User’s Guide PRO/Wireless 2200BG Network Connection Model WM3B2200BG
Intel(R) PRO/Wireless 2200BG User's Guide Your Intel(R) PRO/Wireless 2200BG Network Connection adapter works with either 802.11b or 802.11g wireless standard. Operating at 2.4 GHz frequency at speeds of up to 54 Mbps you can now connect your computer to high-capacity existing 802.11b networks using multiple access points within large or small environments, and also to high-speed 802.11g networks.
trademark or registered trademark of Intel Corporation or its subsidiaries in the United States and other countries. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Intel disclaims any proprietary interest in trademarks and trade names other than its own. Microsoft and Windows are registered trademarks of Microsoft Corporation. *Other names and brands may be claimed as the property of others.
Back to Contents Page Wireless LAN Overview: Intel(R) PRO/Wireless 2200BG User's Guide About Wireless LAN Technology ● ● ● ● ● Choosing a WLAN Configuring a WLAN Identifying a WLAN Surveying the Site of Your WLAN Factors Affecting Range A wireless network connects computers without using network cables. Computers use radio communications to send data between each other. You can communicate directly with other wireless computers, or connect to an existing network through a wireless access point.
Peer-to-Peer mode, also called Ad Hoc mode, works without access points and allows wireless computers to send information directly to other wireless computers. Ad Hoc Mode is only supported in 802.11b and 802.11g networks. You can use Peer-to-Peer mode to network computers in a home or small office or to set up a temporary wireless network for a meeting. Configuring a Wireless LAN There are three basic components that must be configured for an 802.
● locations. Security: The 802.11 wireless networks use encryption to help protect your data. Wired equivalent privacy (WEP) uses a 64-bit or 128-bit shared encryption key to scramble data. Before a computer transmits data, it scrambles the data using the secret encryption key. The receiving computer uses this same key to unscramble the data. If you are connecting to an existing network, use the encryption key provided by the administrator of the wireless network.
packets with the broadcast SSID. If this feature is enabled on the access point, any wireless user can associate with the access point by using a blank (null) SSID. Surveying the Site of Your Wireless LAN Conducting a site survey for your wireless LAN is the most crucial step in the process of setting up a wireless network. It greatly reduces the amount of troubleshooting you will have to do once you have the wireless LAN set up and ready for connection testing.
best location for access points. Factors Affecting Range Although access points can transmit signals up to 60 feet away in an area with many walled barriers or as much as 500 feet away in a large open area, the range is affected by the following factors: ● ● ● ● Building materials, such as steel and drywall, can shorten the range of the radio signals. Physical layout of the area can interfere with the signals and cause them to be dropped.
● you need a different level of coverage in some areas, you may need to move, replace, or supplement access points and antennas. You are physically changing the site: Remodeling may introduce new sources of interference, such as motors and metal structures within the coverage area of the access point, even if it does not directly effect the sites where the access points are located. Elements of an Effective Site Survey An effective site survey requires four elements.
Back to Contents Page Please read all restrictions and disclaimers.
Back to Contents Page Software Installation: Intel(R) PRO/Wireless 2200BG User's Guide Software Installation Installing Drivers and Intel(R) PROSet Software See the instructions for your operating system: ● ● Windows 2000 Windows XP Installation under Windows* 2000 Preliminary Notes The installation instructions in this section are based on the following assumptions: ● ● ● The wireless adapter hardware has already been installed in the computer in accordance with the computer manufacturer's instructio
After loading the Windows 2000 operating system, be sure to log in with administrative rights. If you log in to Windows 2000 without administrative rights, you may run into problems during the installation. During initial adapter installation and configuration, it may take up to two minutes for adapter settings to be confirmed. Driver Installation To install driver software in Windows* 2000, follow these steps: 1. Power up the computer in which the wireless adapter hardware has just been installed. 2.
Some versions of this product do not support the Intel(R) PRO Network Connections menu screen for installation of utility software. If the Intel(R) PRO Network Connections menu screen does not appear, or if it does not have a menu item for Wireless LAN Adapters, you can start the Intel(R) PROSet installer manually using Start > Run and browsing to the file iSetup.exe in the path APPS/PROSET/WINXPT32 on the Intel CD supplied with the product. Skip Steps 11 and 12 below and continue with Step 13. 11.
Installation under Window* XP Preliminary Notes The installation instructions in this section are based on the following assumptions: ● ● ● The wireless adapter hardware has already been installed in the computer in accordance with the computer manufacturer's instructions. The computer has not been powered on since the hardware installation was completed. No other wireless LAN card is installed in this computer.
2. Log in with administrative rights if prompted by Windows XP. 3. Wait for Windows to detect the newly installed hardware and display the Found New Hardware Wizard dialog. Verify that Install the software automatically (Recommended) is selected. If Windows does not detect the new hardware, see Troubleshooting. 4. Insert the Intel CD into your CD drive. The New Hardware Found Wizard searches for the correct driver files and copies them to your hard drive. 5.
Connections menu screen for installation of utility software. If the Intel(R) PRO Network Connections menu screen does not appear, or if it does not have a menu item for Wireless LAN Adapters, you can start the Intel(R) PROSet installer manually using Start > Run and browsing to the file iSetup.exe in the path APPS/PROSET/WINXP32 on the Intel CD supplied with the product. Skip Steps 13 and 14 below and continue with Step 15. 13.
Back to Contents Page Troubleshooting: Intel(R) PRO/Wireless 2200BG User's Guide Troubleshooting ● ● ● ● ● ● ● ● ● ● ● ● ● ● LAN Utility Conflict Message Using a Profile with an incorrect WEP Encryption Key Problems with installation Before calling Customer Support Users are dropped from the wireless network Range decreases as data rate increases Signal doesn't pass through a short or thin wall Signal strength drops when a cell phone is used in area Range is shorter than it should be Interference from flu
established to acquire an IP address from the AP to allow data transfer. Refer to the following WEP encryption and authentication settings. Open Authentication with an incorrect WEP 64 or 128-bit encryption key: ● ● A profile with an incorrect WEP encryption key will allow the wireless adapter to associate with the access point.
● What construction materials are used in wall and floors? Users are dropped from the wireless network Suggested causes and solutions: ● ● ● ● ● ● Find out if a person or workgroup moved or if the building has been rearranged. If two or more users are seated too close to each other, performance can suffer. Instruct your users to space themselves a small distance apart to keep receivers from being overloaded.
a “typical” office building, where the walls may be simple drywall (which is almost transparent to microwaves), or could be plaster with metal underneath. Most sites are somewhere between these two extremes, and consist of a mixture of surfaces. You can’t tell what is inside a wall by just looking at it, and we can’t tell you exactly what distance you will achieve. Consider published range information to be typical, average, common or usual. Do not expect it to be exact.
Help Prevent access to wireless networks from outside the building Excess transmit range presents a special reverse problem. For example, putting an access point adjacent to a second floor bay window invites anyone with the right software on the street below to pick up and enjoy all network transmissions. We discuss some possible solutions to this problem further on. Problems with Network Connectivity If you cannot connect to the wireless network, try the following: Check Network Settings 1.
If the adapter is communicating with an access point (infrastructure mode) or other computers in peer-to-peer mode, click the Statistics button in the Troubleshooting tab to display the current information about how well the adapter is transmitting and receiving information. Back to Contents Page Please read all restrictions and disclaimers.
Back to Contents Page Connecting to a Network: Intel(R) PRO/Wireless 2200BG User's Guide Connecting to a Network using Intel(R) PROSet ● ● ● ● ● ● ● ● ● ● Enabling Intel(R) PROSet to manage Your Wireless Connections System Wide Advanced Settings Intel(R) PROSet Configuration Service Scanning for Available Networks Connecting to a Network Using an Access Point Connecting to a Peer-to-Peer (Ad Hoc) Network Switching the Radio Off and On Disable the Radio from Windows Viewing Adapter Advanced Settings in Win
(unchecked). 4. Double-click the Intel(R) PROSet icon in the desktop task tray. 5. If you have previously setup your profiles, click the Networks tab. The profile list should display available networks to connect to. If no profiles have been established, refer to Creating a New Profile for more information. System Wide Advanced Settings Profile Management Options The following Profile Management options can be found in Advanced Settings.
However, the Connect button is non-functioning when used to connect to an available network. ● ● Ad hoc mode is disabled. The Connect button in the ad hoc connect dialog is nonfunctioning. Task tray icon menu: Launching an ad hoc profile and applying a profile from the task tray menu is not available. Notify when Windows XP Zero Configuration is enabled: If the box is cleared (default setting is checked), it indicates that Windows XP Zero Configuration wireless manager is enabled.
connection status. If no matching profiles are found in the Profile List for a network, a dialog automatically displays the available network access points and computers (ad hoc mode) within range of the wireless adapter. The Configuration Service can also be used if there is more than one wireless adapter installed using 802.11b band. The Configuration Service features: ● ● ● ● ● ● The Configuration Service is launched when you log on to your computer. No active profile switching will be performed.
These features can be enabled again after rebooting your computer or after a suspend and resume cycle. Features affected when another profile management application is detected For AAA Client: Select OK, and the AAA Client application will manage the adapter. The current connection will continue with the affected Intel(R) PROSet features show below. To avoid conflicts, the Intel(R) PROSet profile management features have been temporarily disabled.
● ● Ad hoc mode is disabled. The Connect button in the ad hoc connect dialog is nonfunctioning. Task tray icon menu: Launching an ad hoc profile and applying a profile from the task tray menu is not available. NOTE: If the buttons described above are used, the following message displays: "Another wireless LAN utility is communicating with the Intel(R) PRO/Wireless LAN adapter. To avoid conflicts, Intel(R) PROSet has temporarily disabled its Profile Management features.
NOTE: If the selected network has 802.11x authentication, you must first create a profile using the Profile Wizard. However, if the network has no WEP security (Open), WEP 64 or 128-bit encryption, or WPA-PSK, you can enter the required security settings in the dialog that displays after clicking the Connect button. Then a one time connection without a profile can be made. ● ● ● The selected network has WPA-PSK security settings: If the selected network has 802.
In peer-to-peer (ad hoc) mode, you can send and receive information to other computers in an ad hoc network. All wireless clients in the ad hoc network must use the same network name (SSID) and channel number. For a list of allowed 802.11b ad hoc channels, refer to the Adapter Settings for more information. NOTE: While scanning with an ad hoc profile set to a specific transmit channel, if an ad hoc network is found on another channel, you will be connected using the new channel.
5. Click Ad hoc operating mode. 6. Click Password protect this profile to set a profile password. 7. Click Next. Security Settings 8. 9. 10. 11. 12. Select either None, WEP for the data encryption. If WEP is selected, select either 64 or 128-bit for the Encryption Level. Select the key index 1, 2, 3 or 4. Enter the required pass phrase or hex key. If the Password Protection checkbox was checked on the General settings page, then click Next to display the Password page. Password Protection Settings 13. 14.
When your computer is switched on, if the radio is enabled it is constantly transmitting signals. In certain situations, such as landing or takeoff of an airplane, the radio signals may need to be turned off, if not these signals may cause interference. The following describes how to use your keyboard (if this option is available) and Intel(R) PROSet to switch the radio on or off. The radio can be enabled or disabled from your computer keyboard, the task tray wireless menu option and from Intel(R) PROSet.
Switching the radio on or off from the Task Tray menu option Right-click the wireless icon in the task tray and select the wireless adapter being used. Depending on the previous state of the radio, select Switch Radio Off (radio is already ON, select to turn OFF) or Switch Radio On (radio is already OFF, select to turn ON). Disable the Radio from Windows The radio can be disabled (made non-functional) via the Windows operating system using Device Manager. Windows XP/2000 1. 2. 3. 4. 5. 6. 7.
● ● the battery. Wireless Mode - Select the wireless mode (modulation type) for date rate. Default setting: "Connect to 802.11g and 802.11b." This option uses both 11 Mbps and 54 Mbps date rate. Other options are, "Connect to 802.11g only" and "Connect to 802.11b only." Preamble - The preamble property allows you to select the length of the preamble used to make a connection. Only available in the Windows Advanced dialog. See "Changing the Preamble Length Setting" for details.
8. Select Long Only from the drop-down box. 9. Click OK to save and exit the dialog. Advanced Tab Preamble Description Property Value Preamble Auto (Default): This option allows automatic detection of the preamble setting received from the access point to enable the appropriate preamble option. Short preamble is used if this option is supported, if not, long preamble is used. Long Only: Always use a long preamble length to connect to an access point.
Back to Contents Page Using PROSet Profiles: Intel(R) PRO/Wireless 2200BG User's Guide Using Intel(R) PROSet Wireless Profiles ● ● ● ● ● ● ● ● ● ● ● Setting up Windows Network Profiles Profile Connection Preferences Creating a New Profile Importing and Exporting Profiles Setting a Profile Password Automatic Profile Distribution Editing an Existing Profile Deleting a Profile Connecting to a Network without a Profile Connecting to a Network if a Blank SSID displays Loading a Profile from the Task Tray Sett
Profile Connection Preferences To access the profile connection preference option: 1. From the General page, click the Networks tab. 2. Click the Advanced button. 3. Under the Auto-connection heading, click the one of the following options: ● ● ● Connect to available networks using profiles only (Default setting): Use the profiles in the Profile List to connect to any available network.
4. 5. 6. 7. Enter the network SSID, in the Network Name (SSID) field. Click Infrastructure or Ad hoc for the operating mode. Click Password protect this profile to set a password for the profile. The Mandatory AP option is only used if Infrastructure mode is selected. Use this option to connect to a specific access point. Click the Mandatory AP button, enter the Ethernet address for the access point. Click OK to save the setting and return to the General Settings page. 8.
have completed the profile settings and return to the Networks page. Connect to the Network 25. Click the new profile name shown in the Profile List. Use the up and down arrows to position the priority of the new profile in the priority list. 26. Click the Advanced button to set the network connection preferences. 27. Click the Connect button to connect to the network. 28. Click OK to close the Intel(R) PROSet dialog.
Setting a Profile Password To set a password for an existing profile: 1. Select the profile from the Profile List in the Networks page, and click the Edit button. 2. Click the Password tab. 3. Click the check box next to "Password protect this profile" to enable profile password. 4. Enter a ten character password in the Password field. 5. Enter the new password again in the Confirm New Password field. 6. Click OK to exit and return to the Networks page. To password protect a new profile: 1.
automatically to computers connected to a network. The Enable Auto-Import box is located on the Profile Wizard dialogs. When the checkbox is checked the profile must be copied to a specific directory on the host computer, from there it can be distributed to multiple computers. Once the profile is received by the remote computer it will automatically be available for use from the Scan profile list. If an attempt is made to edit a distributed profile that is password protected, a password prompt will appear.
5. Click the new profile name shown in the Profile List. Use the up and down arrows to position the priority of new profile in the priority list. 6. Click the Advanced button to set the network connection preferences. 7. Click the Connect button to connect to the network. Deleting a Profile To delete a profile: 1. 2. 3. 4. From the General page, click the Networks tab. Click the profile to be deleted from the Profile List. Click the Delete button. Click Yes to permanently delete the profile.
point, both the blank SSID and display in the available networks list. To associate with a stealth access point, a new profile must first be created before connection. After connection both the blank SSID and the associated SSID can be viewed in the available networks list. To connect to an access point that transmits a blank network name (SSID) in the Available Networks list: 1. From the General page, click the Networks tab. 2. Click the Scan button. 3.
Back to Contents Page Security Overview: Intel(R) PRO/Wireless 2200BG User's Guide WEP Encryption and Authentication Encryption Overview Protecting Your Network Authentication Types 802.1x Authentication What is a RADIUS Wi-Fi Protected Access (WPA) PEAP Cisco LEAP WEP Encryption and Authentication Wired Equivalent Privacy (WEP) encryption and shared authentication provides protect for your data on the network. WEP uses an encryption key to encrypt data before transmitting it.
encryption. A network key can be provided for you automatically (for example, it might be provided on your wireless network adapter, or enter it yourself and specify the key length (64-bits or 128-bit), key format (ASCII characters or hexadecimal digits), and key index (the location where a specific key is stored). The longer the key length, the more secure the key. Every time the length of a key is increased by one bit, the number of possible keys double. Under 802.
encryption must be disabled. Protecting Your Network ● ● ● ● ● ● Authentication Types 802.1x Authentication What is a RADIUS Wi-Fi Protected Access (WPA) PEAP Cisco LEAP Authentication Types The IEEE 802.1x standard provides a general authentication framework for 802 LANs and specifies an extensible authentication protocol (EAP) to enable LAN transport for many different types of authentication protocols.
● 802.1x supplicant protocol support ● Support for the Extensible Authentication Protocol (EAP) - RFC 2284 ● Supported Authentication Methods: ● ● MD5 - RFC 2284 ● EAP TLS Authentication Protocol - RFC 2716 and RFC 2246 ● EAP Tunneled TLS (TTLS) ● Cisco LEAP ● PEAP Supports Windows XP, 2000 802.1x Authentication Notes ● ● ● 802.1x authentication methods, include passwords, certificates, and smart cards (plastic cards that hold data) 802.
Remote Authentication Dial-In User Service (RADIUS) server connected to the access point. The authentication process uses credentials, such as a user's password that are not transmitted over the wireless network. Most 802.1x types support dynamic per-user, per-session keys to strengthen the static key security. 802.1x benefits from the use of an existing authentication protocol known as the Extensible Authentication Protocol (EAP). 802.
RADIUS is the Remote Access Dial-In User Service, an Authorization, Authentication, and Accounting (AAA) client-server protocol for when a AAA dial-up client logs in or out of a Network Access Server. Typically, a RADIUS server is used by Internet Service Providers (ISP) to performs AAA tasks. AAA phases are described as follows: ● ● ● Authentication phase: Verifies a user name and password against a local database. After the credentials are verified, the authorization process begins.
Cisco LEAP (EAP Cisco Wireless) is a server and client 802.1x authentication via a usersupplied logon password. When a wireless access point communicates with a Cisco LEAP-enabled RADIUS (Cisco Secure Access Control Server (ACS) server), Cisco LEAP provides access control through mutual authentication between client wireless adapters and the wireless network and provides dynamic, individual user encryption keys to help protect the privacy of transmitted data.
Back to Contents Page Security and Encryption: Intel(R) PRO/Wireless 2200BG User's Guide Security and Encryption Setting up Data Encryption and Authentication Encryption Overview How to Enable WEP Encryption System Administrator Tasks Setting up the Client for WEP and MD5 authentication Setting up the Client for WPA-PSK using WEP or TKIP authentication Setting up the Client for WPA using TKIP encryption and TLS authentication Setting up the Client for WPA using TKIP encryption and TTLS or PEAP authenticati
● ● Using Open authentication, any wireless station can request authentication. The station that needs to authenticate with another wireless station sends an authentication management frame that contains the identity of the sending station. The receiving station or AP will grant any request for authentication. Open authentication allows any device network access. If no encryption is enabled on the network, any device that knows the SSID of the access point can gain access to the network.
Encryption Overview Security in the WLAN can be supplemented by enabling data encryption using WEP (Wireless Encryption Protocol). You can choose a 64 or 128 bit level encryption. Also, the data can then be encrypted with a key. Another parameter called the key index is provides the option to create multiple keys for that profile. However, only one key can be used at a time. You can also choose to password protect the profile to ensure privacy. The pass phrase is used to generate a WEP key automatically.
● phrase, up to five (using 64-bit) or 13 (using 128-bit) alphanumeric characters ((0-9, a-z or A-Z), in the pass phrase field. Use hex Key: Click Use hex Key to enable. Enter up to ten (using 64bit) alphanumeric characters, 0-9, A-F, or twenty-six (using 128-bit) alphanumeric characters, 0-9, A-F in the hex key field. 9. Click OK to save the profiles settings. NOTE: You must use the same encryption type, index number, and WEP key as other devices on your wireless network.
Step 1: Getting a certificate To allow TLS authentication, you need a valid client (user) certificate in the local repository for the logged-in user’s account. You also need a trusted CA certificate in the root store. The following information provides two methods for getting a certificate; ● ● from a corporate certification authority implemented on a Windows 2000 Server using Internet Explorer’s certificate import wizard to import a certificate from a file Getting a certificate from a Windows 2000 CA: 1.
Importing a certificate from a file 1. Open Internet Properties (right-click on the Internet Explorer icon on the desktop and select Properties. 2. Click the Certificates button on the Content page. This will open the list of installed certificates. 3. Click the Import button under the list of certificates. This will start the Certificate Import Wizard. (Note: Steps 1 through 3 may also be accomplished by doubleclicking the icon for the certificate. 4. Select the file and proceed to the Password page. 5.
12. Enter your user name in the User Name field. 13. Select the "Certificate Issuer" from the list. Select Any Trusted CA as the default. ● Click the "allow intermediate certificates" checkbox to allow a number of unspecified certificates to be in the server certificate chain between the server certificate and the specified CA. If unchecked, then the specified CA must have directly issued the server certificate. 14. Enter the Server name. ● If you know the server name enter this name.
6. 7. 8. 9. 10. 11. 12. 13. Select Open (recommended) for the Network Authentication. Select WEP as the Data Encryption. Select either 64 or 128-bit for the Encryption Level. Select the key index 1, 2, 3 or 4. Enter the required pass phrase or hex key. Click the 802.1x Enabled checkbox. Select MD5 as the 802.1x Authentication Type. Click Configure to open the MD5 Setting dialog. Enter the user name and password.
using 8-63 alphanumeric characters ((0-9, a-z or A-Z), in the pass phrase field. ● Use hex Key: Click Use hex Key to enable. Enter up to 64 alphanumeric characters, 0-9, A-F in the hex key field. 9. Click the 802.1x Enabled checkbox. 10. Set the authentication type to TLS to be used with this connection. 11. Click the Finish button to save the security settings for the profile.
If you know the server name enter this name. ● Select the appropriate option to match the server name exactly or specify the domain name. Use Client Certificate: This option selects a client certificate from the Personal certificate store of the Windows logged-in user. This certificate will be used for client authentication. Click the Select button to open a list of installed certificates.
The following example describes how to use WPA with TKIP encryption using TTLS or PEAP authentication. 1. Obtain and install a client certificate, refer to Setting up the Client for TLS authentication or consult your system administrator. 2. From the General page, click the Networks tab. 3. Click the Add button. 4. Enter the profile and network (SSID) name. 5. Select Infrastructure for the operating mode. 6. Click Next. 7. Select WPA for the Network Authentication. 8. Select TKIP as the Data Encryption. 9.
16. 17. 18. 19. 20. 21. has been verified and established. Enter the user password. Specifies the user password. This password must match the password that is set in the authentication server. Re-enter the user password. If confirmed, displays the same password characters entered in the Password field. Use Client Certificate: This option selects a client certificate from the Personal certificate store of the Windows logged-in user. This certificate will be used for client authentication.
6. 7. 8. 9. 10. 11. 12. 13. 14. Network authentication and the Data Encryption now include the CCX security options: Open, Shared for 802.11 Authentication and none, WEP, CKIP for Data encryption. Click Next. Select Open in the Network Authentication options. Select CKIP as the Data encryption. Click the 802.1x Enabled checkbox to enable the 802.1x security option. Select LEAP as the 802.1x Authentication Type. Click the Configure button to open the LEAP Setting dialog.
Client: In this case the client needs to send out an authentication algorithm value of 0x80 else the 802.11 authentication handshake would fail. During boot, when the Wireless LAN driver is already loaded, but the Intel(R) PROSet supplicant is still unloaded, the client sends 802.11 authentication with an Authentication algorithm value of 0x0. Once the Intel(R) PROSet supplicant loads, and engages the LEAP profile, it sends 802.11 authentication with an Authentication algorithm value of 0x80.
Some non-Intel clients, for example, when set to LEAP, cannot authenticate in this case. However, the Intel Wireless LAN client can authenticate, if the Rogue AP is unchecked. Rogue AP Checkbox configuration When the checkbox is checked it ensures that the client implements the Rogue AP feature as required by CCX. The client makes note of APs that it failed to authenticate with and sends this information to the AP that allows it to authenticate and connect.
● WEP/RC4 support ● Support of 4 keys for WEP ● Both WEP40 and WEP128 keys are supported ● LEAP support is required ● Rogue AP reporting support ● Cisco Extension: Aironet IE support – CWmin and CWmax fields ● Encapsulation Transformation Rule IE support ● Cisco Extension: AP IP address IE ● Cisco Extension: Symbol IE ● Mixed (WEP and non-WEP) cells ● AP may respond to more than one SSID – VLAN awareness ● Stealth mode support - Clients should ignore missing SSIDs in beacons ● Multi
Back to Contents Page Specifications: Intel(R) PRO/Wireless 2200BG User's Guide Specifications Form Factor Mini PCI Type 3B Dimensions Width 2.34 in x Length 1.75 in x Height 0.20 in (59.45 mm x 44.45 mm x 5 mm) Weight 0.7 oz. (12.90 g.) Antenna Interface Connector Hirose U.FL-R-SMT mates with cable connector U.
Data Rates 1, 2, 5.5, 6, 9, 11, 12, 24, 36, 48 and 54 Mbps Indoor Range 100 ft (30 m) @ 11 Mbps / 300 ft (90 m) @ 1 Mbps Outdoor Range 400 ft (120 m) @ 11 Mbps / 1500 ft (460 m) @ 1 Mbps Power Transmit Output Power 16 dBm (typical) Adapter Power Consumption Transmit 1.45 W Receive 0.85 W Idle 60 mw Disable 50 mw Voltage 3.3 V General Operating Systems Windows* XP, 2000 Wi-Fi Alliance certification Wi-Fi certification for 802.11b and 802.11g WLAN Standard IEEE 802.
Back to Contents Glossary of Terms: Intel(R) PRO/Wireless 2200BG User's Guide Numerical A B D E F I K M O P R S T U W Numerical 802.11a: The 802.11a standard specifies a maximum data transfer rate of 54Mbps and an operating frequency of 5GHz. The 802.11a standard uses the Orthogonal Frequency Division Multiplexing (OFDM) transmission method. Additionally, the 802.11a standard supports 802.11 features such as WEP encryption for security. 802.11b:The 802.
supporting 128-, 192-, and 256-bit keys. B Basic Service Set Identifier (BSSID): A unique identifier for each wireless client on a wireless network. The BSSID is the Ethernet MAC address of each adapter on the network. Bit Rate: The total number of bits (ones and zeros) per second that a network connection can support. Note that this bit rate will vary, under software control, with different signal path conditions.
Extensible Authentication Protocol (EAP): An IETF standard that establishes an authentication protocol for network access. Many authentication methods, including passwords, certificates, and smart cards, work within this framework. EAP-TLS: A type of authentication method using the Extensible Authentication Protocol (EAP) and a security protocol called the Transport Layer Security (TLS). EAP-TLS uses certificates which use passwords. EAP-TLS authentication supports dynamic WEP key management.
Independent Basic Service Set Identifier (IBSSID): Used to identify a wireless network configured to allow each wireless client to communicate directly with each other without an access point. Independent Network: A network that provides (usually temporarily) peer-to-peer connectivity without relying on a complete network infrastructure. Infrastructure Network: A wireless network centered around an access point.
Multipath: The signal variation caused when radio signals take multiple paths from transmitter to receiver. O Orthogonal Frequency Division Multiplexing (OFDM): A modulation technique for transmitting large amounts of digital data over radio waves. 802.11a uses OFDM, as will 802.11g. P Peer-to-Peer Mode: A wireless network structure that allows wireless clients to communicate with each other without using an access point.
resources. Roaming: Movement of a wireless node between two microcells. Roaming usually occurs in infrastructure networks built around multiple access points. S Service Set Identifier (SSID): Used to identify clients on a wireless network. Shared key: An encryption key known only to the receiver and sender of data. Site Survey: A process where you set up one transceiver in a fixed location, and then use another unit to plot the field strength of the first unit’s transmitted signal.
transceivers. U UNII Bands: Unlicensed National Information Infrastructure. In contrast to the ISM bands, these are a group of frequency bands set aside by the FCC for WLAN type communications only. Users must accept interference from other legal WLAN users, but the other sources of interference problems are, or legally should be, missing. W WEP64 and WEP128: Wired Equivalent Privacy, 64 bit and 128 bit (64 bit is sometimes referred to as 40 bit).
Back to Contents Please read all restrictions and disclaimers.
Back to Contents Page Customer Support: Intel(R) PRO/Wireless 2200BG User's Guide Customer Support Intel support is available online or by telephone. Available services include the most upto-date product information, installation instructions about specific products, and troubleshooting tips. Online Support Technical Support: http://support.intel.com Network Product Support: http://www.intel.
Corporate Web Site: http://www.intel.com Back to Contents Page Please read all restrictions and disclaimers.
Back to Contents Page Regulatory Information: Intel(R) PRO/Wireless 2200BG User's Guide Information For the User Regulatory Information Information for the user Intel(R) PRO/Wireless 2200BG Network Connection adapter (model WM3B2200BG) Safety Notices The FCC with its action in ET Docket 96-8 has adopted a safety standard for human exposure to radio frequency (RF) electromagnetic energy emitted by FCC certified equipment.
The use of wireless devices on airplanes is governed by the Federal Aviation Administration (FAA). ❍ The use of wireless devices in hospitals is restricted to the limits set forth by each hospital. Antenna use: ❍ In order to comply with FCC RF exposure limits, low gain integrated antennas should be located at a minimum distance of 20 cm (8 inches) or more from the body of all persons.
Caution: Regulations of the FCC and FAA prohibit airborne operation of radiofrequency wireless devices because their signals could interfere with critical aircraft instruments. Other Wireless Devices Safety Notices for Other Devices in the Wireless Network: Refer to the documentation supplied with wireless Ethernet adapters or other devices in the wireless network.
is less than the electromagnetic energy emitted by other wireless devices such as mobile phones. The Intel(R) PRO/Wireless 2200BG adapter wireless device operates within the guidelines found in radio frequency safety standards and recommendations. These standards and recommendations reflect the consensus of the scientific community and result from deliberations of panels and committees of scientists who continually review and interpret the extensive research literature.
Regulatory information USA—Federal Communications Commission (FCC) This device complies with Part 15 of the FCC Rules. Operation of the device is subject to the following two conditions: ● ● This device may not cause harmful interference. This device must accept any interference that may cause undesired operation. NOTE—The radiated output power of the Intel(R) PRO/Wireless 2200BG adapter wireless network device is far below the FCC radio frequency exposure limits.
● Consult the dealer or an experienced radio/TV technician for help. NOTE—The Intel(R) PRO/Wireless 2200BG adapter wireless network device must be installed and used in strict accordance with the manufacturer's instructions as described in the user documentation that comes with the product. Any other installation or use will violate FCC Part 15 regulations. U.S. Frequency Bands 2.400 - 2.