A Local Area Network (LAN) is a network in a central location. Users at that location share files, printers, and other services. In a LAN, a networked computers that request services are called clients, while servers in a LAN provide services. In a wireless LAN (WLAN), wireless adapters are installed in clients. A wireless client communicates with the WLAN without cables. Instead, wireless clients send and receive information through the air.
A wireless client operates in either infrastructure mode or peer-to-peer mode.
In infrastructure mode, wireless clients send and receive information through access points. When a wireless client communicates with another, it transmits to the access point. The access point receives the information and rebroadcasts it. Then the other device receives the information.
Access points are strategically located within an area to provide optimal coverage for wireless clients. A large WLAN uses multiple access points to provide coverage over a wide area. Access points can connect to a LAN through a wired Ethernet connection. Access points send and receive information from the LAN through this wired connection.
In peer-to-peer mode, also called Ad Hoc Mode, wireless clients send and receive information to other wireless clients without using an access point. In contrast to infrastructure mode, this type of WLAN only contains wireless clients.
You can use peer-to-peer mode to network computers in a home or small office, or to set up a temporary wireless network for a meeting.All adapters and access points in a WLAN use a Network Name, or Service Set Identifier (SSID) to identify the WLAN. The SSID indicates what WLAN you are communicating with.
Wireless networking devices transmit information through the air. Without implementing security, it is easy for an unauthorized person to intercept the information.
A common way of implementing security and protecting information is encryption. Before sending information, the wireless client or access point encrypts or scrambles information using an encryption key. The device receiving the information uses the same key to decrypt or unscramble the information. The information is only readable to wireless devices that have the correct encryption key.
The IEEE 802.11 wireless LAN standard specifies the Wired Equivalent Privacy (WEP) encryption and decryption algorithm. The standard includes two levels of security, using a 64-bit key or a 128-bit key. To implement WEP, use either one of these methods. For better security, use a 128-bit key. A 128-bit key has several trillion times as many possible combinations as a 64-bit key. For added security, change your keys often. Some vendors refer to 64-bit encryption as 40-bit. These are identical. A wireless device that claims to have 64-bit encryption interoperates with a device that claims to have 40-bit encryption.
The same device, host computer or front-end processor usually performs both encryption and decryption. The algorithm, like the pattern of a lock, is standardized and may be used by anyone, but the encrypted data is unreadable without the appropriate key, which is known only by the sender and receiver of the transmitted data. You should change your keys often for added security.
Adapter features include:
The adapter can only be installed in a CardBus PC Card slot in a suitably equipped computer. The adapter contains a built-in radio antenna that protrudes when inserted into the slot.
The Intel® PRO/Wireless 5000 LAN Adapter allows Personal Computer Memory Card
International Association (PCMCIA) 3.3-volt Type II PC Card slot-equipped
computers to configure, connect to and establish an Intel® PRO/Wireless 5000
LAN network.
The
exposed end of the adapter is vulnerable to damage from scratching, snagging or
striking other objects. Such contact may bend or break the adapter or the PC
Card slot in which it resides.
The LEDs on the Intel® PRO/Wireless 5000 LAN Adapter indicate the status of the adapter.
LED |
Function |
Green - link |
ON - adapter is associated with an access point; OFF - not associated. |
Yellow - activity |
Fast blink - data activity; slow blink - no data activity |
Copyright © 2002 Intel Corporation. Legal Information