D-Link DWL-7100AP Mobility Aid User Manual


 
4
Introduction
The DWL-7100AP has the newest, strongest and most advanced security features
available today. When used with other 802.11 WPA (Wi-Fi Protected Access) compatible
products in a network with a RADIUS server, the security features include:
WPA: Wi-Fi Protected Access which authorizes and identifies users based on a secret
key that changes automatically at regular intervals. WPA uses TKIP (Temporal Key
Integrity Protocol) to change the temporal key every 10,000 packets (a packet is a kind
of message transmitted over a network.) This ensures much greater security than the
standard WEP security. (By contrast, the previous WEP encryption implementations
required the keys to be changed manually.)
For home users that will not incorporate a RADIUS server in their network, the security
for the DWL-7100AP, used in conjunction with other WPA-compatible 802.11 products,
will still be much stronger than ever before. Utilizing the Pre-Shared Key mode of WPA,
the DWL-7100AP will obtain a new security key every time it connects to the 802.11
network. You only need to input your encryption information once in the configuration
menu. No longer will you have to manually input a new WEP key frequently to ensure
security. With the DWL-7100AP, you will automatically receive a new key every time
you connect, vastly increasing the safety of your communication.
At up to fifteen times the speed of previous wireless devices (up to 108Mbps* in Super
AG mode), you can work faster and more efficiently, increasing productivity. With the
DWL-7100AP, bandwidth-intensive applications like graphics or multimedia will benefit
significantly because large files are able to move across the network quickly.
Inclusion of all three standards (802.11g; 802.11a; 802.11b) means that the DWL-7100AP
is versatile enough to allow connection to almost any 802.11 network or device.
*“Maximum wireless signal rate derived from IEEE Standard 802.11a and 80211g specifications. Actual data
throughput will vary. Network conditions and environmental factors, including volume of network traffic, building
materials and construction, and network overhead lower actual data throughput rate.”