Linksys WUSB11 Network Card User Manual


 
Open System, the default setting, is when the sender and the recipi-
ent do not share a secret key. Each party generates its own key-pair
and asks the receiver to accept the (usually randomly) generated key.
Once accepted, this key is used for a short time only, and then a new
key is generated and agreed upon. Even if the secret key is discovered,
only a small amount of data may be decrypted.
The Preamble Mode should be set to Long (if in a “noisy” network envi-
ronment), Short (if the environment is clear), or click the OK button to
complete the configuration.
6. The About tab, as shown in Figure 8-8, shows you copyright and version
information about the driver, the configuration utility, and the firmware.
The version number of the driver may vary from this screen, depending on
which version was shipped with your Adapter. You can always visit
www.linksys.com for the latest version of the driver. Click the OK button
to complete the configuration.
26
Wireless USB Network Adapter
Figure 8-8
5. The Advanced tab, as shown in Figure 8-7, allows you to set the
Fragmentation Threshold, the RTS/CTS Threshold, and the Preamble
Type. The Fragmentation Threshold Value indicates how much of the
network resources are devoted to recovering packet errors. The value should
remain at its default setting of 2,436. If you experience high packet error
rates, you can decrease this value, but it will likely decrease overall network
performance. Only minor modifications of this value are recommended.
The RTS Threshold Value should remain at its default setting of 2,437. A
preamble is a signal used to synchronize the transmission timing between
two or more systems. A series of transmission pulses is sent before the data
to indicate that “someone is about to transmit data.” This ensures that sys-
tems receiving the information correctly interpret when the data transmis-
sion starts.
Security is used for WEP only. By selecting Deny Unencrypted Data
Frames, all unencrypted data will not be seen. For Authentication Type,
you may choose between Open System or Shared Key.
Shared Key is when both the sender and recipient share a secret key.
Both units use this key for an extended length of time, sometimes
indefinitely. Any eavesdropper that discovers the key may decipher all
packets until the key is changed.
25
Instant Wireless
TM
Series
Note: In most
cases, you will
not need to
change these
settings.
Figure 8-7