beautypg.com

Chapter 5 - glossary – Asus WL-160N User Manual

Page 32

background image

32

ASUS WLAN Adapter

Chapter 5

Chapter 5 - Glossary

Glossary

Direct-sequence systems communicate by continuously transmitting a redundant

pattern of bits called a chipping sequence. Each bit of transmitted data is mapped

into chips and rearranged into a pseudorandom spreading code to form the

chipping sequence. The chipping sequence is combined with a transmitted data

stream to produce the output signal.
Wireless mobile clients receiving a direct-sequence transmission use the spreading

code to map the chips within the chipping sequence back into bits to recreate the

original data transmitted by the wireless device. Intercepting and decoding a direct-

sequence transmission requires a predefined algorithm to associate the spreading

code used by the transmitting wireless device to the receiving wireless mobile

client.
This algorithm is established by IEEE 802.11b specifications. The bit redundancy

within the chipping sequence enables the receiving wireless mobile client to

recreate the original data pattern, even if bits in the chipping sequence are

corrupted by interference. The ratio of chips per bit is called the spreading ratio.

A high spreading ratio increases the resistance of the signal to interference. A

low spreading ratio increases the bandwidth available to the user. The wireless

device uses a constant chip rate of 11Mchips/s for all data rates, but uses different

modulation schemes to encode more bits per chip at the higher data rates. The

wireless device is capable of an 11 Mbps data transmission rate, but the coverage

area is less than a 1 or 2 Mbps wireless device since coverage area decreases as

bandwidth increases.

Encryption

This provides wireless data transmissions with a level of security. This option

allows you to specify a 64-bit or a 128-bit WEP key. A 64-bit encryption contains

10 hexadecimal digits or 5 ASCII characters. A 128-bit encryption contains 26

hexadecimal digits or 13 ASCII characters.
64-bit and 40-bit WEP keys use the same encryption method and can interoperate

on wireless networks. This lower level of WEP encryption uses a 40-bit (10

hexadecimal digits assigned by the user) secret key and a 24-bit Initialization

Vector assigned by the device. 104-bit and 128-bit WEP keys use the same

encryption method.
All wireless clients in a network must have identical WEP keys with the access

point to establish connection. Keep a record of the WEP encryption keys.

Extended Service Set (ESS)
A set of one or more interconnected basic service set (BSS) and integrated

local area networks (LANs) can be configured as an Extended Service Set.

ESSID (Extended Service Set Identifier)

You must have the same ESSID entered into the gateway and each of its wireless

clients. The ESSID is a unique identifier for your wireless network.