Manual para Referencia PDF
Manual para Referencia PDF
Manual para Referencia PDF
With your WiFi network card, you can access WiFi networks, share files or printers, or even share your Internet
connection. All of these features can be explored using a WiFi network in your home or office. This WiFi network
solution is designed for both home and business use. Additional users and features can be added as your
networking needs grow and change.
This guide contains basic information about Intel adapters. It includes information about several adapter properties
that you can set to control and enhance the performance of your adapter with your particular wireless network
and environment. Intel® wireless adapters enable fast connectivity without wires for desktop and notebook PCs.
Adapter Settings
Regulatory Information
Specifications
Important Information
Support
Warranty
Glossary
© 2004–2011 Intel Corporation. All rights reserved. Intel Corporation, 5200 N.E. Elam Young Parkway,
Hillsboro, OR 97124-6497 USA
The copying or reproducing of any material in this document in any manner whatsoever without the written
permission of Intel Corporation is strictly forbidden. Intel® is a trademark or registered trademark of Intel
Corporation or its subsidiaries in the United States and other countries. Other trademarks and trade names may
be used in this document to refer to either the entities claiming the marks and names or their products. Intel
disclaims any proprietary interest in trademarks and trade names other than its own. Microsoft and Windows are
registered trademarks of Microsoft Corporation. Windows Vista is either a registered trademark or trademark of
Microsoft Corporation in the United States and/or other countries.
Intel Corporation assumes no responsibility for errors or omissions in this document. Nor does Intel make any
commitment to update the information contained herein.
Intel wireless LAN adapters are engineered, manufactured, tested, and quality checked to ensure that they meet
all necessary local and governmental regulatory agency requirements for the regions that they are designated
and/or marked to ship into. Because wireless LANs are generally unlicensed devices that share spectrum with
radars, satellites, and other licensed and unlicensed devices, it is sometimes necessary to dynamically detect,
avoid, and limit usage to avoid interference with these devices. In many instances Intel is required to provide test
data to prove regional and local compliance to regional and governmental regulations before certification or
approval to use the product is granted. Intel's wireless LAN's EEPROM, firmware, and software driver are designed
to carefully control parameters that affect radio operation and to ensure electromagnetic compliance (EMC). These
parameters include, without limitation, RF power, spectrum usage, channel scanning, and human exposure.
For these reasons Intel cannot permit any manipulation by third parties of the software provided in binary format
with the wireless LAN adapters (e.g., the EEPROM and firmware). Furthermore, if you use any patches, utilities, or
code with the Intel wireless LAN adapters that have been manipulated by an unauthorized party (i.e., patches,
utilities, or code (including open source code modifications) which have not been validated by Intel), (i) you will be
solely responsible for ensuring the regulatory compliance of the products, (ii) Intel will bear no liability, under any
theory of liability for any issues associated with the modified products, including without limitation, claims under
the warranty and/or issues arising from regulatory non-compliance, and (iii) Intel will not provide or be required to
assist in providing support to any third parties for such modified products.
Note: Many regulatory agencies consider Wireless LAN adapters to be "modules", and accordingly, condition
system-level regulatory approval upon receipt and review of test data documenting that the antennas and system
configuration do not cause the EMC and radio operation to be non-compliant."
Adapter Settings
The Advanced tab displays the device properties for the WiFi adapter installed on your computer. This version of
Intel® PROSet/Wireless WiFi Software is compatible with the following adapters:
How to Access
At the Intel® PROSet/Wireless WiFi Connection Utility, Advanced Menu click Adapter Settings. Select the
Advanced tab.
Name Description
802.11n Set high throughput channel width to maximize performance. Set the channel width to Auto or
Channel Width 20MHz. Use 20MHz if 802.11n channels are restricted. This setting applies to 802.11n capable
(2.4 GHz) adapters only.
802.11n Set high throughput channel width to maximize performance. Set the channel width to Auto or
Channel Width 20MHz. Use 20MHz if 802.11n channels are restricted. This setting applies to 802.11n capable
(5.2 GHz) adapters only.
802.11n Mode The 802.11n standard builds on previous 802.11 standards by adding multiple-input multiple-
output (MIMO). MIMO increases data throughput to improve transfer rate. Select Enabled or
Disabled to set the 802.11n mode of the WiFi adapter. Enabled is the default setting. This
setting applies to 802.11n capable adapters only.
NOTE: To achieve transfer rates greater than 54 Mbps on 802.11n connections, WPA2* -AES
security must be selected. No security (None) can be selected to enable network setup and
troubleshooting.
An administrator can enable or disable support for high throughput mode to reduce power-
consumption or conflicts with other bands or compatibility issues.
Ad Hoc Unless the other computers in the ad hoc network use a different channel from the default
Channel channel, there is no need to change the channel.
Value: Select the permitted operating channel from the list.
802.11b/g: Select this option when 802.11b and 802.11g (2.4 GHz) ad hoc band
frequency is used.
802.11a: Select this option when 802.11a (5 GHz) ad hoc band frequency is used. This
setting does not apply to the Intel® WiFi Link 1000 adapter.
NOTE: When an 802.11a channel is not displayed, initiating ad hoc networks is not supported
for 802.11a channels.
Ad Hoc Power Set power saving features for device to device (ad hoc) networks.
Management
Disable: Select when connecting to ad hoc networks that contain stations that do not
support ad hoc power management
Maximum Power Savings: Select to optimize battery life.
Noisy Environment: Select to optimize performance or connecting with multiple clients.
Ad Hoc QoS Quality of Service (QoS) control in ad hoc networks. QoS provides prioritization of traffic from
Mode the access point over a wireless LAN based on traffic classification. WMM (Wi-Fi Multimedia) is
the QoS certification of the Wi-Fi Alliance (WFA). When WMM is enabled, the WiFi adapter uses
WMM to support priority tagging and queuing capabilities for Wi-Fi networks.
Fat Channel This setting communicates to surrounding networks that this WiFi adapter is not tolerant of
Intolerant 40MHz channels in the 2.4GHz band. The default setting is for this to be turned off (disabled),
so that the adapter does not send this notification.
Mixed mode Use to avoid data collisions in a mixed 802.11b and 802.11g environment. Request to
protection Send/Clear to Send (RTS/CTS) should be used in an environment where clients may not hear
each other. CTS-to-self can be used to gain more throughput in an environment where clients
are in close proximity and can hear each other.
Power Lets you select a balance between power consumption and WiFi adapter performance. The WiFi
Management adapter power settings slider sets a balance between the computer's power source and the
battery.
Use default value: (Default) Power settings are based on the computer's power source.
Manual: Adjust the slider for the desired setting. Use the lowest setting for maximum
battery life. Use the highest setting for maximum performance.
NOTE: The optimal setting is for a user to always set the transmit power at the lowest
possible level that is still compatible with the quality of their communication. This allows the
maximum number of wireless devices to operate in dense areas and reduce interference with
other devices that it shares the same radio spectrum with.
NOTE: This setting takes effect when either Network (Infrastructure) or Device to Device (ad
hoc) mode is used.
Wireless Mode Select which mode to use for connection to a wireless network:
802.11a only: Connect the wireless WiFi adapter to 802.11a networks only. Not
applicable for all adapters.
802.11b only: Connect the wireless WiFi adapter to 802.11b networks only. Not
applicable for all adapters.
802.11g only: Connect the wireless WiFi adapter to 802.11g networks only.
802.11a and 802.11g: Connect the WiFi adapter to 802.11a and 802.11g networks
only. Not applicable for all adapters.
802.11b and 802.11g: Connect the WiFi adapter to 802.11b and 802.11g networks
only. Not applicable for all adapters.
802.11a, 802.11b, and 802.11g: (Default) - Connect to either 802.11a, 802.11b or
802.11g wireless networks. Not applicable for all adapters.
Back to Top
Back to Contents
Trademarks and Disclaimers
Back to Contents
Regulatory Information
NOTE: Due to the evolving state of regulations and standards in the wireless LAN field (IEEE 802.11
and similar standards), the information provided herein is subject to change. Intel Corporation
assumes no responsibility for errors or omissions in this document.
NOTE: In this section, all references to the "wireless adapter" refer to all adapters listed above.
Safety Notices
The FCC with its action in ET Docket 96-8 has adopted a safety standard for human exposure to radio frequency
(RF) electromagnetic energy emitted by FCC certified equipment. The wireless adapter meets the Human Exposure
limits found in OET Bulletin 65, supplement C, 2001, and ANSI/IEEE C95.1, 1992. Proper operation of this radio
according to the instructions found in this manual will result in exposure substantially below the FCC’s
recommended limits.
Antenna Use
In order to comply with FCC RF exposure limits, low gain integrated antennas should be located at a
minimum distance of 20 cm (8 inches) or more from the body of all persons.
Warning: Do not operate a portable transmitter (including this wireless adapter) near unshielded blasting
caps or in an explosive environment unless the transmitter has been modified to be qualified for such use.
Antenna Warnings
Warning: To comply with the FCC and ANSI C95.1 RF exposure limits, it is recommended that for the
wireless adapter installed in a desktop or portable computer, the antenna for this wireless adapter to be installed
so as to provide a separation distance of at least 20 cm (8 inches) from all persons. It is recommended that the
user limit exposure time if the antenna is positioned closer than 20 cm (8 inches).
Warning: The wireless adapter is not designed for use with high -gain directional antennas.
Caution: Regulations of the FCC and FAA prohibit airborne operation of radio-frequency wireless devices
(wireless adapters) because their signals could interfere with critical aircraft instruments.
Safety Notices for Other Devices in the Wireless Network: See the documentation supplied with wireless
adapters or other devices in the wireless network.
Local Restrictions on 802.11a, 802.11b, 802.11g, 802.11n, and 802.16e Radio Usage
Caution: Due to the fact that the frequencies used by 802.11a, 802.11b, 802.11g, 802.11n, and 802.16e
wireless LAN devices may not yet be harmonized in all countries, 802.11a, 802.11b, 802.11g, 802.11n, and
802.16e products are designed for use only in specific countries, and are not allowed to be operated in countries
other than those of designated use. As a user of these products, you are responsible for ensuring that the
products are used only in the countries for which they were intended and for verifying that they are configured
with the correct selection of frequency and channel for the country of use. The device transmit power control
(TPC) interface is part of the Intel® PROSet/Wireless WiFi Connection Utility Software. Operational restrictions for
Equivalent Isotropic Radiated Power (EIRP) are provided by the system manufacturer. Any deviation from the
permissible power and frequency settings for the country of use is an infringement of national law and may be
punished as such.
For country-specific information, see the additional compliance information supplied with the product.
Wireless Interoperability
The wireless adapter is designed to be interoperable with other wireless LAN products that are based on direct
sequence spread spectrum (DSSS) radio technology and to comply with the following standards:
The wireless adapter, like other radio devices, emits radio frequency electromagnetic energy. The level of energy
emitted by the wireless adapter, however, is less than the electromagnetic energy emitted by other wireless
devices such as mobile phones. The wireless adapter operates within the guidelines found in radio frequency safety
standards and recommendations. These standards and recommendations reflect the consensus of the scientific
community and result from deliberations of panels and committees of scientists who continually review and
interpret the extensive research literature. In some situations or environments, the use of the wireless adapter
may be restricted by the proprietor of the building or responsible representatives of the applicable organization.
Examples of such situations may include:
If you are uncertain of the policy that applies to the use of wireless adapters in a specific organization or
environment (an airport, for example), you are encouraged to ask for authorization to use the adapter before you
turn it on.
WEEE
Regulatory Information
The following statement must be included with all versions of this document supplied to an OEM or integrator, but
should not be distributed to the end user.
The following regulatory and safety notices must be published in documentation supplied to the end user of the
product or system incorporating the Intel® wireless adapter, in compliance with local regulations. Host system
must be labeled with "Contains FCC ID: XXXXXXXX", FCC ID displayed on label.
The Intel® wireless adapter must be installed and used in strict accordance with the manufacturer's instructions as
described in the user documentation that comes with the product. Intel Corporation is not responsible for any
radio or television interference caused by unauthorized modification of the devices included with the wireless
adapter kit or the substitution or attachment of connecting cables and equipment other than that specified by Intel
Corporation. The correction of interference caused by such unauthorized modification, substitution or attachment is
the responsibility of the user. Intel Corporation and authorized resellers or distributors are not liable for any
damage or violation of government regulations that may arise from the user failing to comply with these
guidelines.
Local Restriction of 802.11a, 802.11b, 802.11g, and 802.11n Radio Usage
The following statement on local restrictions must be published as part of the compliance documentation for all
802.11a, 802.11b, 802.11g and 802.11n products.
Caution: Due to the fact that the frequencies used by 802.11a, 802.11b, 802.11g, 802.11n, and 802.16e
wireless LAN devices may not yet be harmonized in all countries, 802.11a, 802.11b, 802.11g, 802.11n, and
802.16e products are designed for use only in specific countries, and are not allowed to be operated in countries
other than those of designated use. As a user of these products, you are responsible for ensuring that the
products are used only in the countries for which they were intended and for verifying that they are configured
with the correct selection of frequency and channel for the country of use. Any deviation from the permissible
power and frequency settings for the country of use is an infringement of national law and may be punished as
such.
This wireless adapter is restricted to indoor use due to its operation in the 5.15 to 5.25 GHz frequency range. FCC
requires this wireless adapter to be used indoors for the frequency range 5.15 to 5.25 GHz to reduce the potential
for harmful interference to co-channel mobile satellite systems. High power radars are allocated as primary users
of the 5.25 to 5.35 GHz and 5.65 to 5.85 GHz bands. These radar stations can cause interference with and /or
damage this device.
This wireless adapter complies with Part 15 of the FCC Rules. Operation of the device is subject to the following
two conditions:
NOTE: The radiated output power of the adapter is far below the FCC radio frequency exposure limits.
Nevertheless, the adapter should be used in such a manner that the potential for human contact
during normal operation is minimized. To avoid the possibility of exceeding the FCC radio frequency
exposure limits, you should keep a distance of at least 20 cm between you (or any other person in the
vicinity) and the antenna that is built into the computer. Details of the authorized configurations can
be found at http://www.fcc.gov/oet/ea/ by entering the FCC ID number on the device.
Interference Statement
This wireless adapter has been tested and found to comply with the limits for a Class B digital device, pursuant to
Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference
in a residential installation. This wireless adapter generates, uses, and can radiate radio frequency energy. If the
wireless adapter is not installed and used in accordance with the instructions, the wireless adapter may cause
harmful interference to radio communications. There is no guarantee, however, that such interference will not
occur in a particular installation. If this wireless adapter does cause harmful interference to radio or television
reception (which can be determined by turning the equipment off and on), the user is encouraged to try to correct
the interference by taking one or more of the following measures:
Reorient or relocate the receiving antenna of the equipment experiencing the interference.
Increase the distance between the wireless adapter and the equipment experiencing the interference.
Connect the computer with the wireless adapter to an outlet on a circuit different from that to which the
equipment experiencing the interference is connected.
Consult the dealer or an experienced radio/TV technician for help.
NOTE: The adapter must be installed and used in strict accordance with the manufacturer's
instructions as described in the user documentation that comes with the product. Any other installation
or use will violate FCC Part 15 regulations.
Underwriters Laboratories Inc. (UL) Regulatory Warning
Halogen-Free Label
Some adapters are packaged with a Halogen -Free label. This claim applies only to halogenated flame retardants
and PVC in components. Halogens are below 900 PPM bromine and 900 PPM chlorine.
Taiwan
Radio Approvals
To determine whether you are allowed to use your wireless network device in a specific country, please check to
see if the radio type number that is printed on the identification label of your device is listed in the manufacturer's
OEM Regulatory Guidance document.
Regulatory Markings
To find the regulatory information for your adapter, click on the link for your adapter. Then click Additional
Information > Regulatory Documents.
NOTE: In this section, all references to the "wireless adapter" refer to all adapters listed above.
The following information is provided:
Safety Notices
The FCC with its action in ET Docket 96-8 has adopted a safety standard for human exposure to radio frequency
(RF) electromagnetic energy emitted by FCC certified equipment. The wireless adapter meets the Human Exposure
limits found in OET Bulletin 65, supplement C, 2001, and ANSI/IEEE C95.1, 1992. Proper operation of this radio
according to the instructions found in this manual will result in exposure substantially below the FCC’s
recommended limits.
Antenna Use
In order to comply with FCC RF exposure limits, low gain integrated antennas should be located at a
minimum distance of 20 cm (8 inches) or more from the body of all persons.
Warning: Do not operate a portable transmitter (including this wireless adapter) near unshielded blasting
caps or in an explosive environment unless the transmitter has been modified to be qualified for such use.
Antenna Warnings
Warning: To comply with the FCC and ANSI C95.1 RF exposure limits, it is recommended that for the
wireless adapter installed in a desktop or portable computer, the antenna for this wireless adapter to be installed
so as to provide a separation distance of at least 20 cm (8 inches) from all persons. It is recommended that the
user limit exposure time if the antenna is positioned closer than 20 cm (8 inches).
Warning: The wireless adapter is not designed for use with high -gain directional antennas.
Caution: Regulations of the FCC and FAA prohibit airborne operation of radio-frequency wireless devices
(wireless adapters) because their signals could interfere with critical aircraft instruments.
Safety Notices for Other Devices in the Wireless Network: See the documentation supplied with wireless
adapters or other devices in the wireless network.
Caution: Due to the fact that the frequencies used by 802.11a, 802.11b, 802.11g and 802.11n wireless LAN
devices may not yet be harmonized in all countries, 802.11a, 802.11b, 802.11g and 802.11n products are
designed for use only in specific countries, and are not allowed to be operated in countries other than those of
designated use. As a user of these products, you are responsible for ensuring that the products are used only in
the countries for which they were intended and for verifying that they are configured with the correct selection of
frequency and channel for the country of use. The device transmit power control (TPC) interface is part of the
Intel® PROSet/Wireless WiFi Connection Utility Software. Operational restrictions for Equivalent Isotropic Radiated
Power (EIRP) are provided by the system manufacturer. Any deviation from the permissible power and frequency
settings for the country of use is an infringement of national law and may be punished as such.
For country-specific information, see the additional compliance information supplied with the product.
Wireless Interoperability
The wireless adapter is designed to be interoperable with other wireless LAN products that are based on direct
sequence spread spectrum (DSSS) radio technology and to comply with the following standards:
The wireless adapter, like other radio devices, emits radio frequency electromagnetic energy. The level of energy
emitted by the wireless adapter, however, is less than the electromagnetic energy emitted by other wireless
devices such as mobile phones. The wireless adapter operates within the guidelines found in radio frequency safety
standards and recommendations. These standards and recommendations reflect the consensus of the scientific
community and result from deliberations of panels and committees of scientists who continually review and
interpret the extensive research literature. In some situations or environments, the use of the wireless adapter
may be restricted by the proprietor of the building or responsible representatives of the applicable organization.
Examples of such situations may include:
If you are uncertain of the policy that applies to the use of wireless adapters in a specific organization or
environment (an airport, for example), you are encouraged to ask for authorization to use the adapter before you
turn it on.
WEEE
Regulatory Information
The following statement must be included with all versions of this document supplied to an OEM or integrator, but
should not be distributed to the end user.
The following regulatory and safety notices must be published in documentation supplied to the end user of the
product or system incorporating the Intel® wireless adapter, in compliance with local regulations. Host system
must be labeled with "Contains FCC ID: XXXXXXXX", FCC ID displayed on label.
The wireless adapter must be installed and used in strict accordance with the manufacturer's instructions as
described in the user documentation that comes with the product. For country-specific approvals, see Radio
Approvals. Intel Corporation is not responsible for any radio or television interference caused by unauthorized
modification of the devices included with the wireless adapter kit or the substitution or attachment of connecting
cables and equipment other than that specified by Intel Corporation. The correction of interference caused by such
unauthorized modification, substitution or attachment is the responsibility of the user. Intel Corporation and
authorized resellers or distributors are not liable for any damage or violation of government regulations that may
arise from the user failing to comply with these guidelines.
The following statement on local restrictions must be published as part of the compliance documentation for all
802.11a, 802.11b, 802.11g and 802.11n products.
Caution: Due to the fact that the frequencies used by 802.11a, 802.11b, 802.11g and 802.11n wireless LAN
devices may not yet be harmonized in all countries, 802.11a, 802.11b, 802.11g and 802.11n products are
designed for use only in specific countries, and are not allowed to be operated in countries other than those of
designated use. As a user of these products, you are responsible for ensuring that the products are used only in
the countries for which they were intended and for verifying that they are configured with the correct selection of
frequency and channel for the country of use. Any deviation from permissible settings and restrictions in the
country of use could be an infringement of national law and may be punished as such.
This device is restricted to indoor use due to its operation in the 5.15 to 5.25 GHz and 5.470 to 5.725 GHz
frequency ranges. FCC requires this product to be used indoors for the frequency ranges 5.15 to 5.25 GHz and
5.470 to 5.725 GHz to reduce the potential for harmful interference to co-channel mobile satellite systems. High
power radars are allocated as primary users of the 5.25 to 5.35 GHz and 5.65 to 5.85 GHz bands. These radar
stations can cause interference with and /or damage this device. No configuration controls are provided for this
wireless adapter allowing any change in the frequency of operations outside the FCC grant of authorization for U.S
operation according to Part 15.407 of the FCC rules.
This device complies with Part 15 of the FCC Rules. Operation of the device is subject to the following two
conditions:
NOTE: The radiated output power of the adapter is far below the FCC radio frequency exposure limits.
Nevertheless, the adapter should be used in such a manner that the potential for human contact
during normal operation is minimized. To avoid the possibility of exceeding the FCC radio frequency
exposure limits, you should keep a distance of at least 20 cm between you (or any other person in the
vicinity) and the antenna that is built into the computer. Details of the authorized configurations can
be found at http://www.fcc.gov/oet/ea/ by entering the FCC ID number on the device.
Interference Statement
This wireless adapter has been tested and found to comply with the limits for a Class B digital device, pursuant to
Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference
in a residential installation. This wireless adapter generates, uses, and can radiate radio frequency energy. If the
wireless adapter is not installed and used in accordance with the instructions, the wireless adapter may cause
harmful interference to radio communications. There is no guarantee, however, that such interference will not
occur in a particular installation. If this wireless adapter does cause harmful interference to radio or television
reception (which can be determined by turning the equipment off and on), the user is encouraged to try to correct
the interference by taking one or more of the following measures:
Reorient or relocate the receiving antenna of the equipment experiencing the interference.
Increase the distance between the wireless adapter and the equipment experiencing the interference.
Connect the computer with the wireless adapter to an outlet on a circuit different from that to which the
equipment experiencing the interference is connected.
Consult the dealer or an experienced radio/TV technician for help.
NOTE: The adapter must be installed and used in strict accordance with the manufacturer's
instructions as described in the user documentation that comes with the product. Any other installation
or use will violate FCC Part 15 regulations.
Halogen-Free Label
Some adapters are packaged with a Halogen -Free label. This claim applies only to halogenated flame retardants
and PVC in components. Halogens are below 900 PPM bromine and 900 PPM chlorine.
European Union
The low band 5.15 -5.35 GHz is for indoor use only.
This equipment complies with the essential requirements of the European Union directive 1999/5/EC. See
Statements of European Union Compliance.
The European Union Declaration of Conformity for each adapter is available at:
http://www.intel.com/support/wireless/wlan/.
To find the Declaration of Conformity for your adapter, click on the link for your adapter. Then click Additional
Information > Regulatory Documents.
Japan
Korea
Morocco
The operation of this product in the radio channel 2 (2417 MHz) is not authorized in the following cities: Agadir,
Assa-Zag, Cabo Negro, Chaouen, Goulmima, Oujda, Tan Tan, Taourirt, Taroudant and Taza.
The operation of this product in the radio channels 4, 5, 6 et 7 (2425 - 2442 MHz) is not authorized in the
following cities: Aéroport Mohamed V, Agadir, Aguelmous, Anza, Benslimane, Béni Hafida, Cabo Negro, Casablanca,
Fès, Lakbab, Marrakech, Merchich, Mohammédia, Rabat, Salé, Tanger, Tan Tan, Taounate, Tit Mellil, Zag.
Taiwan
Radio Approvals
To determine whether you are allowed to use your wireless network device in a specific country, please check to
see if the radio type number that is printed on the identification label of your device is listed in the manufacturer's
OEM Regulatory Guidance document.
Regulatory Markings
To find the regulatory information for your adapter, click on the link for your adapter. Then click Additional
Information > Regulatory Documents.
Back to Top
Back to Contents
Trademarks and Disclaimers
Back to Contents
Specifications
General
Operating Systems Windows* 7 (32-bit and 64-bit)
Wi-Fi Alliance* Wi-Fi* certification for 802.11b, 802.11g, 802.11n, WPA-Personal, WPA-Enterprise, WPA2-
certification Personal, WPA2-Enterprise, WMM, WPS
Cisco Compatible Cisco Compatible Extensions, v4.0
Extensions
certification
IEEE Feature Sets IEEE 802.11b, 802.11g, 802.11n, 802.11e, 802.11i, 802.11d, 802.11h
Architecture Infrastructure or ad hoc (peer -to-peer) operating modes
Security WPA-Personal, WPA2-Personal, WPA-Enterprise, WPA2-Enterprise, AES-CCMP 128-bit, WEP
128-bit and 64-bit; 802.1X: EAP-SIM, LEAP, PEAP, TKIP, EAP-FAST, EAP-TLS, EAP-TTLS,
EAP-AKA
Product Safety UL, C -UL, CB (IEC 60590)
WiFi / WiMAX
Form Factor PCI Express* Mini Card and Half-Mini Card
SKUs Intel® WiFi Link 1000 - 1X2 MC/HMC
Dimensions Mini Card: Width 2.0 in x Length 1.18 in x Height 0.18 in (50.80 mm x 30 mm x 4.5
mm)
General
Operating Systems Windows* 7 (32-bit and 64-bit)
Wi-Fi Alliance* Wi-Fi* certification for 802.11b, 802.11g, 802.11n, WPA-Personal, WPA-Enterprise, WPA2-
certification Personal, WPA2-Enterprise, WMM, WPS
Cisco Compatible Cisco Compatible Extensions, v4.0
Extensions
certification
IEEE Feature Sets IEEE 802.11b, 802.11g, 802.11n, 802.11e, 802.11i, 802.11d, 802.11h
Architecture Infrastructure or ad hoc (peer -to-peer) operating modes
Security WPA-Personal, WPA2-Personal, WPA-Enterprise, WPA2-Enterprise, AES-CCMP 128-bit, WEP
128-bit and 64-bit; 802.1X: EAP-SIM, LEAP, PEAP, TKIP, EAP-FAST, EAP-TLS, EAP-TTLS,
EAP-AKA
Product Safety UL, C -UL, CB (IEC 60590)
Wi-Fi Alliance* Wi-Fi* certification for 802.11b, 802.11g, 802.11a, 802.11h, 802.11d, WPA-Personal, WPA-
certification Enterprise, WPA2-Personal, WPA2-Enterprise, WPS, WMM, WMM Power Save, EAP-SIM, LEAP,
PEAP, TKIP, EAP-FAST, EAP-TLS, EAP-TTLS, EAP-AKA, P2P
Cisco Cisco Compatible Extensions, v4.0
Compatible
Extensions
certification
WLAN Standard IEEE 802.11g, 802.11b, 802.11a, 802.11n
Architecture Infrastructure or ad hoc (peer -to-peer) operating modes
Security WPA-Personal, WPA2-Personal, WPA-Enterprise, WPA2-Enterprise, AES-CCMP 128-bit, WEP 128-
bit and 64-bit; 802.1X: EAP-SIM, LEAP, PEAP, TKIP, EAP-FAST, EAP-TLS, EAP-TTLS, EAP-AKA
Product Safety UL, C -UL, CB (IEC 60590)
Tx/Rx: 300, 270, 243, 240, 180, 150, 144, 135, 130, 120, 117, 115.5, 90, 86.667, 72.2, 65,
60, 57.8, 45, 43.3, 30, 28.9, 21.7, 15, 14.4, 7.2 Mbps
IEEE 802.11a 54, 48, 36, 24, 18, 12, 9, 6 Mbps
Data Rates
IEEE 802.11g 54, 48, 36, 24, 18, 12, 9, 6 Mbps
Data Rates
IEEE 802.11b 11, 5.5, 2, 1 Mbps
Data Rates
General
Operating Microsoft Windows* XP (32-bit and 64-bit)
Systems Windows Vista* (32-bit and 64-bit)
Windows* 7 (32-bit and 64-bit)
Wi-Fi Alliance* Wi-Fi* certification for 802.11b, 802.11g, 802.11a, 802.11h, 802.11d, WPA-Personal, WPA-
certification Enterprise, WPA2-Personal, WPA2-Enterprise, WMM, WMM Power Save, EAP-SIM, LEAP, PEAP,
TKIP, EAP-FAST, EAP-TLS, EAP-TTLS, EAP-AKA
Cisco Cisco Compatible Extensions, v4.0
Compatible
Extensions
certification
IEEE Feature Intel® Centrino® Wireless-N + WiMAX 6150:
Sets IEEE 802.11b, 802.11g, 802.11n, 802.11e, 802.11i, 802.11h, 802.11d
Intel® Centrino® Advanced-N + WiMAX 6250: 2.3-2.4 GHz / 2.496-2.690 GHz / 3.4-3.8 GHz
Modulation UL - QPSK, 16 QAM
Form Factor Intel® Centrino® Advanced-N 6200, Intel® Centrino® Ultimate -N 6300:
PCI Express* Full-Mini Card and Half-Mini Card.
Half-Mini Card: Width 1.049 in x Length 1.18 in x Height 0.18 in (26.64 mm x 30 mm x 4.5
mm)
Antenna Hirose U.FL-R-SMT mates with cable connector U.FL-LP-066
Interface
Connector
Antenna On-board diversity
Diversity
Connector 52-pin Mini Card edge connector
Interface
Voltage 3.3 V
Operating 0 to +80 degrees Celsius
Temperature
Humidity 50% to 95% non-condensing (at temperatures of 25 ºC to 35 ºC)
Frequency 5 GHz (802.11a/n) 2.4 GHz (802.11b/g/n)
Modulation
Frequency band 5.15 GHz - 5.85 GHz (dependent on country) 2.400 - 2.4835 GHz (dependent on country)
Modulation BPSK, QPSK, 16 QAM, 64 QAM CCK, DQPSK, DBPSK
Wireless 5 GHz UNII: Orthogonal Frequency Division 2.4 GHz ISM: Orthogonal Frequency Division
Medium Multiplexing (OFDM) Multiplexing (OFDM)
Channels All channels as defined by the relevant specification and country rules.
IEEE 802.11n Intel® Centrino® Ultimate -N 6300:
Data Rates
Tx/Rx: 450, 405, 360, 300, 270, 243, 240, 216.7, 195, 180, 173.3, 150, 144, 135, 130, 120,
117, 115.5, 90, 86.667, 72.2, 65, 60, 57.8, 45, 43.3, 30, 28.9, 21.7, 15, 14.4, 7.2 Mbps
Intel® Centrino® Advanced-N 6200, Intel® Centrino® Advanced-N 6205:
Tx/Rx: 300, 270, 243, 240, 180, 150, 144, 135, 130, 120, 117, 115.5, 90, 86.667, 72.2, 65,
60, 57.8, 45, 43.3, 30, 28.9, 21.7, 15, 14.4, 7.2 Mbps
IEEE 802.11a 54, 48, 36, 24, 18, 12, 9, 6 Mbps
Data Rates
IEEE 802.11g 54, 48, 36, 24, 18, 12, 9, 6 Mbps
Data Rates
IEEE 802.11b 11, 5.5, 2, 1 Mbps
Data Rates
General
Operating Microsoft Windows* XP (32-bit and 64-bit)
Systems Windows Vista* (32-bit and 64-bit)
Windows* 7 (32-bit and 64-bit)
Wi-Fi Alliance* Wi-Fi* certification for 802.11b, 802.11g, 802.11a, 802.11h, 802.11d, WPA-Personal, WPA-
certification Enterprise, WPA2-Personal, WPA2-Enterprise, WMM, WMM Power Save, EAP-SIM, LEAP, PEAP,
TKIP, EAP-FAST, EAP-TLS, EAP-TTLS, EAP-AKA
Cisco Cisco Compatible Extensions, v4.0
Compatible
Extensions
certification
WLAN Standard IEEE 802.11g, 802.11b, 802.11a, 802.11n
Architecture Infrastructure or ad hoc (peer -to-peer) operating modes
Security WPA-Personal, WPA2-Personal, WPA-Enterprise, WPA2-Enterprise, AES-CCMP 128-bit, WEP 128-
bit and 64-bit; 802.1X: EAP-SIM, LEAP, PEAP, TKIP, EAP-FAST, EAP-TLS, EAP-TTLS, EAP-AKA
Product Safety UL, C -UL, CB (IEC 60590)
Back to Top
Back to Contents
Trademarks and Disclaimers
Back to Contents
Important Information
Safety Information
Third Party Software Notices
Safety Information
It is important that you read the safety information regarding your WiFi adapter. Please see the User's Guide for
safety and regulatory notices.
OpenSSL License
Copyright (c) 1998 -2006 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the
following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following
acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL
Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products
derived from this software without prior written permission. For written permission, please contact openssl -
[email protected].
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names
without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes
software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT "AS IS" AND ANY EXPRESSED OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young ([email protected]). This product includes
software written by Tim Hudson ([email protected]).
This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The
following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just
the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms
except that the holder is Tim Hudson ([email protected]).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this
package is used in a product, Eric Young should be given attribution as the author of the parts of the library used.
This can be in the form of a textual message at program startup or in documentation (online or textual) provided
with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the
following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following
disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following
acknowledgement: "This product includes cryptographic software written by Eric Young ([email protected])"
The word 'cryptographic' can be left out if the routines from the library being used are not cryptographic
related.
4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code)
you must include an acknowledgement: "This product includes software written by Tim Hudson
([email protected])"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG "AS IS:' AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The license and distribution terms for any publicly available version or derivative of this code cannot be changed.
i.e. this code cannot simply be copied and put under another distribution license [including the GNU Public
License.]
zlib.h -- interface of the 'zlib' general purpose compression library, version 1.2.3, July
18th, 2005
This software is provided 'as -is', without any express or implied warranty. In no event will the authors be held
liable for any damages arising from the use of this software. Permission is granted to anyone to use this software
for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the
following restrictions:
1. The origin of this software must not be misrepresented; you must not claim that you wrote the original
software. If you use this software in a product, an acknowledgment in the product documentation would be
appreciated but is not required.
2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the
original software.
3. This notice may not be removed or altered from any source distribution.
WPA Supplicant
Copyright (c) 2003 -2007, Jouni Malinen <[email protected]> and contributors. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the
following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
Neither the name of Jouni Malinen nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
__________
LICENSE TERMS
The free distribution and use of this software in both source and binary form is allowed (with or without changes)
provided that:
1. Distributions of this source code include the above copyright notice, this list of conditions and the following
disclaimer;
2. distributions in binary form include the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other associated materials;
3. the copyright holder's name is not used to endorse products built using this software without specific written
permission.
DISCLAIMER
This software is provided 'as is' with no explicit or implied warranties in respect of its properties, including, but not
limited to, correctness and fitness for purpose.
Intel® PROSet/Wireless WiFi Connection Utility contains software licensed from Devicescape Software, Inc.
Copyright (c) 2004 - 2008 Devicescape Software, Inc. All rights reserved.
Back to Top
Back to Contents
Trademarks and Disclaimers
Back to Contents
Customer Support
Intel support is available online or by telephone. Available services include the most up-to-date product
information, installation instructions about specific products, and troubleshooting tips.
Online Support
Technical Support: http://www.intel.com/support
Back to Top
Back to Contents
Trademarks and Disclaimers
Back to Contents
Warranty
Limited Warranty
In this warranty statement, the term "Product" applies to the wireless adapters listed in Specifications.
Intel warrants to the purchaser of the Product that the Product, if properly used and installed, will be free from
defects in material and workmanship and will substantially conform to Intel’s publicly available specifications for
the Product for a period of one (1) year beginning on the date the Product was purchased in its original sealed
packaging.
SOFTWARE OF ANY KIND DELIVERED WITH OR AS PART OF THE PRODUCT IS EXPRESSLY PROVIDED "AS IS",
SPECIFICALLY EXCLUDING ALL OTHER WARRANTIES, EXPRESS, IMPLIED (INCLUDING WITHOUT LIMITATION,
WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT OR FITNESS FOR A PARTICULAR PURPOSE), provided
however, that Intel warrants that the media on which the software is furnished will be free from defects for a
period of ninety (90) days from the date of delivery. If such a defect appears within the warranty period, you may
return the defective media to Intel for replacement or alternative delivery of the software at Intel's discretion and
without charge. Intel does not warrant or assume responsibility for the accuracy or completeness of any
information, text, graphics, links or other items contained within the software.
If the Product which is the subject of this Limited Warranty fails during the warranty period for reasons covered by
this Limited Warranty, Intel, at its option, will:
THIS LIMITED WARRANTY, AND ANY IMPLIED WARRANTIES THAT MAY EXIST UNDER APPLICABLE STATE,
NATIONAL, PROVINCIAL OR LOCAL LAW, APPLY ONLY TO YOU AS THE ORIGINAL PURCHASER OF THE PRODUCT.
Intel does not warrant that the Product, whether purchased stand -alone or integrated with other products,
including without limitation, semi-conductor components, will be free from design defects or errors known as
"errata." Current characterized errata are available upon request. Further, this Limited Warranty does NOT cover:
(i) any costs associated with the replacement or repair of the Product, including labor, installation or other costs
incurred by you, and in particular, any costs relating to the removal or replacement of any Product soldered or
otherwise permanently affixed to any printed circuit board or integrated with other products; (ii) damage to the
Product due to external causes, including accident, problems with electrical power, abnormal, mechanical or
environmental conditions, usage not in accordance with product instructions, misuse, neglect, accident, abuse,
alteration, repair, improper or unauthorized installation or improper testing, or (iii) any Product which has been
modified or operated outside of Intel’s publicly available specifications or where the original product identification
markings (trademark or serial number) have been removed, altered or obliterated from the Product; or (iv) issues
resulting from modification (other than by Intel) of software products provided or included in the Product, (v)
incorporation of software products, other than those software products provided or included in the Product by
Intel, or (vi) failure to apply Intel-supplied modifications or corrections to any software provided with or included
in the Product.
To obtain warranty service for the Product, you may contact your original place of purchase in accordance with its
instructions or you may contact Intel. To request warranty service from Intel, you must contact the Intel Customer
Support ("ICS") center in your region (http://www.intel.com/support/wireless/) within the warranty period during
normal business hours (local time), excluding holidays and return the Product to the designated ICS center. Please
be prepared to provide: (1) your name, mailing address, email address, telephone numbers and, in the USA, valid
credit card information; (2) proof of purchase; (3) model name and product identification number found on the
Product; and (4) an explanation of the problem. The Customer Service Representative may need additional
information from you depending on the nature of the problem. Upon ICS's verification that the Product is eligible
for warranty service, you will be issued a Return Material Authorization ("RMA") number and provided with
instructions for returning the Product to the designated ICS center. When you return the Product to the ICS
center, you must include the RMA number on the outside of the package. Intel will not accept any returned
Product without an RMA number, or that has an invalid RMA number, on the package. You must deliver the
returned Product to the designated ICS center in the original or equivalent packaging, with shipping charges pre-
paid (within the USA), and assume the risk of damage or loss during shipment. Intel may elect to repair or
replace the Product with either a new or reconditioned Product or components, as Intel deems appropriate. The
repaired or replaced product will be shipped to you at the expense of Intel within a reasonable period of time after
receipt of the returned Product by ICS. The returned Product shall become Intel’s property on receipt by ICS. The
replacement product is warranted under this written warranty and is subject to the same limitations of liability and
exclusions for ninety (90) days or the remainder of the original warranty period, whichever is longer. If Intel
replaces the Product, the Limited Warranty period for the replacement Product is not extended.
THIS WARRANTY REPLACES ALL OTHER WARRANTIES FOR THE PRODUCT AND INTEL DISCLAIMS ALL OTHER
WARRANTIES, EXPRESS OR IMPLIED INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT, COURSE OF DEALING AND
USAGE OF TRADE. Some states (or jurisdictions) do not allow the exclusion of implied warranties so this
limitation may not apply to you. ALL EXPRESS AND IMPLIED WARRANTIES ARE LIMITED IN DURATION TO THE
LIMITED WARRANTY PERIOD. NO WARRANTIES APPLY AFTER THAT PERIOD. Some states (or jurisdictions) do
not allow limitations on how long an implied warranty lasts, so this limitation may not apply to you.
LIMITATIONS OF LIABILITY
INTEL’S RESPONSIBILITY UNDER THIS OR ANY OTHER WARRANTY, IMPLIED OR EXPRESS, IS LIMITED TO REPAIR,
REPLACEMENT OR REFUND, AS SET FORTH ABOVE. THESE REMEDIES ARE THE SOLE AND EXCLUSIVE REMEDIES
FOR ANY BREACH OF WARRANTY. TO THE MAXIMUM EXTENT PERMITTED BY LAW, INTEL IS NOT RESPONSIBLE
FOR ANY DIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES RESULTING FROM ANY BREACH OF
WARRANTY OR UNDER ANY OTHER LEGAL THEORY (INCLUDING WITHOUT LIMITATION, LOST PROFITS,
DOWNTIME, LOSS OF GOODWILL, DAMAGE TO OR REPLACEMENT OF EQUIPMENT AND PROPERTY, AND ANY
COSTS OF RECOVERING, REPROGRAMMING, OR REPRODUCING ANY PROGRAM OR DATA STORED IN OR USED
WITH A SYSTEM CONTAINING THE PRODUCT), EVEN IF INTEL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES. Some states (or jurisdictions) do not allow the exclusion or limitation of incidental or
consequential damages, so the above limitations or exclusions may not apply to you. THIS LIMITED
WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS, AND YOU MAY ALSO HAVE OTHER RIGHTS THAT VARY BY STATE
OR JURISDICTION. ANY AND ALL DISPUTES ARISING UNDER OR RELATED TO THIS LIMITED WARRANTY SHALL BE
ADJUDICATED IN THE FOLLOWING FORUMS AND GOVERNED BY THE FOLLOWING LAWS: FOR THE UNITED STATES
OF AMERICA, CANADA, NORTH AMERICA AND SOUTH AMERICA, THE FORUM SHALL BE SANTA CLARA,
CALIFORNIA, USA AND THE APPLICABLE LAW SHALL BE THAT OF THE STATE OF DELAWARE. FOR THE ASIA
PACIFIC REGION (EXCEPT FOR MAINLAND CHINA), THE FORUM SHALL BE SINGAPORE AND THE APPLICABLE LAW
SHALL BE THAT OF SINGAPORE. FOR EUROPE AND THE REST OF THE WORLD, THE FORUM SHALL BE LONDON
AND THE APPLICABLE LAW SHALL BE THAT OF ENGLAND AND WALES IN THE EVENT OF ANY CONFLICT BETWEEN
THE ENGLISH LANGUAGE VERSION AND ANY OTHER TRANSLATED VERSION(S)OF THIS LIMITED WARRANTY
(WITH THE EXCEPTION OF THE SIMPLIFIED CHINESE VERSION), THE ENGLISH LANGUAGE VERSION SHALL
CONTROL.
IMPORTANT! UNLESS OTHERWISE AGREED IN WRITING BY INTEL, THE INTEL PRODUCTS SOLD HEREUNDER ARE
NOT DESIGNED, OR INTENDED FOR USE IN ANY MEDICAL, LIFE SAVING OR LIFE SUSTAINING SYSTEMS,
TRANSPORTATION SYSTEMS, NUCLEAR SYSTEMS, OR FOR ANY OTHER MISSION CRITICAL APPLICATION IN WHICH
THE FAILURE OF THE INTEL PRODUCT COULD CREATE A SITUATION WHERE PERSONAL INJURY OR DEATH MAY
OCCUR.
WEEE
Back to Top
Back to Contents
Trademarks and Disclaimers
Back to Contents
Glossary of Terms
Term Definition
802.11 The 802.11 standard refers to a family of specifications developed by the IEEE for wireless LAN
technology. The 802.11 specifies an over-the-air interface between a wireless client and a base
station or between two wireless clients and provides 1 or 2 Mbps transmission in the 2.4 GHz
band using either frequency hopping spread spectrum (FHSS) or direct sequence spread
spectrum (DSSS).
802.11a The 802.11a standard specifies a maximum data transfer rate of 54 Mbps and an operating
frequency of 5 GHz. The 802.11a standard uses the Orthogonal Frequency Division Multiplexing
(OFDM) transmission method. Additionally, the 802.11a standard supports 802.11 features such
as WEP encryption for security.
802.11b 802.11b is an extension to 802.11 that applies to wireless networks and provides 11 Mbps
transmission (with a fallback to 5.5, 2 and 1 Mbps) in the 2.4 GHz band. 802.11b uses only
DSSS. Throughput data rate 5+ Mbps in the 2.4 GHz band.
802.11g The 802.11g standard specifies a maximum data transfer rate of 54 Mbps, an operating
frequency of 2.4GHz, and WEP encryption for security. 802.11g networks are also referred to as
Wi-Fi* networks.
802.11n A task group of the IEEE 802.11 committee has defined a new draft specification that provides
for increased throughput speeds of up to 540 Mbps. The specification provides for Multiple-
Input-Multiple-Output (MIMO) technology, or using multiple receivers and multiple transmitters
in both the client and access point, to achieve improved performance.
802.1X 802.1X is the IEEE Standard for Port-Based Network Access Control. This is used in conjunction
with EAP methods to provide access control to wired and wireless networks.
AAA Server Authentication, Authorization and Accounting Server. A system to control access to computer
resources and track user activity.
Access Point A device that connects wireless devices to another network. For example, a wireless LAN,
(AP) Internet modem or others.
Ad Hoc A communication configuration in which every computer has the same capabilities, and any
Network computer can initiate a communication session. Also known as a peer-to-peer network, a device
to device network or a computer -to-computer network.
AES-CCMP Advanced Encryption Standard - Counter CBC -MAC Protocol is the new method for privacy
protection of wireless transmissions specified in the IEEE 802.11i standard. AES-CCMP provides
a stronger encryption method than TKIP. The AES algorithm is capable of using cryptographic
keys of 128, 192, and 256 bits to encrypt and decrypt data in 128-bit blocks. AES-CCMP uses
the AES block cipher, but restricts the key length to 128 bits. AES-CCMP incorporates two
sophisticated cryptographic techniques (counter mode and CBC -MAC) to provide improved
security between the mobile client and the access point.
Authentication Verifies the identity of a user logging onto a network. Passwords, digital certificates, smart cards
and biometrics are used to prove the identity of the client to the network. Passwords and digital
certificates are also used to identify the network to the client.
Available One of the networks listed under Available networks on the Wireless Networks tab of the
network Wireless Network Connection Properties (Windows* XP environment). Any wireless network that
is broadcasting and is within receiving range of the WiFi adapter appears on the list.
BER Bit Error Rate. The ratio of errors to the total number of bits being sent in a data transmission
from one location to another.
Bit Rate The total number of bits (ones and zeros) per second that a network connection can support.
Note that this bit rate will vary, under software control, with different signal path conditions.
Broadcast SSID Used to allow an access point to respond to clients on a wireless network by sending probes.
BSSID A unique identifier for each wireless client on a wireless network. The Basic Service Set
Identifier (BSSID) is the Ethernet MAC address of each adapter on the network.
CA (Certificate A corporate certification authority implemented on a server. In addition, Internet Explorer's
Authority) certificate can import a certificate from a file. A trusted CA certificate is stored in the root store.
CCX (Cisco Cisco Compatible Extensions Program ensures that devices used on Cisco wireless LAN
Compatible infrastructure meet the security, management and roaming requirements.
eXtension)
Certificate Used for client authentication. A certificate is registered on the authentication server (for
example, RADIUS server) and used by the authenticator.
CKIP Cisco Key Integrity Protocol (CKIP) is a Cisco proprietary security protocol for encryption in
802.11 media. CKIP uses a key message integrity check and message sequence number to
improve 802.11 security in infrastructure mode. CKIP is Cisco's version of TKIP.
Client computer The computer that gets its Internet connection by sharing either the host computer's connection
or the access point's connection.
DSSS Direct Sequence Spread Spectrum. Technology used in radio transmission. Incompatible with
FHSS.
EAP Short for Extensible Authentication Protocol, EAP sits inside of Point-to-Point Protocol's (PPP)
authentication protocol and provides a generalized framework for several different authentication
methods. EAP is supposed to head off proprietary authentication systems and let everything
from passwords to challenge-response tokens and public-key infrastructure certificates all work
smoothly.
EAP-AKA EAP-AKA (Extensible Authentication Protocol Method for UMTS Authentication and Key
Agreement) is an EAP mechanism for authentication and session key distribution, using the
Universal Mobile Telecommunications System (UMTS) Subscriber Identity Module (USIM). The
USIM card is a special smart card used with cellular networks to validate a given user with the
network.
EAP-FAST EAP-FAST, like EAP-TTLS and PEAP, uses tunneling to protect traffic. The main difference is that
EAP-FAST does not use certificates to authenticate.
Provisioning in EAP-FAST is negotiated solely by the client as the first communication exchange
when EAP-FAST is requested from the server. If the client does not have a pre-shared secret
Protected Access Credential (PAC), it can request to initiate a provisioning EAP-FAST exchange
to dynamically obtain one from the server.
EAP-FAST documents two methods to deliver the PAC: manual delivery through an out-of-band
secure mechanism, and automatic provisioning.
Manual delivery mechanisms can be any delivery mechanism that the administrator of the
network feels is sufficiently secure for their network.
The EAP-FAST method can be divided into two parts: provisioning, and authentication. The
provisioning phase involves the initial delivery of the PAC to the client. This phase only needs to
be performed once per client and user.
EAP-GTC The EAP-GTC (Generic Token Card) is similar to the EAP-OTP except with hardware token cards.
The request contains a displayable message, and the response contains the string read from the
hardware token card.
EAP-OTP EAP-OTP (One -Time Password) is similar to MD5, except it uses the OTP as the response. The
request contains a displayable message. The OTP method is defined in RFC 2289.
EAP-SIM Extensible Authentication Protocol-Subscriber Identity Module (EAP-SIM) authentication can be
used with:
Improved data encryption through the temporal key integrity protocol (TKIP). TKIP uses a
hashing algorithm to scramble the encryption keys and adds an integrity-checking feature
to ensure that the keys have not been tampered with.
WPA is an interim standard that will be replaced with the IEEE's 802.11i standard upon its
completion.
WPA-Personal Wi-Fi Protected Access-Personal provides a level of security in the small network or home
environment.
WPA-PSK (Wi- WPA-PSK mode does not use an authentication server. It can be used with the data encryption
Fi Protected- types WEP or TKIP. WPA-PSK requires configuration of a pre-shared key (PSK). You must enter
Access Pre- a pass phrase or 64 hex characters for a pre-shared key of length 256-bits. The data encryption
Shared Key) key is derived from the PSK.
Back to Top
Back to Contents
Trademarks and Disclaimers