Siemens 54 用户手册

下载
页码 56
5
The Gigaset USB Adapter 54
Gigaset USB Adapter 54 / englisch / A31008-M1071-R101-1-7619 / introduction.fm / 22.11.2006
Ad-hoc network
In an ad-hoc network, PCs communicate with each other via wireless peer-to-peer 
connections. An ad-hoc network is set up by participants as and when required. All 
participating PCs must have a wireless network adapter installed, e. g. a Gigaset USB 
Adapter 54, a Gigaset PC Card 54 or a Gigaset USB Stick 54. Ad-hoc networks are used 
wherever communication networks have to be set up quickly without any existing 
network infrastructure and the participants are mobile.
Infrastructure network
In an infrastructure network, connections between network participants are set up via 
an access point (or several access points). The access point provides the basis for the 
wireless network. It controls the connections between the participants and can also 
establish the connection from the mobile stations of a wireless network to a wired LAN 
(Ethernet) or the Internet.
Roaming
Several access points can be installed to extend the range of a wireless network. 
Participants in the wireless network can move freely between the various access points 
without losing contact to the network. As soon as there is a risk of losing contact, the 
PC automatically looks for another access point with a stronger signal. All access points 
and wireless network adapters must have the same SSID. All access points must be 
connected to the same Ethernet network.
Security in wireless networks: Encryption 
Any network, be it wired or wireless, is exposed to the risk of eavesdropping.
Connecting your local network to the public network exposes your data and 
applications to not inconsiderable risks. As with an individual connection, you should 
always protect your network PCs against external attacks, e. g. attacks via emails, with 
a virus scanner.
These virus scanners however do not provide any protection against unauthorised 
access from outside (hackers). To counter this risk, Gigaset data products offer various 
encryption procedures that largely rule out unauthorised access (hacking) to your 
wireless network.
WEP encryption
WEP encryption (Wired Equivalent Privacy) encodes data for sending using a key that 
you have defined. Once they reach the recipient, who uses the same key, the data are 
restored to the state before you sent them. Recipients who do not know this key cannot 
read the content of this data stream or only after a great deal of effort. 
There are two security levels for calculating the encryption key:
u 64-bit mode
u 128-bit mode