wireless guide vista v1.0 3.5.07

Embed Size (px)

Citation preview

  • 8/7/2019 wireless guide vista v1.0 3.5.07

    1/19

    1

    TOSHIBALeading Innovation >>>

    A Basic Guide to SettingUp Wireless Networks on

    Toshiba Notebooks

  • 8/7/2019 wireless guide vista v1.0 3.5.07

    2/19

    2

    TOSHIBALeading Innovation >>>

  • 8/7/2019 wireless guide vista v1.0 3.5.07

    3/19

    3

    TOSHIBALeading Innovation >>>

    Contents

    Introduction....................................................................................................................... 4

    What is a Wireless Network? ........................................................................................... 4

    What do I need to setup a Wireless Network?................................................................... 5

    Planning your wireless network ......................................................................................... 6

    How to set up a Wireless Network. ................................................................................... 9

    Troubleshooting.............................................................................................................. 16

    Glossary of Terms .......................................................................................................... 17

    Copyright Toshiba Information Systems (UK) Ltd, 2007

  • 8/7/2019 wireless guide vista v1.0 3.5.07

    4/19

    4

    TOSHIBALeading Innovation >>>

    Introduction

    Owning a notebook PC has many obvious benefits compared to a desktop PC, but what is the point of

    having a mobile PC if you still need to physically connect it to a cable in order to access the internet? The

    answer lies in wireless networking. By connecting wirelessly to an access point or router, you can haveaccess to your emails, the internet or other machines on your network where ever you are in your home or

    office.

    Setting up your wireless connection may seem daunting at first which is why we have created this guide. It

    is designed to take a complete beginner through the process including the equipment you will need,

    considerations regarding the security of your network and how you actually get the notebook to connect.

    There is also a troubleshooting section and a glossary of some of the commonly used terms that you may

    come across.

    What is a Wireless Network?

    A wireless network is two or more devices that are connected using radio communication rather than aphysical wire. There are two different types of wireless network, Infrastructure and Ad Hoc.

    InfrastructureAn example of an infrastructure network in a home environment could be as follows:

    In the diagram above we have an internet connection which is connected (via cable) to a Wireless Router.

    There is a desktop PC connected (via cable) to the router so the desktop also benefits from the internet

    connection. The notebook PCs are connected wirelessly via the router so that they can access the internetor the other computers on the network from anywhere within range.

    Figure 1 - An example of an infrastructure network

  • 8/7/2019 wireless guide vista v1.0 3.5.07

    5/19

    5

    TOSHIBALeading Innovation >>>

    Ad HocAn Ad Hoc network as the name implies is a temporary network where two or more wireless capable PCs

    are connected together without the use of a wireless router:

    You can share files or even an internet connection in this way as long as each PC is within range of the

    others.

    The majority of people would use the Infrastructure method of setting up a wireless network because it offers

    more security and is a more permanent form of network. Whilst PCs may come and go, the internetconnection is always there. An Ad Hoc network could be useful when you are visiting a different location

    (e.g. a customers site) and you need to transfer files to someone else but without needing access to their

    main network.

    What do I need to setup a Wireless Network?

    1) A notebook that has a wireless LAN card installed.In order to setup a wireless network you will need a notebook that has a wireless LAN card installed. Most

    current Toshiba notebooks already have a Wireless LAN card installed but if they dont, it is usually possible

    to have one fitted as an optional extra please refer to your models user manual if in doubt.

    2) A Wireless Router / Access PointAlthough it is possible to connect two wireless capable PCs together in an ad hoc wireless network, it is

    preferable to use a Wireless Router which physically connects to your internet source (e.g. your broadband

    connection or ADSL line etc) and then connects wirelessly to the PCs on your network. The type of router

    you will need also depends on the type of broadband connection you have some have the modem built in,

    others will connect to the modem supplied by your broadband provider.

    3) An Internet connectionThis point sounds obvious but is worth clarification. In order to access the internet wirelessly, you need an

    internet source. When you are at home, this may take the form of a broadband connection supplied via

    your telephone or cable supplier. When you are out and about you may be able to pay to connect to various

    hotspots (see glossary for explanation). When you are at work, your company may utilize wireless Access

    Points to allow you to connect to their network wirelessly.

    When you turn on the wireless switch on your notebook, you may well find other wireless networks around

    Figure 2 - An ad hoc (or peer to peer) network

  • 8/7/2019 wireless guide vista v1.0 3.5.07

    6/19

    6

    TOSHIBALeading Innovation >>>

    you but it does not necessarily mean that you can access them. Most people will have implemented

    security settings to prevent unknown users from accessing their internet connection after all, you wouldnt

    want to pay for strangers to use your own internet connection for free!

    Planning your wireless network

    When setting up a home wireless network, thankfully you do not have worry about a full site survey and an

    in depth plan. However there are a few key considerations that you should be aware of:

    Position of Access Point or Wireless RouterBasic physics come into play when trying to transmit and receive radio waves. Radio signals do not pass

    through metal barriers, and various other materials (such as bricks and glass) can reduce the range you

    would normally expect. The best scenario would be to have line of sight between the Access Point and the

    PCs trying to connect to it, however its unlikely that you will be able to achieve this in a typical home

    network. Therefore, the best thing would be to place the Access Point as centrally as possible to cover

    both upstairs and down stairs and where it will not be hindered by any metallic barriers. The position you

    place your Access Point is also often dictated by the location of the broadband or ADSL line and often the

    only way to know if you are getting good enough coverage is to walk around with the notebook and findingthe areas where your signal strength drops.

    Finally, to try and have some understanding of the coverage an Access Point or Router will give you,

    imagine a circle around it. Any where within the circle will get coverage and the closer to the centre of the

    circle, the stronger the signal. The picture below illustrates this with a typical ground floor layout in a

    house. The circle is actually three dimensional so the upstairs will also get coverage.

    Possible sources of interferenceJust as you sometimes get interference on your radio if the weather is bad or if a plane goes over, your

    wireless network can also be prone to interference. With your radio you will notice this as a hissing noiseor degradation in the quality of the sound. With your wireless network you may only notice your signal

    strength dropping.

    Figure 3 - Illustrating wireless coverage in a typical home.

  • 8/7/2019 wireless guide vista v1.0 3.5.07

    7/19

    7

    TOSHIBALeading Innovation >>>

    The key sources of interference on a wireless network are other devices that use the same radio frequency.

    The majority of home wireless networks use the 2.4GHz frequency which also happens to be used by

    Bluetooth devices, Microwave ovens and some cordless phones. The best way to avoid interference from

    these devices is to try and ensure that they are not close to your Access Point or wireless PCs, or to avoid

    using them at the same time as trying to access your wireless network.

    Different versions of the wireless networking standardWireless products have to comply with an industry standard and that standard is known as the IEEE

    802.11 standard. However, there are different parts to this standard and not all devices are therefore

    compatible with each other. The main standards you will come across when buying Access Points,

    routers or wireless network cards are 802.11b, 802.11g and 802.11a (with 802.11n due shortly).

    802.11b this was the first standard to be used in mainstream wireless networks. It is limited to 11Mbits/

    sec.

    802.11g this was the next step in improving the above mentioned 802.11b standard. It gives you greater

    speeds (up to 54Mbit/sec) and it is backwards compatible with 802.11b as they both use the 2.4GHz

    frequency.

    802.11a this standard was introduced to give both greater speeds (up to 54Mbit/sec) and to reduce the

    amount of possible interference because it uses the 5GHz frequency. It is not compatible with 802.11b or

    g unless you have a multi node device (i.e. can support both 802.11b/g and 802.11a).

    Speed and Range you can expectThe speed and range you can expect from your wireless network is subject to physical barriers and

    sources of interference as mentioned above, but the following charts give a rough guideline:

    802.11b

    0

    20

    40

    60

    80

    100

    120

    140

    11Mbit 5.5Mbit 2Mbit 1Mbit

    Data Rate (mega bits per second)

    Approx

    imateRange(metres)

    802.11b

  • 8/7/2019 wireless guide vista v1.0 3.5.07

    8/19

    8

    TOSHIBALeading Innovation >>>

    As you can see, all of the 802.11 standards will operate at lower speeds if they need to. If it is detected

    that information is not being received correctly at the current speed, it will automatically drop down to the

    next speed. If then the situation improves, it will automatically step up to the next speed. Generallyspeaking, the lower the data rate, the further the range so you can imagine that when you are near to the

    edge of the circle in Figure 3, you will be achieving the lowest data rates.

    802.11g

    0

    20

    40

    60

    80

    100

    120

    140

    54Mbit

    48Mbit

    36Mbit

    24Mbit

    18Mbit

    12Mbit

    11Mbit

    9Mbit

    6Mbit

    5.5M

    bit

    2Mbit

    1Mbit

    Data Rate (mega bits per second)

    ApproximateRange(metres)

    802.11g

    802.11a

    0

    10

    20

    30

    40

    50

    60

    54Mbit 48Mbit 36Mbit 24Mbit 18Mbit 12Mbit 9Mbit 6Mbit

    Data Rate (mega bits per second)

    Appr

    oximateRange(metres)

    802.11a

  • 8/7/2019 wireless guide vista v1.0 3.5.07

    9/19

    9

    TOSHIBALeading Innovation >>>

    How to set up a Wireless Network.This document can not cover exact instructions on how to setup different types of Access Points or

    Routers, but there are some commonalities that need to be explained. Please use this information in

    conjunction with any instructions that come with your Access Point or Router.

    Step 1 Connect the Access Point or Router to the broadband connection.

    Step 2 Turn on the Access Point or Router (they usually take a minute to boot

    up)

    Step 3 Turn on Wireless Communications on the NotebookIt is a requirement that all wireless communications can be physically switched off on the notebook as there

    may be times when you are not permitted to use it (for example in hospitals or on a plane). Therefore, all

    Toshiba wireless capable machines will have a physical on/off switch. The location of the switch will vary from

    model to model and this will be detailed in your user manual. When the switch is in the on position you

    should also notice the wireless LED is lit.

    Another way of turning on or off your Wireless LAN card may be by using the F8 hotkey. Firstly ensure thatthe wireless communication switch mentioned above is in the On position, then keep the FN key held and

    press the F8 key. You will then see something like the following icon appear on the screen

    Figure 4 - Enabling/Disabling the wireless feature by using the F8 Hotkey

    Keep the FN key held down all the time whilst using the F8 key to toggle between the different options.

    Ensure that you select either WiFi only or Bluetooth and WiFi (if Bluetooth is available and you intend touse your Bluetooth connection at the same time). Notice that you can also disable all devices by using

    this hotkey this has the same effect of physically switching off the switch.

  • 8/7/2019 wireless guide vista v1.0 3.5.07

    10/19

    10

    TOSHIBALeading Innovation >>>

    Step 4 Check you can see your wireless Access Point or RouterAt this stage anyone within range can access your wireless router because there is no security set up yet.

    All wireless networks need a Network name (sometimes also referred to as the SSID). The network name

    must match on all devices connecting to it and it is case sensitive. Most Access Points or Routers will

    have a standard network name set as part of their factory defaults e.g. WLAN, netgear or linksys. By

    default the network name will also be broadcasted. This means that if you are in range of an Access Point

    or Router and you simply turn on the wireless communications on your notebook, you will be able to see

    the network name of that Access Point or router.

    To find and connect to your Access Point or Router:-

    On your task bar you will see the wireless LAN icon (circled in picture below).

    If you hover the mouse over the above icon, a balloon should appear to say that there are wireless

    networks detected.

  • 8/7/2019 wireless guide vista v1.0 3.5.07

    11/19

    11

    TOSHIBALeading Innovation >>>

    If you right click on the wireless network icon, you will see the following menu:

    Select Connect to a network and the following window should appear:

    You should be able to see your wireless Access Point (ours is called WLAN). There may also be

    other Access Points near you that are also shown on the list.

    Left click on your particular Access Point name and then click the Connect button in the righthand corner. This will bring up a warning to say your network is an unsecured network. Click on

    the Connect Anyway button wait for the successfully connected window to appear. Clickclose.

  • 8/7/2019 wireless guide vista v1.0 3.5.07

    12/19

    12

    TOSHIBALeading Innovation >>>

    If your network has an available internet connection you should be able to now connect to the

    internet wirelessly. However, at this point you have no security on your wireless network and other

    people nearby will also be able to connect to your Access Point or Router without you even

    knowing!

    Step 5 Change the Network name or SSID

    If you do not want people to be able to find your wireless network easily you should a) change the networkname to something known only to those that should have access and b) switch off the feature that

    broadcasts the network name. In order to find out how to do this, you will again need to refer to the user

    manual for your Access Point or Router.

    Remember: Network names are case sensitive.

    Once you have changed the network name and turned off the broadcasting, you will loose access to the

    Access Point or Router.

    Step 6 Change the settings on the notebook to reflect the new Network Name

    In order to change the settings on your notebook:

    Right click once again on the wireless network icon on your task bar and select Connect to a

    Network.

    Click on the Setup a connection or network link.

    When the Choose a Connection option window opens, click on the Manually connect to a

    wireless network option and click Next.

  • 8/7/2019 wireless guide vista v1.0 3.5.07

    13/19

    13

    TOSHIBALeading Innovation >>>

    At the next window, type the new network name in the network name box remember to type itexactly as you entered it on the Access Point itself (it is case sensitive).

    For the moment, under the security type drop down box, select No authentication (open).

    Check the box that says Connect even if the network is not broadcastingand then click Next.

    At the Successfully added [network name]window, click on the Connect to link.

    Select the newly named network that you have just created and click Connect.

    At the Successfully connected to [network name]window, click Close.

    For the moment, at the select a location for the [network name]window, click cancel. (You may

    want to change this setting at a later date as it will alter your firewall settings. This can be

    changed from within the Network and Sharing Centre.)

  • 8/7/2019 wireless guide vista v1.0 3.5.07

    14/19

    14

    TOSHIBALeading Innovation >>>

    Step 7 Add SecurityAt the moment, your network is hidden but there is no other security. Wireless networks use encryption

    keys which have to be entered on each PC that wants to connect to your network. Using encryption is

    highly recommended as it means that anyone listening in on your wireless connection will not be able to

    make sense of your data without the key to decrypt the encrypted information in other words they will

    only be able to hear gobbledegook.

    There are different types of encryption available to use:

    WEP (Wired Equivalent Privacy) Is widely used by 802.11 devices on the market. Whilst this

    document does not recommend using WEP for securing wireless networks, some older devices will only

    support WEP. Therefore, WEP and how to set it up is explained here. For new devices, please refer to

    the WPA section overleaf. If using WEP, you can use either 64btis or 128bits depending on what your

    device can support (older devices may only be able to support up to 64bit encryption and therefore, all

    devices on your network must use 64bit). The number of bits relate to the length of the key that can be

    used, in other words, 128bit encryption keys are longer and are therefore more secure.

    WEP keys can be either ASCII (characters, letters and numbers) or Hexadecimal (hexadecimal is a

    numbering system which uses the numbers 0 to 9 and the letters A to F). Again, some devices will

    support both ASCII and Hexadecimal or only one or the other please refer to the documentation that

    came with your device. If you wish to use 64bit WEP, you can use a 5 character long ASCII key or a 10

    character long Hexadecimal key. E.g. your ASCII key could be something like Tiger whereas your

    Hexadecimal key could be something like 5A78FC240C

    If you wish to use 128bit WEP, you can use a 13 character ASCII key or a 26 character long Hexadecimal

    key. E.g. your ASCII key could now be something like Elephant95860 whereas your Hexadecimal key

    could be something like 145AC45FF456D5430BD954BAC7

  • 8/7/2019 wireless guide vista v1.0 3.5.07

    15/19

    15

    TOSHIBALeading Innovation >>>

    When using ASCII WEP keys, you must remember that once again they are case sensitive. Any device

    which has the wrong WEP key will not be able to access the Wireless network

    Some devices will allow you to use a pass phrase. This means that you can enter a string of text of any

    length, and the device will then convert this text into a hexadecimal key. If both devices support pass

    phrases then all you need to do is enter the same pass phrase in both. If however one device does not

    support pass phrases, then you will need to take a note of the hexadecimal key generated (it is usually

    displayed) and enter that into the other device.

    Open or Shared WEP?

    The other setting you will find when setting up WEP is whether to use Open or Shared keys. It is the

    recommendation of this article to only ever use Open encryption as this is the more secure. (See glossary

    for a description of both Open and Shared encryption)

    WPA WiFi Protected Access

    WPA and WPA2 are todays preferred method of encryption as they are more secure than the older WEP

    system (WPA2 is the latest and most secure type of encryption and should be used if all the devices on

    the wireless network support it). In the majority of home environments you will need to use WPA-PSK or

    WPA2-PSK (Pre-Shared Key). This means that all users of the wireless network will use the same passphrase in a similar way to WEP as mentioned above. However, the use of long and complicated pass

    phrases together with the way information is encrypted makes WPA much more secure than WEP.

    TKIP and AES

    When using WPA or WPA2 you will have a choice of two different Data encryption types: TKIP and AES.

    AES is a much stronger form of encryption but in order to use it all devices on the wireless network must

    support it. Therefore, if you have older devices that dont support AES you will have to use TKIP.

    To Set Up Encryption:-

    Access the configuration setup page of your Access Point or Router in accordance with the user

    documentation that came with it.

    Depending on what your device supports, enter a WEP, WPA-PSK or WPA2-PSK key or pass

    phrase ensure that you have a note of this key.

    Once saved and the Access Point or Router has rebooted, you will again loose access to it.

    Now on your notebook you need to add the same key or pass phrase.

    Right click on the wireless network icon on the task bar and select Connect to a Network.

    Select your network from the list and right click on it.

    From the menu click on Properties.

    Select the correct type of security from the Security Type drop down menu (e.g. WPA-Personal for

    WPA-PSK networks or leave it as No authentication (open) for WEP networks).

    Select the correct type of encryption from the Encryption type drop down box (e.g. TKIP or AES for

    WPA networks, or WEP).

    Enter the encryption key in the network security box. Ensure you enter it correctly - it is case

    sensitive.

    Click OK.

    At the select a network to connect to window, click on your network name and click connect.

    Click close at the successfully connected to [network name]window.

  • 8/7/2019 wireless guide vista v1.0 3.5.07

    16/19

    16

    TOSHIBALeading Innovation >>>

    Once you entered the correct settings, you should once again be able to access your wireless

    network.

    Troubleshooting

    The following are some basic considerations to help trouble shoot some of the more common mistakeswhen setting up a wireless network:-

    Issue

    I receive the message Windows cannot find

    any networks

    I receive the message connection

    unsuccessful

    I receive the message Windows cannot

    connect to [Network Name].

    Im successfully connected to my wireless

    network but I can not get on the internet.

    The signal strength of my router or access

    point is low.

    Things to try/check

    Check the wireless switch is on.

    Check FN F8 shows the wireless as being on.

    Check the encryption key is correct.

    If you still cant connect, try resetting the factory

    defaults on your access point or router in accordance

    with the instruction supplied with your device.

    Check the access point or router is switched on.

    In order to check if the problem lies with your ISP

    (Internet Service Provider), connect the notebook

    directly to the Access Point or Router via a cable.

    a) If you are not able to connect to the internet via

    cable, please contact your ISP for further advice.

    b) If you are able to connect to the internet via cable:-

    Your anti virus software could be causing the issue.

    Temporarily disable the anti virus software to see if thisresolves the issue. If it does, reconfigure your anti

    virus software.

    If the step above does not resolve the issue, try

    resetting the factory defaults on your Access Point or

    Router in accordance with the instructions supplied

    with your device.

    Check how the signal is affected when you move

    around the building and if necessary, try to relocate

    the Access Point to a more central place.

    Check to see if any other devices are causing

    interference such as microwave ovens or cordlessphones and if necessary, relocate the Access Point to

    minimise the effect.

  • 8/7/2019 wireless guide vista v1.0 3.5.07

    17/19

    17

    TOSHIBALeading Innovation >>>

    Glossary of Terms

    2.4GHz The frequency that is used by 802.11b and g devices. The 2.4GHz

    frequency is free to use (i.e. does not require a license) and is therefore

    widely used by devices that use radio transmission.

    5GHz The frequency that is used by 802.11a devices.

    64bit /128bit WEP The two different strengths of encryption that is supported when using

    WEP.

    802.11 A set of specifications developed by the IEEE for wireless LAN technology.

    There are several extensions to this standard but the most commonly used

    are 802.11b, 802.11g and 802.11a.

    Access Point Also known as AP. A hardware device that allows users to connect to awired network using radio signals (wirelessly).

    Ad Hoc A wireless network where devices communicate directly with each other

    without the use of an access point. Also known as peer-to-peer mode.

    ADSL Short for Asymmetric Digital Subscriber Line. ADSL allows more data to

    be sent over existing copper telephone lines by using a special ADSL

    modem.

    AES Short for Advanced Encryption Standard. AES is an encryption technique

    adopted by the US government and is stronger than the other forms of

    encryption currently used by wireless devices.

    ASCII (pronounced As-key). Stands for American Standard Code for Information Interchange and is a

    code to turn keyboard characters into 0s and 1s . For example, the letter

    F would become 01000110. Using ASCII characters in the context of a

    WEP encryption key means you can use characters, letters and numbers

    in your encryption key.

    Bluetooth An industryl specification for wireless Personal Area Networks. Bluetooth

    allows devices such as mobile phones, headsets, notebooks and printers

    to communicate wirelessly. Bluetooth also uses the 2.4GHz frequency

    which can cause issues of interference on an 802.11b or g network when

    there are lots of Bluetooth devices in the same vicinity.

    Broadband A general term describing the ability to send multiple pieces of data

    simultaneously. ADSL is a form of broadband because you can send more

    data simultaneously compared to an ordinary phone line. However, fibre

    optic cable may be used by some providers which can achieve even greater

    data rates then ADSL and is therefore also referred to as Broadband. In

    consumer terms, broadband usually refers to an always on internet

    connection as opposed to a dial-up connection making use of the normal

    phone line.

    Case Sensitive Making use of the differentiation of upper case and lower case characters.

    In other words, PASSWORD is completely different to password or even

    Password.

    If you are still having problems after checking the aforementioned, please contact The TechGuys for further

    diagnosis and help.

  • 8/7/2019 wireless guide vista v1.0 3.5.07

    18/19

    18

    TOSHIBALeading Innovation >>>

    Encryption key The password needed to decipher encrypted data. On secure wireless

    networks, the encryption key needs to be entered correctly on all devices

    wishing to connect. Wireless networks that make use of an encryption

    key are referred to as Secure networks as opposed those without which

    are referred to as unsecured networks.

    Hexadecimal A numbering system which uses base16 (as opposed to decimal which usesbase

    10). Therefore, hexadecimal will use the numbers 0-9 and the letters A-

    F where A=10, B=11, C=12, D=13, E=14 and F=15. Some wireless

    devices need to use hexadecimal encryption keys.

    Hotspot A wireless network that is available to the public for a charge. Hotspots

    tend to be available in places such as internet cafes, hotels and motorway

    service stations. There are different charges levied and different methods of

    taking payment depending on who is running the hotspot.

    IEEE Abbreviation for the Institute of Electrical and Electronics Engineers (known

    as the I triple E). This organisation is responsible for developing the 802.11

    standard used for wireless networking.

    Infrastructure The term referring to wireless networks that utilise access points or

    wireless routers, as opposed to ad-hoc or peer to peer networks (see Ad-

    Hoc).

    LAN Abbreviation for Local Area Network. LAN normally refers to connecting to

    your network via an Ethernet cable, as opposed to wirelessly which is

    usually referred to as Wireless LAN.

    MBits/Sec, Mbits/Sec Refers to how many million of bytes or bits of data are sent per second

    depending on whether a capital B is used or a lower case b. If the B is

    capital, this refers to bytes. There are 8 bits in a byte (e.g. 011011101 is

    one byte). If the b is lower case, this refers to how many million of bits are

    sent per second.

    Modem An acronym for MOdulator-DEModulator. A modem is a device that allows

    a computer to transmit and receive data over a telephone line. Modem is a

    general term although it can refer to both slow speed analogue modems

    that make use of a standard telephone line as well as high speed devices

    that make use of high speed cable or DSL lines.

    Network Name The name assigned to a Wireless network. Also referred to as the SSID

    (see SSID). All devices must use the same network name to be able to

    communicate. Network names are a string of text which is case sensitive

    and are usually broadcast when the access point or router is switched on.It is normally possible to change the network name from its factory default

    and to stop it from being broadcast so that strangers cannot easily find

    your wireless network.

    Open WEP Open WEP allows any device to authenticate with the Access Point. In

    other words, the notebook sends the authentication request to the Access

    Point, the Access Point accepts the request and then the notebook can

    connect. This is more secure than Shared WEP because it avoids the

    exchange of clear text between the two devices which can easily be picked

    up by intruders trying to hack your network. (see also Shared WEP)

    Pass phrase A string of text used as the encryption key for wireless networks. Pass

  • 8/7/2019 wireless guide vista v1.0 3.5.07

    19/19

    TOSHIBALeading Innovation >>>

    phrases need to be entered identically on all devices wishing to connect to

    the wireless network.

    Peer-to-peer See Ad Hoc

    PSK An acronym for Pre Shared Key. This means that the pass phrase or

    encryption key is manually entered onto each device that wishes to usethe wireless network as opposed to being generated automatically by a

    server.

    Router A device that provides Internet connection sharing for stations (PCs) on a

    local area network. Most routers have basic firewall features to permit

    outgoing traffic but block incoming connections. Some broadband routers

    have a built-in cable or DSL modem; others have a WAN Ethernet port

    that you connect to your cable or DSL modem. A wireless router combines

    both broadband router and wireless AP features inside one box.

    Shared WEP Shared WEP works by using a piece of challenge text that the Access

    Point sends to the notebook that is trying to connect. The notebook then

    encrypts that text and sends it back to the Access Point. The Access

    Point decrypts the text and if it is correct, allows the notebook to be

    authenticated on the network. Whilst this may seem more secure, the

    main problem is that the challenge text is sent in clear text (i.e.

    unencrypted). So anyone listening in on the network could pick up the

    clear text then pick up the encrypted version of that clear text. This gives

    hackers a head start in trying to decipher an encryption key.

    SSID An acronym for Services Set IDentifier. See also, Network Name.

    TKIP An acronym for Temporal Key Integrity Protocol. TKIP was designed to

    work with the newer WPA encryption whilst allowing you to continue using

    older equipment. TKIP ensures that every data packet is sent with its ownunique encryption key thus offering greater security then WEP.

    WEP An acronym for Wired Equivalent Privacy. WEP is a security protocol

    defined by the IEEE for 802.11 networks. The original specification for

    WEP was for 64bit encryption (40 bits for the encryption key plus an extra

    24 bits needed to perform the encryption). This was later increased to

    128bit encryption (104bits for the key plus the same 24 bits for the

    encryption).

    WiFi Short for Wireless Fidelity. WiFi was the brand name originally licensed by

    the WiFi Alliance for devices that complied with the 802.11 standard.

    WPA Stands for WiFi Protected Access. WPA is based on the IEEE 802.11i

    standard and was brought about to overcome the security weaknesses

    found in WEP. WPA was designed as an interim measure until the 802.11i

    standard could be fully implemented (known as WPA2)