Nexxt Solutions SAROS300 ユーザーズマニュアル

ページ / 20
Nexxt Solutions  -  SAROS - Wireless N PCI-E Adapter
19
It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other 
words, more bandwidth is consumed than in the case of narrowband transmission, but the 
trade off produces a signal that is, in effect, louder and thus easier to detect, provided that the 
receiver knows the parameters of the spread-spectrum signal being broadcast. If a receiver is 
not tuned to the right frequency, a spread-spectrum signal looks like background noise. 
There are two main alternatives, Direct Sequence Spread Spectrum (DSSS) and Frequency 
Hopping Spread Spectrum (FHSS). 
SSID - A Service Set Identification is a thirty-two character (maximum) alphanumeric key identi-
fying a wireless local area network. For the wireless devices in a network to communicate with 
each other, all devices must be configured with the same SSID. This is typically the configura-
tion parameter for a wireless PC card. It corresponds to the ESSID in the wireless Access 
Point and to the wireless network name. See also Wireless Network Name and ESSID. 
WEP - (Wired Equivalent Privacy) - A data privacy mechanism based on a 64-bit or 128-bit or 
152-bit shared key algorithm, as described in the IEEE 802.11 standard. To gain access to a 
WEP network, you must know the key. The key is a string of characters that you create. When 
using WEP, you must determine the level of encryption. The type of encryption determines the 
key length. 128-bit encryption requires a longer key than 64-bit encryption. Keys are defined 
by entering in a string in HEX (hexadecimal - using characters 0-9, A-F) or ASCII (American 
Standard Code for Information Interchange – alphanumeric characters) format. ASCII format is 
provided so you can enter a string that is easier to remember. The ASCII string is converted to 
HEX for use over the network. Four keys can be defined so that you can change keys easily. 
WLAN - (Wireless Local Area Network) - A group of computers and associated devices 
communicate with each other wirelessly, which network serving users are limited in 
a local area. 
WPA - (Wi-Fi Protected Access) - A wireless security protocol uses TKIP (Temporal Key 
Integrity Protocol) encryption, which can be used in conjunction with a RADIUS server. 
Appendix 2: Regulatory Information
FCC statement
This equipment has been tested and found to comply with the limits for a Class B digital device, 
pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protec-
tion against harmful interference in a residential installation. This equipment generates, uses 
and can radiate radio frequency energy and, if not installed and used in accordance with the 
instructions, may cause harmful interference to radio communications. However, there is no 
guarantee that interference will not occur in a particular installation. If this equipment does 
cause harmful interference to radio or television reception, which can be determined by turning 
the equipment off and on, the user is encouraged to try to correct the interference by one or 
more of the following measures:
• Reorient or relocate the receiving antenna. 
• Increase the separation between the equipment and receiver. 
• Connect the equipment into an outlet on a circuit different from that to which the 
  receiver is connected. 
• Consult the dealer or an experienced radio/TV technician for help.