Asus USB-N66 User Manual - Page 23

Encryption, Extended Service Set ESS, ESSID Extended Service Set Identifier, Ethernet, Firewall - y cable

Page 23 highlights

USB-N66 WLAN Adapter User Manual Encryption This provides wireless data transmissions with a level of security. This option allows you to specify a 64-bit or a 128-bit WEP key. A 64-bit encryption contains 10 hexadecimal digits or 5 ASCII characters. A 128-bit encryption contains 26 hexadecimal digits or 13 ASCII characters. 64-bit and 40-bit WEP keys use the same encryption method and can interoperate on wireless networks. This lower level of WEP encryption uses a 40-bit (10 hexadecimal digits assigned by the user) secret key and a 24-bit Initialization Vector assigned by the device. 104-bit and 128-bit WEP keys use the same encryption method. All wireless clients in a network must have identical WEP keys with the access point to establish connection. Keep a record of the WEP encryption keys. Extended Service Set (ESS) A set of one or more interconnected basic service set (BSSs) and integrated local area networks (LANs) can be configured as an Extended Service Set. ESSID (Extended Service Set Identifier) You must have the same ESSID entered into the gateway and each of its wireless clients. The ESSID is a unique identifier for your wireless network. Ethernet The most widely used LAN access method, which is defined by the IEEE 802.3 standard. Ethernet is normally a shared media LAN meaning all devices on the network segment share total bandwidth. Ethernet networks operate at 10Mbps using CSMA/CD to run over 10-BaseT cables. Firewall A firewall determines which information passes in and out of a network. NAT can create a natural firewall by hiding a local network's IP addresses from the Internet. A Firewall prevents anyone outside of your network from accessing your computer and possibly damaging or viewing your files. Gateway A network point that manages all the data traffic of your network, as well as to the Internet and connects one network to another. ICS ICS is used to share one computer's Internet connection with the rest of the computers on your network. When this computer is connected to the Internet, all the communications to and from the Internet on your network are sent through this computer which is called the host computer. The rest of the computers can send and receive e-mail messages and access the web as if it were connected directly to the Internet. ASUS WLAN adapter 23

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35

USB-N66 WLAN Adapter User Manual
23
ASUS WLAN adapter
Encryption
This provides wireless data transmissions with a level of security. This option
allows you to specify a 64-bit or a 128-bit WEP key. A 64-bit encryption contains
10 hexadecimal digits or 5 ASCII characters. A 128-bit encryption contains 26
hexadecimal digits or 13 ASCII characters.
64-bit and 40-bit WEP keys use the same encryption method and can
interoperate on wireless networks. This lower level of WEP encryption uses
a 40-bit (10 hexadecimal digits assigned by the user) secret key and a 24-bit
Initialization Vector assigned by the device. 104-bit and 128-bit WEP keys use
the same encryption method.
All wireless clients in a network must have identical WEP keys with the access
point to establish connection. Keep a record of the WEP encryption keys.
Extended Service Set (ESS)
A set of one or more interconnected basic service set (BSSs) and integrated
local area networks (LANs) can be configured as an Extended Service Set.
ESSID (Extended Service Set Identifier)
�ou must have the same ESSID entered into the gateway and each of its
wireless clients. The ESSID is a unique identifier for your wireless network.
Ethernet
The most widely used LAN access method, which is defined by the IEEE 802.3
standard. Ethernet is normally a shared media LAN meaning all devices on the
network segment share total bandwidth. Ethernet networks operate at 10Mbps
using CSMA/CD to run over 10-BaseT cables.
Firewall
A firewall determines which information passes in and out of a network. NAT
can create a natural firewall by hiding a local network’s IP addresses from the
Internet. A Firewall prevents anyone outside of your network from accessing
your computer and possibly damaging or viewing your files.
Gateway
A network point that manages all the data traffic of your network, as well as to
the Internet and connects one network to another.
ICS
ICS is used to share one computer’s Internet connection with the rest of the
computers on your network. When this computer is connected to the Internet,
all the communications to and from the Internet on your network are sent
through this computer which is called the host computer. The rest of the
computers can send and receive e-mail messages and access the web as if it
were connected directly to the Internet.