Zebra Technologies Corporation W2WLAN11G 사용자 설명서
7
be used (channel 14 – 802.11b only). In Europe, channels 1 through 13 are allowed. Because
existing standards change frequently, you should check with your local regulatory agencies for
authorized channel use. In most countries/regions channels 10 and 11 may be used without
restriction.
existing standards change frequently, you should check with your local regulatory agencies for
authorized channel use. In most countries/regions channels 10 and 11 may be used without
restriction.
Channel selection depends on the communication mode of the network. The communication
mode defines how devices, such as computers and printers, communicate on a wireless
network. There are two primary types of wireless communication modes: infrastructure and ad-
hoc.
mode defines how devices, such as computers and printers, communicate on a wireless
network. There are two primary types of wireless communication modes: infrastructure and ad-
hoc.
In infrastructure mode, the printer communicates with network computers through a wireless
access point (AP) or a base station. The access point acts as a central hub or gateway
connecting wireless and, optionally, wired devices (most access points have an integrated
Ethernet controller to connect to an existing wired-Ethernet network).
access point (AP) or a base station. The access point acts as a central hub or gateway
connecting wireless and, optionally, wired devices (most access points have an integrated
Ethernet controller to connect to an existing wired-Ethernet network).
In ad-hoc mode, which is sometimes called peer-to-peer mode, the printer communicates with
your computer directly, rather than through an access point or base station. Each device on an
ad-hoc network must have a wireless network adapter. The adapter enables each device to
communicate with the other devices on the network. Ad-hoc mode is usually limited to simple,
small wireless networks because performance degrades significantly after connecting too many
network devices. This option is most often used if you are connecting only two network devices
that are not sharing an Internet connection. Only WEP security is available in ad-hoc mode.
your computer directly, rather than through an access point or base station. Each device on an
ad-hoc network must have a wireless network adapter. The adapter enables each device to
communicate with the other devices on the network. Ad-hoc mode is usually limited to simple,
small wireless networks because performance degrades significantly after connecting too many
network devices. This option is most often used if you are connecting only two network devices
that are not sharing an Internet connection. Only WEP security is available in ad-hoc mode.
Security
As with other networks, security for wireless networks focuses on access control and privacy.
Traditional wireless network security includes the use of Service Set Identifiers (SSIDs), open or
shared-key authentication and static Wired Equivalent Privacy (WEP) keys or Wi-Fi protected
access (WPA or WPA2).
Traditional wireless network security includes the use of Service Set Identifiers (SSIDs), open or
shared-key authentication and static Wired Equivalent Privacy (WEP) keys or Wi-Fi protected
access (WPA or WPA2).
It is highly recommended that you implement a wireless security scheme (preferably WPA2)
prior to setup. While the printer can connect to an open AP, running an open wireless AP will
allow anyone within range of the AP full access to all devices connected to the AP with
potentially damaging results. While WEP security is still in use today, WEP security has been
broken for many years. There are tools available on the internet that will allow anyone with
even basic networking knowledge to break the WEP security and derive the WEP key within 3
minutes, giving them full access to devices on your network. The best security is obtained by
using WPA2 security with AES encryption.
prior to setup. While the printer can connect to an open AP, running an open wireless AP will
allow anyone within range of the AP full access to all devices connected to the AP with
potentially damaging results. While WEP security is still in use today, WEP security has been
broken for many years. There are tools available on the internet that will allow anyone with
even basic networking knowledge to break the WEP security and derive the WEP key within 3
minutes, giving them full access to devices on your network. The best security is obtained by
using WPA2 security with AES encryption.
Authentication and encryption are two different approaches to network security.
Authentication verifies the identity of a user or device before granting access to the network,
making it more difficult for unauthorized users to access network resources. Encryption
Authentication verifies the identity of a user or device before granting access to the network,
making it more difficult for unauthorized users to access network resources. Encryption