the top of the screen, select 64-bit. 128-bit, or 256- Client is able to talk to one remote access point within its range. This mode
bit encryption. allows the Access Point Client to act as a client of a remote access point. The
Access Point Client cannot communicate directly with any wireless clients. A
Tuiporttini: Always remember that each point in your wireless net-
separate network attached to the Access Point Client can then be wirelessly
work MUST use the same WEP Encryption method and encryption
bridged to the remote access point. Enter the required LAN MAC address of the
key or your wireless network will not function properly.
remote access point
16 17
EFTA00578370
Instant Wireless TM Series Wireless Network Access Point
• Wireless Bridge - If you are trying to make a wireless connection between Only one of the Access Points must be in Point to MultiPoint mode. For all
two wired networks, as shown in Figure 6-5, select Wireless Bridge. This other bridged Access Points. select the Point to Point option. and enter the
mode connects two physically separated LAN segments with two Access Remote LAN MAC Address of the Access Point set to Point to MultiPoint.
Points.
Note: Linksys recommends bridging no more than three remote
To configure a Wireless Bridge environment, click Wireless Bridge and LANs in Wireless Bridge Point to MultiPoint mode. Bridging addi-
enter the Remote Bridge LAN MAC Address of the remote Access Point. tional remote LANs will result in a significant decrease in bandwidth.
The remote Access Point also needs to be set up as a Wireless Bridge.
Note: All devices on each wired network must be connected through a hub
or switch.
Note: In Wireless Bridge mode, the Access Point can ONLY be
accessed by another access point in Wireless Bridge mode. In order
for your other wireless devices to access the Access Point. you must
reset it to Access Point mode. The two modes arc mutually exclusive.
•
UM
—
Cr dip Figure 6-6
Click the Apply button to apply your changes or Cancel to cancel your
changes. If you require online help, click the Help button.
The Password Tab
a a The "Password" tab, shown in Figure 6-7, allows you to change the Access
Point's password and restore factory defaults.
Figure 6-5 Changing the sign-on password for the Access Point is as easy as typing the
password into the AP Password field. Then, type it again into the second field
to confirm.
• Wireless Bridge Point to MultiPoint- If you are frying to make a wireless
connection between more than two wired networks, as shown in Figure 6- To restore the Access Point's factory default settings, click the Yes button
6, select Wireless Bridge Point to MultiPoint. This mode allows you to beside Restore Factory Defaults.
construct a network that has multiple Access Points bridging wirelessly.
Important: Restoring the Access Point's factory defaults will erase
To configure a Wireless Bridge Point to MultiPoint environment, click all of your settings (WEP Encryption. Wireless and LAN settings.
Wireless Bridge Point to MultiPoint for the Access Point used in LAN I.
etc.). replacing them with the factory defaults. Do not reset the
No MAC Address binding is needed. Then, set the Access Points in LAN 2
and LAN 3 to Point to Point, and have them look for the MAC Address of Access Point if you want to retain these settings
18 19
EFTA00578371
Instant Wireless TM Series Wireless Network Access Point
!le tAlf few 'fn.., 9. !AC .n• airbag • OS.
tido flutearosibt stns.
PASSWORD
lot bit
• Mire
Figure 6-7
Click the Apply button to apply your changes or Cancel to cancel your
changes. If you require online help, click the Help button.
The Status Tab
• ammo
The "Status" tab, shown in Figure 6-8, will display current information on the Figure 6-8
Access Point, its settings and performance.
• SSID. The unique name shared among all points in your wireless network
• Firmware Version. This displays the current version of the Access Point's is displayed here.
firmware. Firmware should only be upgraded if you experience problems
with the Access Point and can be upgraded from the Help tab.
• Encryption Function. The encryption method you chose in the Setup
• IP Address. This IP address is the unique address to your network. Wizard or changed from the Setup Tab of this Web-based Utility is dis-
played here.
• Subnet Mask. The Access Point's Subnet Mask (also known as a IP Mask),
which is the same as your Ethernet network. • Channel. The wireless channel shared by all wireless devices connected to
this Access Point is displayed here.
• Gateway. This setting indicated the Network's Gateway mask, only appli-
cable when DHCP is enabled. • Send and Recv. The Send and Recv fields under the Wireless's status dis-
play the amount of packets sent and received. Some packet loss is normal
• Send and Recv. The Send and Recv fields under the LAN's status display in wireless networking.
the amount of packets sent and received. Some packet loss is normal in
wireless networking.
20 21
EFTA00578372
Instant Wireless TM Series Wireless Network Access Point
The Log Tab
tio I. f«. .r--•-• 7. •
To view a log of the Access Point's activity, select the "Log" tab, shown in
Figure 6-9.
Ilb lit Ile Il• •••• • illegellitilatilfl
O • Q sign •••• er•••••110 afrilspialai esedilis
Woks -
Figure 6-10
Thefollowing resources require an Internet connection in order to access them.
Figure 6-9 Click the Linksys Website link to connect to the Linksys homepage for
ICnowledgebase help files and information about other Linksys products.
To enable logging activity, click the Enable radio button beside Arrecs Log.
The default setting for this function is Disable. For an Online Manual in PDF format, click that text link. The manual will appear
in Adobe pdf format. If you do not have the Adobe PDF Reader installed on your
The Send Log to option designates from which PC you can view the log. Third computer, click the Adobe Website link or go to the Setup Wizard CD-ROM to
party "View Log" software is required to take advantage of this option. download this software. To download from the CD-ROM, click the Start button and
select Run. Type D:\Acrobat (where "D" is the letter of your CD-ROM drive).
To view the log, click the View Log button.
Firmware can be upgraded by clicking the Upgrade Firmware link Do not upgrade
Click the Apply button to apply your changes or Cancel to cancel your your firmware unless you are experiencing problems with the Access Point
changes. If you require online help, click the Help button. The Filter Tab
The Help Tab
The "Filter" tab, shown in Figure 6.11, allows you to block or allay certain com-
For help on the various tabs in this Web-based Utility, along with upgrading the puters, by their MAC Address, from communicating with the Arens Point.
Access Point's firmware and viewing this User Guide, click the "Help" tab,
shown in Figure 6.10. To enable filtering of computers by their MAC Addresses, click the Enable radio
button. To disable this feature. click the radio button by Disable.
The help files for the various tabs in this Web-based Utility are listed by tab
name on the left hand side of the screen.
22 23
EFTA00578373
Instant Wireless TM Series Wireless Network Access Point
The Wireless Tab
. C
Os Is Sm. ••••• —
J • • a v. tosteltes.
nay' IIISJYSIPO
•••• 1,C$ sin MK buomd bans • atm droop
.t Si •:a son MSC W eta• do•c•
Figure 6-11 IMO •
Figure 6-12
Next, determine if the Access Point will deny access only to the MAC addresses you
will specify, OR if the Access Point will allow access only to the MAC Addresses Before making any changes to the Wireless tab, shown in Figure 6-12, please
you will specify. Click the radio button next to the option that is appropriate. check your wireless settings on other systems, as these changes will alter the
effectiveness of the Access Point. In most cases, these settings do not need to
Above the MAC Address fields, there is a pull-down menu. This pull-down be changed.
menu is for selecting the number of computers on your wireless network. For
computers one through ten on your wireless network, 1-10 is selected by • Beacon Interval. This value indicates the frequency interval of the beacon.
default. If you have more than ten computers on your wireless network, use this A beacon is a packet broadcast by the Access Point to keep the network syn•
pull-down menu to select 11-20, 21-30, etc., up to a maximum of 50 MAC chronized. A beacon includes the wireless LAN service area, the AP
Addresses. address, the Broadcast destination addresses, a time stamp, Delivery Traffic
Indicator Maps, and the Traffic Indicator Message (TIM).
Then, type the MAC Address(es) you wish to filter in the MAC Address fields.
• RTS Threshold. This value should remain at its default setting of 2,432.
When you've completed making any changes on this tab, click the Apply but- Should you encounter inconsistent data flow, only minor modifications are
ton to save those changes or Undo to exit the Web-based Utility without saving recommended.
changes. For more information on this tab, you can click the Help button.
24 25
EFTA00578374
Instant Wireless" Series Wireless Network Access Point
• Fragmentation Threshold. This specifies the maximum size a data pack- • SSID Broadcast. For security purposes, this selection can be disabled,
et will be before splitting and creating a new packet and should remain at allowing only those wireless network cards with the Access Point's SSID to
its default setting of 2,346. A smaller setting means smaller packets, which communicate with the Access Point. By default, this selection is enabled,
will create more packets for each transmission. Only minor modifications allowing all wireless network cards in your wireless network to communi-
of this value are recommended. cate with the Access Point.
• DTIM Interval. This value indicates the interval of the Delivery Traffic Important: The Access Point will not he recognized by "site-sur-
Indication Message (DTIM). A DTIM field is a countdown field informing vcy" utilitics. such as the Microsoft' Window? XP Zero
clients of the next window for listening to broadcast and multicast mes- Configuration Utility, if SSID Broadcast is disabled.
sages. When the Access Point has buffered broadcast or multicast messages
for associated clients, it sends the next DTIM with a DTIM Interval value. When you've completed making any changes on this tab, click the Apply but-
Access Point Clients hear the beacons and awaken to receive the broadcast ton to save those changes or Cancel to exit the Web-based Utility without sav-
and multicast messages. ing changes. For more information on this tab, you can click the Help button.
• Transmission Rates. The basic transfer rates should be set depending on
the speed of your wireless network. You must select 1-2 (MBps) if you have
older 802.11 compliant equipment on your network, such as wireless
adapters that support only 1 or 2 Mbps. Selecting 1.2 (MBps), however,
does not limit the basic transfer rates of faster adapters.
• Preamble Type. The preamble defines the length of the CRC block for
communication between the Access Point and a roaming Network Card.
(High network traffic areas should use the shorter preamble type.) Select
the appropriate preamble type and click the Apply button to set it. All wire-
less points (nodes) on your network should use the same preamble type.
• Authentication Type. You may choose between Open System. Shared
Key. and Both. The Authentication Type default is set to Open System.
Shared Key is when both the sender and the recipient share a secret key.
All points on your network must use the same authentication type. It is rec-
ommended that you use the default setting.
• Antenna Selection. This selection is for choosing which antenna transmits
data. By default, the Diversity Antenna selection, used to increase recep-
tion, is chosen.
26 27
EFTA00578375
Instant Wireless TM Series Wireless Network Access Point
Appendix A: Troubleshooting What is Infrastructure?
An integrated wireless and wired LAN is called an Infrastructure configura-
tion. Infrastructure is applicable to enterprise scale for wireless access to a cen-
This chapter provides solutions to problems usually encountered during the tral database, or wireless application for mobile workers.
installation and operation of the Access Point. Read the description below to
solve your problems. If you can't find an answer here, check the Linksys web- What is Roaming?
site at www.linksys.com. Roaming is the ability of a portable computer user to communicate continu-
ously while moving freely throughout an area greater than that covered by a
Frequently Asked Questions single Access Point. Before using the roaming function, the workstation must
Can the Access Point act as my DHCP Server? make sure that it is the same channel number as the Access Point of the dedi-
No. The Access Point is nothing more than a wireless hub, and as such, cannot cated coverage area.
be configured to handle DHCP capabilities.
To achieve true seamless connectivity, the wireless LAN must incorporate a
Can I run an application from a remote computer over the wireless net- number of different functions. Each node and Access Point, for example, must
work? always acknowledge receipt of each message. Each node must maintain contact
This will depend on whether or not the application is designed to be used over with the wireless network even when not actually transmitting data. Achieving
a network. Consult the application's user guide to determine if it supports oper- these functions simultaneously requires a dynamic RF networking technology
ation over a network. that links Access Points and nodes. In such a system, the user's end node under-
takes a search for the best possible access to the system. First, it evaluates such
Can I play multiplayer games with other users of the wireless network? factors as signal strength and quality, as well as the message load currently
Yes, as long as the game supports multiple players over a LAN (local area net- being carried by each Access Point and the distance of each Access Point to the
work). Refer to the game's user guide for more information. wired backbone. Based on that information, the node next selects the right
Access Point and registers its address. Communications between end node and
What is the IEEE 802.11b standard? host computer can then be transmitted up and down the backbone.
The IEEE 802.11b Wireless LAN standards subcommittee is formulating a
standard for the industry. The objective is to enable wireless LAN hardware As the user moves on, the end node's RF transmitter regularly checks the sys-
from different manufacturers to communicate. tem to determine whether it is in touch with the original Access Point or
whether it should seek a new one. When a node no longer receives acknowl-
What IEEE 802.11 features are supported? edgment from its original Access Point, it undertakes a new search. Upon find-
The product supports the following IEEE 802.11 functions: ing a new Access Point, it then re-registers, and the communication process
• CSMAICA plus Acknowledge protocol continues.
• Multi-Channel Roaming
Automatic Rate Selection What is BSS ID?
RTS/CTS feature A specific Ad-hoc LAN is called a Basic Service Set (BSS). Computers in a
Fragmentation BSS must be configured with the same BSS ID.
Power Management
What is ESSID?
What is Ad-hoc? An Infrastructure configuration could also support roaming capability for
An Ad-hoc wireless LAN is a group of computers. each with a WLAN adapter, mobile workers. More than one BSS can be configured as an Extended Service
connected as an independent wireless LAN. An Ad-hoc wireless LAN is appli- Set (ESS). Users within an ESS could roam freely between BSSs while main-
cable at a departmental scale for a branch or SOHO operation. taining a continuous connection to the wireless network stations and Access
Points.
28 29
EFTA00578376
Instant Wireless TM Series Wireless Network Access Point
What is ISM band? Can Instant Wireless' products support file and printer sharing?
The FCC and their counterparts outside of the U.S. have set aside bandwidth Instant Wireless"' products perform the same function as LAN products.
for unlicensed use in the ISM (Industrial, Scientific and Medical) band. Therefore, Instant Wireless' products can work with Netware, Windows
Spectrum in the vicinity of 2.4 GHz, in particular, is being made available NT/2000, or other LAN operating systems to support printer or file sharing.
worldwide. This presents a truly revolutionary opportunity to place convenient
high speed wireless capabilities in the hands of users around the globe. What is WEP?
WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit
What is Spread Spectrum? shared key algorithm, as described in the IEEE 802.11 standard.
Spread Spectrum technology is a wideband radio frequency technique devel-
oped by the military for use in reliable, secure, mission-critical communica- What is a MAC Address?
tions systems. It is designed to trade off bandwidth efficiency for reliability, The Media Access Control (MAC) address is a unique number assigned by the
integrity, and security. In other words, more bandwidth is consumed than in the manufacturer to any Ethernet networking device, such as a network adapter,
case of narrowband transmission, but the trade-off produces a signal that is, in that allows the network to identify it at the hardware level. For all practical pur-
effect, louder and thus easier to detect, provided that the receiver knows the poses. this number is usually permanent. Unlike IP addresses, which can
parameters of the spread-spectrum signal being broadcast. If a receiver is not change every time a computer logs on to the network, the MAC address of a
tuned to the right frequency, a spread-spectrum signal looks like background device stays the same, making it a valuable identifier for the network.
noise. There are two main alternatives, Direct Sequence Spread Spectrum
(DSSS) and Frequency Hopping Spread Spectrum (FHSS).
What is DSSS? What is FHSS? And what are their differences?
Frequency Hopping Spread Spectrum (FHSS) uses a narrowband carrier that
changes frequency in a pattern that is known to both transmitter and receiver.
Properly synchronized, the net effect is to maintain a single logical channel. To
an unintended receiver, FHSS appears to be short-duration impulse noise.
Direct Sequence Spread Spectrum (DSSS) generates a redundant bit pattern for
each bit to be transmitted. This bit pattern is called a chip (or chipping code).
The longer the chip, the greater the probability that the original data can be
recovered. Even if one or more bits in the chip are damaged during transmis-
sion, statistical techniques embedded in the radio can recover the original data
without the need for retransmission. To an unintended receiver, DSSS appears
as low power wideband noise and is rejected (ignored) by most narrowband
receivers.
Would the information be intercepted while transmitting on air?
WLAN features two-fold protection in security. On the hardware side, as with
Direct Sequence Spread Spectrum technology, it has the inherent security fea-
ture of scrambling. On the software side, the WLAN series offers the encryp-
tion function (WEP) to enhance security and access control. Users can set it up
depending upon their needs.
30 31
EFTA00578377
Instant Wireless TM Series Wireless Network Access Point
Appendix B: Setting Up the TCP/IP The following instructions are provided as examples for reference only. For
complete instructions on installing and troubleshooting TCP/IP, consult your
Windows operating system documentation.
Protocol TCP IP Setup for Windows 95, 98, and Millennium
Setting Up TCP'IP in Windows
Before a computer can communicate with the Access Point, it must be config- I. Click the Start button, select Settings, and open the Control Panel. Inside
ured with the TCP/IP protocol. If you know how to set up TCP/IP on your com- the Control Panel, double-click the Network icon.
puters, do so now. Otherwise, use the guidelines below to help get TCP/IP
installed on all of the computers that need to communicate with the Access 2. If the TCP/IP Protocol is listed for your network adapter, go to step five.
Point. If you are unable to successfully install TCP/IP on one or more comput- Othenvise, click the Add button.
ers after following the directions, contact the manufacturer of your computers
network operating system for further assistance. Check with your network 3. When the Component Type window appears, select Protocol and click the
administrator for your TCP/IP settings. Add button.
The directions below provide general guidelines for coming up with IP address- 4. Select Microsoft in the Manufacturers list and choose TCP/IP in the
es and subnet masks. Check with your network administrator to see if you need Network Protocols list. Then, click the OK button.
to use specific IP addresses or DHCP settings.
5. When the Network window reappears, click TCP/IP and then click the
First, each computer on the network will require an IP address, which is a series Properties button.
of numbers, separated by periods, identifying the PC on the network. To make
things simple, it is recommended you use the following numbering scheme: 6. Select Specify an IP Address.
192.168.I.X 7. Enter an IP Address for the computer, along with a Subnet Mask. Click the
OK button. If you do not have these values, consult your network adminis-
In this example, X is a unique, arbitrarily assigned number from 1 to 254. Each trator.
computer must have its own unique X number. Note: Never use 0 or 255 for X.
These numbers are reserved by TCP/IP for other uses. 8. When the Network window reappears, click the OK button. Restart your
machine. TCP/IP has now been successfully installed.
For example, if you have three computers, you could number them as follows:
192.168.1.17
192.168.1.44
192.168.1.126
In this case, 17, 44, and 126 are arbitrary numbers between I and 254.
Each computer will also require a subnet mask, which is a numerical "filter"
that tells a computer what kinds of TCP/IP data packets to accept. If you're not
sure which mask to use, the following mask is recommended:
255.255.255.0
32 33
EFTA00578378
Instant Wireless TM Series Wireless Network Access Point
TCP/IP Setup for Windows NT 4.0 TCP'IP Setup for Windows 2000
I. Click the Start button, select Settings, and open the Control Panel. Inside 1. At the Windows 2000 desktop, right click My Network Places. Then, right
the Control Panel, double-click the Network icon. click Local Area Connection. Choose Properties.
2. When the Network window appears, click the Protocols tab. Then, click 2. If the TCP/IP Protocol is listed for your network adapter, go to step five.
the Add button. Otherwise, click the Install button.
3. Find the TCP/IP protocol in the Select Network Protocol field. Click on 3. When the Component Type window appears, select Protocol, and click the
it once and then click the OK button. Install button.
4. When asked if you want to use DHCP, choose No. 4. Select Internet Protocol (TCP/IP) from the list and click the OK button.
5. If asked to supply your Windows NT CD, do so. NT will copy the neces- 5. When the Network window reappears, select TCP/IP, and click the
sary files to your system. You may have to switch between the Access Properties button.
Point's Setup CD and the NT CD.
6. Select Use the following IP Address.
6. When TCP/IP appears in the Network Protocols window, click the
Bindings tab. Windows will store your new bindings. 7. Enter an IP Address for the computer, along with a Subnet Mask and
Default Gateway. Then, click the OK button. If you do not have these val-
7. Click the Protocols tab. Then, select TCP/IP. ues, consult your network administrator.
8. Click the Properties button. Select the type of network adapter you have 8. When the Network window reappears, click the OK button. Restart your
from the Adapters box and select Specify an IP Address. computer. TCP/IP has now been successfully installed.
9. Enter the computer's IP Address and Subnet Mask. Check with your net-
work administrator for your settings.
10. Enter your Default Gateway if you have one.
Note: a Default Gateway is not required. Check with your network administrator.
11. When you finish, click the OK button. If NT asks about WINS, ignore it.
12. When the Network window reappears, click the Close button. Restart your
computer when prompted. TCP/IP has now been successfully installed.
34 35
EFTA00578379
Instant Wireless' Series Wireless Networic Access Point
Appendix C: Glossary considered by the buffer designer. Like a cache, a buffer is a "midpoint hold-
ing place" but exists not so much to accelerate the speed of an activity as to
support the coordination of separate activities.
Adapter - Printed circuit board that plugs into a PC to add to capabilities or
connectivity to a PC. In a networked environment, a network interface card is CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) - In local
the typical adapter that allows the PC or server to connect to the intranet and/or area networking, this is the CSMA technique that combines slotted time-divi-
Internet. sion multiplexing with carrier sense multiple access/collision detection
(CSMA/CD) to avoid having collisions occur a second time. This works best if
Ad-hoc Network • An ad-hoc network is a wireless network or other small net- the time allocated is short compared to packet length and if the number of sit-
work in which some of the network devices are part of the network only for the uations is small.
duration of a communications session while in some close proximity to the rest
of the network. CSMA/CD (Carrier Sense Multiple Access/Collision Detection) - The LAN
access method used in Ethernet. When a device wants to gain access to the
Backbone • The part of a network that connects most of the systems and net- network, it checks to see if the network is quiet (senses the carrier). If it is not,
works together and handles the most data. it waits a random amount of time before retrying. If the network is quiet and
two devices access the line at exactly the same time, their signals collide. When
Bandwidth • The transmission capacity of a given facility, in terms of how the collision is detected, they both back off and each wait a random amount of
much data the facility can transmit in a fixed amount of time; expressed in bits time before retrying.
per second (bps).
Database - A database is a collection of data that is organized so that its con-
Beacon Interval - A beacon is a packet broadcast by the Access Point to keep tents can easily be accessed, managed, and updated.
the network synchronized. A beacon includes the wireless LAN service area,
the AP address, the Broadcast destination addresses, a time stamp, Delivery DHCP (Dynamic Host Configuration Protocol) - A protocol that lets network
Traffic Indicator Maps, and the Traffic Indicator Message (TIM). administrators manage centrally and automate the assignment of Internet
Protocol (IP) addresses in an organization's network. Using the Internet's set of
Bit - A binary digit. The value - 0 or I -used in the binary numbering system. protocol (TCP/IP), each machine that can connect to the Internet needs a
Also, the smallest form of data. unique IP address. When an organization sets up its computer users with a con-
nection to the Internet, an IP address must be assigned to each machine.
Browser • A browser is an application program that provides a way to look at Without DHCP, the IP address must be entered manually at each computer and,
and interact with all the information on the World Wide Web or PC. The word if computers move to another location in another part of the network, a new IP
"browser" seems to have originated prior to the Web as a generic term for user address must be entered. DHCP lets a network administrator supervise and dis-
interfaces that let you browse text files online. tribute IP addresses from a central point and automatically sends a new IP
address when a computer is plugged into a different place in the network.
BSS (Basic Service Set) - A group of wireless Network PC Card users and an
Access Point. DHCP uses the concept of a "lease" or amount of time that a given IP address
will be valid for a computer. The lease time can vary depending on how long a
Buffer - A buffer is a shared or assigned memory area used by hardware user is likely to require the Internet connection at a particular location. It's espe-
devices or program processes that operate at different speeds or with different cially useful in education and other environments where users change fre-
sets of priorities. The buffer allows each device or process to operate without quently. Using very short leases, DHCP can dynamically reconfigure networks
being held up by the other. In order for a buffer to be effective, the size of the in which there are more computers than there are available IP addresses.
buffer and the algorithms for moving data into and out of the buffer need to be DHCP supports static addresses for computers containing Web servers that
need a permanent IP address.
36 37
EFTA00578380
Instant Wireless' Series Wireless Network Access Point
Download • To receive a file transmitted over a network. In a communications FHSS (Frequency Hopping Spread Spectrum) - FHSS continuously changes
session, download means receive, upload means transmit. the center frequency of a conventional carrier several times per second accord-
ing to a pseudo-random set of channels, while chirp spread spectrum changes
Driver • A workstation or server software module that provides an interface the carrier frequency. Because a fixed frequency is not used, illegal monitoring
between a device and the upper-layer protocol software running in the comput- of spread spectrum signals is extremely difficult, if not downright impossible
er: it is designed for a specific device, and is installed during the initial instal- depending on the particular method.
lation of a network-compatible client or server operating system.
Firmware - Programming that is inserted into programmable read-only mem-
DSSS (Direct-Sequence Spread-Spectrum) - DSSS generates a redundant bit ory (programmable read-only memory), thus becoming a permanent part of a
pattern for each bit to be transmitted. This bit pattern is called a chip (or chip- computing device.
ping code). The longer the chip, the greater the probability that the original data
can be recovered. Even if one or more bits in the chip are damaged during Fragmentation - Breaking a packet into smaller units when transmitting over
transmission, statistical techniques embedded in the radio can recover the orig- a network medium that cannot support the original size of the packet.
inal data without -the need for retransmission. To an unintended receiver, DSSS
appears as low power wideband noise and is rejected (ignored) by most nar- Gateway - A device that interconnects networks with different, incompatible
rowband receivers. communications protocols.
DTIM (Delivery Traffic Indication Message) - A DTIM field is a countdown Hardware - Hardware is the physical aspect of computers, telecommunica-
field informing clients of the next window for listening to broadcast and mul- tions, and other information technology devices. The term arose as a way to dis-
ticast messages. When the AP has buffered broadcast or multicast messages for tinguish the "box" and the electronic circuitry and components of a computer
associated clients, it sends the next DTIM with a DTIM Interval value. AP from the program you put in it to make it do things. The program came to be
Clients hear the beacons and awaken to receive the broadcast and multicast known as the software.
messages.
Hub - The device that serves as the central location for attaching wires from
Dynamic IP Address - An IP address that is automatically assigned to a client workstations. Can be passive, where there is no amplification of the signals; or
station in a TCP/IP network, typically by a DHCP server. Network devices that active, where the hubs are used like repeaters to provide an extension of the
serve multiple users, such as servers and printers, are usually assigned static IP cable that connects to a workstation.
addresses.
IEEE (The Institute of Electrical and Electronics Engineers) - The IEEE
Encryption • A security method that applies a specific algorithm to data in describes itself as "the world's largest technical professional society, promoting
order to alter the data's appearance and prevent other devices from reading the the development and application of electrotechnology and allied sciences for
information. the benefit of humanity, the advancement of the profession, and the well-being
of our members."
ESS • More than one BSS in a network.
The IEEE fosters the development of standards that often become national and
Ethernet - IEEE standard network protocol that specifies how data is placed international standards. The organization publishes a number of journals, has
on and retrieved from a common transmission medium. Has a transfer rate of many local chapters, and several large societies in special areas, such as the
10 Mbps. Forms the underlying transport vehicle used by several upper-level IEEE Computer Society.
protocols, including TCP/IP and XNS.
Infrastructure - An infrastructure network is a wireless network or other small
network in which the wireless network devices are made a part of the network
through the Access Point which connects them to the rest of the network.
38 39
EFTA00578381
Instant Wireless" Series Wireless Network Access Point
IP Address - In the most widely installed level of the Internet Protocol Passphrase - Used much like a password, a passphrase simplifies the WEP
(Internet Protocol) today, an IP address is a 32-binary digit number that identi- encryption process by automatically generating the WEP encryption keys for
fies each sender or receiver of information that is sent in packet across the Linksys products.
Internet. When you request an HTML page or send e-mail, the Internet
Protocol part of TCP/IP includes your IP address in the message (actually, in PC Card - A credit-card sized removable module that contains memory, I/O,
each of the packets if more than one is required) and sends it to the IP address or a hard disk.
that is obtained by looking up the domain name in the Uniform Resource
Locator you requested or in the e-mail address you're sending a note to. At the Port - A pathway into and out of the computer or a network device such as a
other end, the recipient can see the IP address of the Web page requestor or the switch or router. For example, the serial and parallel ports on a personal com-
e-mail sender and can respond by sending another message using the IP address puter are external sockets for plugging in communications lines, modems and
it received. printers.
ISM band - The FCC and their counterparts outside of the U.S. have set aside RJ-45 (Registered Jack-45) - A connector similar to a telephone connector that
bandwidth for unlicensed use in the ISM (Industrial, Scientific and Medical) holds up to eight wires, used for connecting Ethernet devices.
band. Spectrum in the vicinity of 2.4 GHz, in particular, is being made avail-
able worldwide. This presents a truly revolutionary opportunity to place con- Roaming • The ability to use a wireless device and be able to move from one
venient high-speed wireless capabilities in the hands of users around the globe. access point's range to another without losing the connection.
LAN - A local area network (LAN) is a group of computers and associated Router - Protocol-dependent device that connects subnetworks together.
devices that share a common communications line and typically share the Routers are useful in breaking down a very large network into smaller subnet-
resources of a single processor or server within a small geographic area (for works; they introduce longer delays and typically have much lower throughput
example, within an office building). rates than bridges.
MAC (Media Access Control) Address - A unique number assigned by the RTS (Request To Send) - An RS-232 signal sent from the transmitting station
manufacturer to any Ethernet networking device, such as a network adapter. to the receiving station requesting permission to transmit.
that allows the network to identify it at the hardware level.
Server - Any computer whose function in a network is to provide user access
Mbps (MegaBits Per Second) - One million bits per second; unit of measure- to files, printing, communications, and other services.
ment for data transmission.
Software - Instructions for the computer. A series of instructions that performs
Multicasting - Sending data to a group of nodes instead of a single destination. a particular task is called a "program." The two major categories of software are
"system software" and "application software." System software is made up of
Network - A system that transmits any combination of voice, video and/or data control programs such as the operating system and database management sys-
between users. tem (DBMS). Application software is any program that processes data for the
user.
Node - A network junction or connection point, typically a computer or work
station. A common misconception is that software is data. It is not. Software tells the
hardware how to process the data.
Packet - A unit of data routed between an origin and a destination in a network.
SOHO (Small Office/Home Office) - Market segment of professionals who
work at home or in small offices.
40 41
EFTA00578382
Instant WirelessTM Series Wireless Network Access Point
Spread Spectrum - Spread Spectrum technology is a veideband radio frequen- Throughput - The amount of data moved successfully from one place to anoth-
cy technique developed by the military for use in reliable, secure, mission-crit- er in a given time period.
ical communications systems. It is designed to trade off bandwidth efficiency
for reliability, integrity, and security. In other words, more bandwidth is con- Topology - A network's topology is a logical characterization of how the
sumed than in the case of narrowband transmission, but the trade off produces devices on the network are connected and the distances between them. The
a signal that is, in effect, louder and thus easier to detect, provided that the most common network devices include hubs, switches, routers, and gateways.
receiver knows the parameters of the spread-spectrum signal being broadcast. Most large networks contain several levels of interconnection, the most impor-
If a receiver is not tuned to the right frequency, a spread-spectrum signal looks tant of which include edge connections, backbone connections, and wide-area
like background noise. There are two main alternatives, Direct Sequence connections.
Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS).
Upgrade • To replace existing software or firmware with a newer version.
SSID (Service Set Identifier) - A unique name shared among all points in a
wireless network. The SSID must be identical for each point in the wireless Upload - To transmit a file over a network. In a communications session,
network and is case-sensitive. Also known as "ESSID." upload means transmit, download means receive.
Static IP Address • A permanent IP address that is assigned to a node in an IP UTP - Unshielded twisted pair is the most common kind of copper telephone
or a TCP/IP network. wiring. Twisted pair is the ordinary copper wire that connects home and many
business computers to the telephone company. To reduce crosstalk or electro-
Subnet Mask - The method used for splitting IP networks into a series of sub- magnetic induction between pairs of wires, two insulated copper wires are
groups, or subnets. The mask is a binary pattern that is matched up with the IP twisted around each other. Each signal on twisted pair requires both wires.
address to turn part of the host ID address field into a field for subnets. Since some telephone sets or desktop locations require multiple connections,
twisted pair is sometimes installed in two or more pairs, all within a single
Switch - I. A data switch connects computing devices to host computers, cable.
allowing a large number of devices to share a limited number of ports. 2. A
device for making, breaking, or changing the connections in an electrical cir- WEP (Wired Equivalent Privacy) - A data privacy mechanism based on a 64-
cuit. bit, 128-bit, or 256•bit shared key algorithm, as described in the IEEE 802.11
standard.
TCP (Transmission Control Protocol) - A method (protocol) used along with
the Internet Protocol (Internet Protocol) to send data in the form of message
units between computers over the Internet. While IP takes cam of handling the
actual delivery of the data, TCP takes care of keeping track of the individual
units of data (called packet) that a message is divided into for efficient routing
through the Internet.
TCP/IP (Transmission Control Protocol/Internet Protocol) - The basic com-
munication language or protocol of the Internet. It can also be used as a com-
munications protocol in a private network (either an intend or an extranet).
When you are set up with direct access to the Internet, your computer is pro-
vided with a copy of the TCP/IP program just as every other computer that you
may send messages to or get information from also has a copy of TCP/IP.
42 43
EFTA00578383
Instant Wireless TM Series Wireless Network Access Point
Appendix D: Specifications 1.2 Transmitter
Frequency Stability: Within + 25 ppm
Standards: Ii .EE 802.3 (I0BaseT), IEEE 802.3u (I00BaseTX)
Data Modulation Type: BPSK (1/5.5Mbps) / QPSK (2/11 Mbps)
IEEE 802.1 lb (Wireless)
CCK (5.5/11 Mbps)
Channels: II Channels (US, Canada)
13 Power
13 Channels (Europe)
14 Channels (Japan)
Power Voltage: DC 5.0 Volt + 5%, AC Adapter AC 20V
Ports: One 10/100 RJ•45 Port Power Consumption: 5.0 Volt, 2.0A (typical)
Cabling Type: UTP Category 5 or better Environmental
Operating Range Dimensions: 731" x 6.16" x 1.88" (186mm x 154mm x 48mm)
(Wit): Indoors: Up to 300 ft. (97 m) Unit Weight: 20.5 oz. (0.58 kg)
Outdoors: Up to 1500 ft. (457 m)
Power: 5V, 550mA Tx, 230mA Rx
Data Rate: Up to 11Mbps (Wireless), 10/100Mbps (Ethernet) Certifications: FCC Class C, CE Mark
LEDs: Power. Act, Link (Wired - Link/Activity) Operating Temp.: 0°C to 55°C (32°F to 131°F)
1.1 General Storage Temp.: 0°C to 70°C (32°F to 158°F)
Emission Type: Direct Sequence Spread Spectrum (DSSS) Operating Humidity: 0% to 70% Non•Condensing
RF Frequency: 2471MHz - 2497MHz - Japan Storage Humidity: 0% to 95% Non•Condensing
2400MHz - 2483.5MHz - North America, Europe.
Korea and Extended Japan
2455MHz - 2475MHz - Spain
2446.5MHz - 2483.5MHz - France
Radio Chipset: READ
MAC Controller: TI ACX [00 ‘v/BBP
Power Output: 20 dBm
44 45
EFTA00578384
Instant Wireless TM Series Wireless Network Access Point
Appendix E: Warranty Information Appendix F: Contact Information
For help with the installation or operation of this product, contact Linksys
BE SURE TO HAVE YOUR PROOF OF PURCHASE AND A BARCODE Technical Support at one of the phone numbers or Internet addresses below.
FROM THE PRODUCT'S PACKAGING ON HAND WHEN CALLING.
RETURN REQUESTS CANNOT BE PROCESSED WITHOUT PROOF OF Sales Information 500-546.5797 (LINKSYS)
PURCHASE. Technical Support 800-326-7I 14
RMA Issues 949-271.5461
IN NO EVENT SHALL LINKSYS'S LIABILITY EXCEED THE PRICE Fax 949-265.6655
PAID FOR THE PRODUCT FROM DIRECT, INDIRECT, SPECIAL, INCI- Email support@linksys.com
DENTAL, OR CONSEQUENTIAL DAMAGES RESULTING FROM THE Web http://www.linIcsys.com
USE OF THE PRODUCT, ITS ACCOMPANYING SOFTWARE, OR ITS FTP Site ftp.linksys.com
DOCUMENTATION. LINKSYS DOES NOT OFFER REFUNDS FOR ANY
PRODUCT.
LINKSYS OFFERS CROSS SHIPMENTS, A FASTER PROCESS FOR PRO-
CESSING AND RECEIVING YOUR REPLACEMENT. LINKSYS PAYS
FOR UPS GROUND ONLY. ALL CUSTOMERS LOCATED OUTSIDE OF
THE UNITED STATES OF AMERICA AND CANADA SHALL BE HELD
RESPONSIBLE FOR SHIPPING AND HANDLING CHARGES. PLEASE
CALL LINKSYS FOR MORE DETAILS.
46 47
EFTA00578385
(1 0 71)
I innormivmr
S MO EN 4•11Ell 4•11•S a S
http://www.linksys.corn
© Copyright 2002 Linksys. All Rights Reserved.
EFTA00578386