Installing under Windows NT 4.0 Installation process for ORiNOCO PC Card under Windows NT is very similar to the previousinstallation process, except for the following: Windows NT is doe
Trang 1After you have restarted your computer, the Windows operating system will detect the ORiNOCO
PC Card (you can hear the two−tone sound of the PC Card Socket Controller) Load the ORiNOCOdriver, and in the dialog box enter a Windows username and password The password you enterhere will be the one used to login to the Windows Network Neighborhood
Installing Networking Support for the First Time
If this is the very first time that networking support is installed onto your computer, the Windowsoperating system will prompt you to enter a computer and workgroup name These names will beused to identify your computer on the Microsoft Network Neighborhood Follow these steps if youinstalled the networking support for the first time:
In the Computer Name field, enter a unique name for your computer
Installing under Windows NT 4.0
Installation process for ORiNOCO PC Card under Windows NT is very similar to the previousinstallation process, except for the following:
Windows NT is does not support plug and play the way Windows 98, Windows ME, andWindows 2000 do Windows NT does not recognize the addition of a hardware device.However, it may recognize removal of a device if the drivers for the device are installed, asthe drivers will be unable to locate the hardware device
System Requirements
Following are the system requirements for installing the ORiNOCO Gold/Silver PC Card underWindows NT 4.0:
Trang 2An empty PC Card or CardBus Slot.
You must have the following software:
The ORiNOCO CD−ROM that was included with your PC Card kit, or
Installation of ORiNOCO PC Card in Windows NT includes the following steps:
Enabling the PCMCIA Services
1
Enabling Network Support
2
Following the steps defined in the previous section, Installing Under Windows 98, Windows
ME, and Windows 2000.
3
Enabling PCMCIA Services
If you have not previously enabled the PCMCIA services on your mobile computer to allow theWindows NT operating system to detect PC Cards in the computer's PC Card slot, you must enablethe PC Card Socket controller, identified as the PCMCIA device Follow these steps to enable thePCMCIA service:
Click the Start button, then select Settings, and then click Control Panel
Trang 3Enabling Network Support
To introduce your ORiNOCO network adapter card to the Windows NT operating system, you need
to enable Network support for your ORiNOCO wireless station
From the Windows NT Taskbar, click the button
Finishing the Installation
Configure your ORiNOCO PC Card by following the steps defined in the previous section, Installing
Under Windows 98, Windows ME, and Windows 2000.
Installing under Mac OS
To connect your Apple PowerBook to a wireless network, you will need to perform the followingsteps
Install the ORiNOCO PC Card software
You must have following software:
ORiNOCO PC Card drivers for Mac OS
•
Trang 4Installation Steps
Follow the steps below to successfully install the ORiNOCO PC Card drivers under Mac OS
Installing the Software Drivers
To install the PC Card software:
Insert the ORiNOCO CD−ROM into your Apple PowerBook
6
Follow the instructions as they appear on your screen and restart your computer
7
Installing Networking Protocols
Subject to the type of networking environment, you should install one or more of the followingprotocols:
AppleTalk, most commonly used to connect a number of Apple workstations to a networkingenvironment identified as the "AppleTalk zone" or "AppleShare server."
•
To finish the installation of the ORiNOCO drivers and networking protocols, please restart yourApple PowerBook computer
Enabling Your ORiNOCO PC Card
To enable your PC Card, insert the ORiNOCO PC Card into your computer Once your PC Card isinserted, you will see the ORiNOCO icon appear on the desktop of your Apple PowerBook If thisicon is not displayed, verify whether the PC Card is properly inserted into the PC Card slot of yourApple PowerBook
To enable your ORiNOCO connection, you will need to configure the AppleTalk protocol to use theORiNOCO PC Card for its network communication
Double−click the ORiNOCO icon on your desktop to open the AppleTalk Parameter window
Trang 5If you are using TCP/IP as networking protocol, you will need to configure the TCP/IP protocol touse the ORiNOCO PC Card for its network connections You can access the TCP/IP settings via theoption Control Panels in the Apple menu Please consult the "balloon help" and User's Manual thatcame with your Apple PowerBook for more information.
Customize PC Card Settings
When you insert the ORiNOCO PC Card into your Apple PowerBook computer, it will start operatingwith the following factory−set defaults
Connect to a Network Infrastructure Use the ORiNOCO Network Name "ANY" to connect to thefirst access point that provides a communications quality that is acceptable or better To view ormodify the ORiNOCO parameters, open the ORiNOCO Setup window that is listed under the Applemenu, as an item in the Control Panel
To connect to an infrastructure network:
Clear the Ad−hoc Demo Mode tick box
1
If you selected to connect to an infrastructure network, you need to identify the name of thatnetwork Consult your LAN administrator for the value that applies in your situation Youoperate your computer in multiple network environments that are identified by differentWave−LAN Network Names You do not know the ORiNOCO Network Name of the network
to which you would like to connect your computer
2
To connect to an ad−hoc workgroup of wireless stations:
Place a check mark in the Ad−Hoc Demo Mode tick box In this mode your ORiNOCO PCCard will ignore the ORiNOCO Network Name value and the ORiNOCO access points
1
Fix the radio channel to operate at its factory−set default channel This means that yourORiNOCO station can communicate with any other ORiNOCO station within its range,provided that these stations have been equipped with cards that have a matching defaultradio frequency
2
Advanced Parameters
The other parameters available from the ORiNOCO Setup window are advanced parameters thatwork most efficiently when you leave the settings to these parameters to their factory−set defaults.You may need to modify these parameters only when troubleshooting ORiNOCO performance uponthe advice of an ORiNOCO expert, or an ORiNOCO Technical Support representative
Trang 6Installing under Linux
ORiNOCO PC Cards are one of the few wireless LAN adapters that support the Linux operatingsystem This section describes how to install ORiNOCO drivers under the Linux operating system
System Requirements
Following are the system requirements for installing ORiNOCO Gold/Silver PC Card under Linux:
This software can be compiled and installed on Intel architecture systems running Linuxkernel versions 2.0.x, 2.2.x or 2.4.x
•
Software Requirements
You must have the following software and support files
This software for the ORiNOCO PC Card is distributed in a compressed archivewavelan2_cs−6.16.tar.gz If you did not receive the software along with the adapter, you canobtain it from ORiNOCO using its Web site at http://www.orinocowireless.com/
Before you Start
Determine the type and version of the Linux kernel of your computer, and check whether itmeets the system requirements listed above
•
Read the Linux PCMCIA−HOWTO by David Hinds This document is probably provided on aCD−ROM of your Linux distribution You can download the latest version from:http://pcmcia−cs.sourceforge.net/
•
Please read the section titled Prerequisites and kernel setup of the PCMCIA−HOWTO.
•
Build the ORiNOCO Driver
Obtain a copy of the Linux PCMCIA package from a CD−ROM of your Linux distribution ordownload the latest version from: http://pcmciacs.sourceforge.net/ For your convenience,the latest ORiNOCO CD−ROM contains a copy of the PCMCIA package in subdirectory:Xtras/Linux/PCMCIA
Trang 7% cd pcmcia−cs−3.1.29
% tar xzvf /wavelan2_cs−6.16.tar.gz
Note If you use the archive supplied on the CD−ROM, use archive
name " /wlli616.tgz" instead of " /wavelan2_cs−6.16.tar.gz"
To build and install the driver, follow the procedure below
% make config
Answer the presented questions Usually the default answers are OK and pressing "Enter" isenough On RedHat 7.1 systems, however, you should specify "/usr/src/linux−2.4" as theLinux source directory instead of the default "/usr/src/linux" For more detailed information on
configuration, building, and installing, see the PCMCIA−HOWTO as mentioned in the Before
you Start section Now run the Build script.
% /Build
This script determines whether your system uses in−kernel PCMCIA and either builds thefull PCMCIA package or just the driver Before installing the driver with the Install script, youmust become "root."
Configure Your ORiNOCO PC Card
Before configuring the driver through module parameters (in /etc/pcmcia/ config.opts), make surethat /etc/pcmcia/wireless.opts file is either absent or contains blank parameter values as shownbelow
Trang 8To connect your computer to a wireless infrastructure that includes access points such as the AgereSystems AP−1000 or AP−500, you will need to identify the network name of the wirelessinfrastructure For example if your infrastructure uses the network name "My Network", edit theconfig.opts file to include the following.
module "wavelan2_cs" opts "network_name=My\ Network"
Notice that the space character needs to be escaped with a backslash
To connect your computer to an Agere Systems Residential Gateway RG−1000, you will need toknow the RG ID (=network_name) and the encryption key You can find the RG ID on a small label
on the rear of the unit For example, if your RG−1000 has ID 225ccf and you did not change theencryption key yet, edit the config.opts file to include the following:
module "wavelan2_cs" opts "network_name=\"225ccf\" key_1=\"25ccf\"
enable_encryption=Y"
If you changed your encryption key, you should specify this key as key_1 on the parameter line
To connect your computer to a peer−to−peer network, in an environment without access points, theIBSS mode is recommended For example to connect to a peer−to−peer network called MyNetwork, enter the following in the config.opts file:
module "wavelan2_cs" opts "create_ibss=Y network_name=My\ Network"
Optionally you can also include a Station Name value that can be used to identify your computer onthe wireless network For example if you wish to name your computer "Wave1" when connecting it
to a wireless infrastructure, edit the config.opts file to include the following:
module "wavelan2_cs" opts "network_name=Ocean station_name=Wave1"
To connect your computer to an ad−hoc workgroup of wireless computers, enter the following in theconfig.opts file:
module "wavelan2_cs" opts "port_type=3"
Note that the "Ad−Hoc Demo Mode" is not the recommended mode for a peer−to−peer network.The configuration of this non−interoperable mode is only explained here for special applications (forexample, research, or compatibility with other previous WaveLAN/IEEE products)
The IBSS mode described in c) is the preferred and interoperable mode for creating a peer−to−peernetwork
Use an editor to modify the network options for your adapter
# vi /etc/pcmcia/network.opts
The parameters need to be correct for the connected network Check with your systemadministrator for the correct network information Refer to the PCMCIA−HOWTO for moreconfiguration information
For example:
*,*,*,*)
Trang 9Using the default GNOME menu, you can start netcfg from: Programs−>System−>NetworkConfiguration
Restart the PCMCIA services
O R i N O C O U s e r d o c u m e n t a t i o n i s a l s o a v a i l a b l e o n t h e O R i N O C O W e b s i t e :http://www.orinocowireless.com/
Glossary of Terms and Abbreviations
A−C
Access Control List (ACL)
A list of user rights (data) that informs a computer's operating system which permissions oraccess rights each user or group has to a specific system object, such as a directory or file.Each object has a unique security attribute that identifies which users have access to it, andthe ACL is a list of each object and user−access privileges such as read, write, or execute
Access Point (AP)
A centralized wireless device that controls the traffic in a wireless LAN All traffic betweenthe communicating computers must go through the access point
ACL
See Access Control List (ACL)
Ad−hoc Wireless LAN
A Wireless LAN that consists of only computers with wireless LAN adapters
AIEE
See American Institute of Electrical Engineers (AIEE)
ALOHAnet
Trang 10One of the first wireless wide area networks This wireless LAN consisted of seven
computers that communicated in a bidirectional star topology that spanned four of the
Hawaiian Islands, with the central computer based on Oahu Island
American Institute of Electrical Engineers (AIEE)
Formed on May 13, 1884, the American Institute of Electrical Engineers (AIEE) played anactive role in the development of the Electrical Industry standards with primary focus on thewired communications, light, and power systems
Asynchronous Transfer Mode (ATM)
The mode of operation of the broadband integrated services digital network All information
in an ATM network that is to be transferred is first fragmented into small, fixed−sized framesknown as cells These are then sent over the network
Backoff Algorithm
An algorithm that is used to calculate the duration to delay retransmission after a collision,before retransmitting in Ethernet
Basic Service Set (BSS)
When two or more wireless stations come together to communicate with each other, theyform a basic service set The minimum BSS consists of two stations
Bluetooth
A new short−range wireless communications standard that is used in handheld devices andmobile computers for limited data transfer and synchronization purposes
Broadband
A particular mode of operation of network data transmission that allows high data
throughput In a broadband operation, a number of separate data streams are
simultaneously transmitted over a cable by assigning each stream a portion of the totalavailable bandwidth
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
A method similar to Carrier Sense Multiple Access with Collision Detection (CSMA/CD) used
to reduce the collision between packets on a network that uses a shared medium by
avoiding the collision of data in a shared medium
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
A method used to control access to a shared transmission medium, such as a coaxial cable,but to which a number of computers are connected A station wishing to transmit a message
Trang 11first senses (listens to) the medium and transmits the message only if the medium is
quiet—no carrier present Then, as the message begins to be transmitted, the computermonitors the actual signal on the transmission medium If this is different from the signalbeing transmitted, a collision is said to have occurred and been detected The computer thenceases transmission and retries again later
Carrier waves
When electromagnetic waves are used to transmit data by superimposing the data on theradio waves, the waves carrying the data are known as carrier waves
Caesar Cipher
One of the oldest cryptographic algorithm that Julius Caesar used to send encrypted
messages to his army Caesar cipher is a substitution cipher
See also Substitution Cipher
CF
See Compact Flash (CF)
Challenge Handshake Authentication Protocol (CHAP)
A network authentication protocol that mutually authenticates both the client and serverusing secret words that have been preinstalled in each system In CHAP all user informationincluding logins and passwords is transmitted in the network in encrypted form
ChallengeưandưResponseưBased Authentication
A challengeưandưresponseưbased authentication system provides a user to be
authenticated with a challenge For example, in dialưup networks, the server asks the
dialưup user for username and password, and authenticates the user if the password
provided by the user is correct
CRC
See CyclicưRedundancyưCheck (CRC)
Cryptography
Derived from a Latin word cryptographia, cryptography means the enciphering and
deciphering of messages in secret code or cipher Today, cryptography is considered the art
of protecting information by transforming it (encrypting it) into an unreadable format, calledcipher text Only those who possess a secret key can decipher (or decrypt) the message intoplaintext
A method used for the detection of errors when data is being transmitted A CRC is a
numeric value computed from the bits in the message to be transmitted The computedvalue is appended to the tail of the message prior to transmission, and the receiver thendetects the presence of errors in the received message by recomputing a new CRC andcompares it with the CRC that is sent with the data
Trang 12Data Decryption
Decryption is the process by which an encrypted content is transformed to cleartext
Data Encryption
Encryption is the process in which data in cleartext is transformed into an unrecognizable set
of data characters for information security purposes
Computers in a demilitarized zone are separated from the rest of the computers using
firewalls and routers or sometimes physically to ensure that the data in the private LAN isnot compromised
Digital Subscriber Line (DSL)
A type of broadband connection that provides high−speed connection to a private network or
to the Internet
Direct Sequence Spread Spectrum (DSSS)
A data transmission method for wireless networks in which the transmission signal is spreadover an allowed band resulting in a transmission that is more resilient to wireless networkjamming attacks
Distribution System Service (DSS)
The services provided by a distribution service in a wireless LAN are known as distributionsystem service (DSS) A DSS provides five basic services: association, reassociation,
disassociation, distribution, and integration
See Domain Name System (DNS)
Domain Name System (DNS)
The application protocol used in the TCP/IP suite to map the symbolic names used by
humans into the equivalent fully−qualified network address
See Direct Sequence Spread Spectrum (DSSS)
Dynamic Host Configuration Protocol (DHCP)