EasyManua.ls Logo

Intermec CK60 - Wireless Network

Intermec CK60
188 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Chapter 5 — Network Support
CK60 Mobile Computer with Windows Mobile User’s Manual 161
Wireless Network
Your wireless adapter (network interface card) connects to wireless
networks of two types: infrastructure networks and ad-hoc networks.
Infrastructure networks get you onto your corporate network and the
internet. Using the 802.11b/g infrastructure mode, the CK60 establishes
a wireless connection to an access point, linking you to the rest of the
network.
Ad-hoc networks are private networks shared between two or more
clients, even with no access point.
Each wireless network is assigned a name (or Service Set Identifier - SSID)
to allow multiple networks to exist in the same area without infringement.
Intermec recommends using security measures with wireless networks to
prevent unauthorized access to your network and to ensure your privacy of
transmitted data. Authentication (cryptographically protected) by both the
network and the user, transmitted data, and encryption are required
elements for secure networks. Schemes are available to implement the
features.
Encryption
AES (Advanced Encryption
Standard)
A block cipher, a type of symmetric key cipher that uses groups of bits of a fixed
length - called blocks. A symmetric key cipher is a cipher using the same key for
both encryption and decryption.
As implemented for wireless, this is also known as CCMP, which implements
AES as TKIP and WEP are implementations of RC4.
CKIP (Cisco Key Integrity
Protocol)
This is Cisco's version of the TKIP protocol, compatible with Cisco Aironet
products.
TKIP (Temporal Key Integrity
Protocol)
This protocol is part of the IEEE 802.11i encryption standard for wireless
LANs., which provides per-packet key mixing, a message integrity check and a
re-keying mechanism, thus overcoming most of the weak points of WEP. This
encryption is more difficult to crack than the standard WEP. Weak points of
WEP include: No Initiation Vector (IV) reuse protection, weak keys, no
protection against message replay, no detection of message tampering, and no key
updates.
WEP (Wired Equivalent Privacy)
encryption
With preconfigured WEP, both the client CK60 and access point are assigned
the same key, which can encrypt all data between the two devices. WEP keys also
authenticate the CK60 to the access point - unless the CK60 can prove it knows
the WEP key, it is not allowed onto the network. WEP keys are only needed if
they are expected by your clients. There are two types available: 64-bit
(5-character strings, 12345) (default) and 128-bit (13-character strings,
1234567890123). Enter these as either ASCII (12345) or Hex (0x3132333435).

Table of Contents

Other manuals for Intermec CK60

Related product manuals