Doc. No. MV-S800477-00, Rev. B
July 18, 2006
Document Classification: Proprietary Information
Not approved by Document Control. For review only.
DRAFT Use Only
Page 2
CB-85/MB-85/EC-85/MC-85
User Guide
Document Conventions
Note
Provides related information or information of special importance.
Caution
Indicates potential damage to hardware or software, or loss of data.
Warning
Indicates a risk of personal injury.
Document Status
Doc Status: 0.00 Technical Publication: 0.x
For more information, visit our website at: www.marvell.com
Disclaimer
This document provides preliminary information about the products described, and such information should not be used for purpose of final design. Visit the Marvell®
web site at www.marvell.com for the latest information on Marvell products.
No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, for any
purpose, without the express written permission of Marvell. Marvell retains the right to make changes to this document at any time, without notice. Marvell makes no
warranty of any kind, expressed or implied, with regard to any information contained in this document, including, but not limited to, the implied warranties of
merchantability or fitness for any particular purpose. Further, Marvell does not warrant the accuracy or completeness of the inform ation, text, graphics, or other items
contained within this document.
Marvell products are not designed for use in life-support equipment or applications that would cause a life-threatening situation if any such products failed. Do not use
Marvell products in these types of equipment or applications.
With respect to the products described herein, the user or recipient, in the absence of appropriate U.S. government authorization, agrees:
1) Not to re-export or release any such information consistin g of technol ogy, software or source code controlled for na tional securit y reasons by th e U.S. Expor t Contro l
Regulations ("EAR"), to a national of EAR Country Groups D:1 or E:2;
2) Not to export the direct product of such technology or such software, to EAR Country Groups D:1 or E:2, if such technology or software and direct products thereof
are controlled for national security reasons by the EAR; and,
3.1.2 Link Information...............................................................................................................................19
3.1.3 Signal Strength / Wireless Mode Indicator ......................................................................................20
3.1.4 Internet Protocol (TCP/IP)........................................... ... .................................................................21
3.1.5 Actual Throughput Performance .....................................................................................................22
3.1.6 Radio On/Off Check Box.................................................................................................................22
Figure 5:Tray Status Icons Window...............................................................................................................15
Section 3. Marvell Configuration Utility User Interface................................................. 17
Figure 6:Network Status Tab......................................................................................................................... 18
Figure 8:Link Information Section .................................................................................................................. 19
Figure 9:Signal Strength Bar .........................................................................................................................20
This document describes the functions of the Marvell Client Card Configuration Utility for the following Marvell®
IEEE 802.11a/g/b and high throughput WLAN client cards:
•Marvell CB-85 CardBus WLAN Client Card
•Marvell MB-85 Mini PCI WLAN Client Card
•Marvell EC-85 PCI Express WLAN Client Card
•Marvell MC-85 PCI E xpress WLAN Client Mini Card
Marvell high throughput client cards are both IEEE 802.11a/g/b and draft-802.11n/EWC compliant.
Notes
•For information on installing the Marvell Configuration Utility, the Marvell client card, and the Marvell
Windows driver, see the CB-85/MB-85/EC-85/MC-85 Installation Guide.
•For a list of acronyms used throughout this document see Appendix B. "Acronyms and Abbreviations"
on page 57.
1.2Wireless Networks
The Marvell client cards operate similar to Ethernet cards, except that a radio replaces the wires between
communication devices. All existing applications that operate over Ethernet operate over a Marvell wireless
network without any modification or need for special wireless networking software. The Marvell client cards
support the following network technologies:
•Ad-Hoc (peer-to-peer group) mode
•Access Point (AP) Infrastructure mode
1.2.1Ad-Hoc Mode
In Ad-Hoc mode (also referred to as peer-to-peer mode), wireless clients send and receive information to other
wireless clients without using an AP. In comparison to Infrastructure mode, this type of WLAN connection only
contains wireless clients. Ad-Hoc mode is useful for establishing a network where wireless infrastructure does not
exist or where services are not required. Two or more computers can establish an Ad-Hoc network when within
range of one another. Each computer dynamically connects to one another without additional configuration.
Ad-Hoc mode is used to connect network computers at home or in small offices. It is also used to set up a
temporary wireless network for meetings.
Not approved by Document Control. For review only.
CONFIDENTIAL
Doc. No. MV-S800477-00 Rev. B
Page 10
CB-85/MB-85/EC-85/MC-85
User Guide
1.2.2Infrastructure Mode
In Infrastructure mode, wireless devices communicate with other wireless devices or devices on the LAN side
wired network through APs. When communicating through wired networks, client cards send and re ceive
information through APs. The AP receives the information and redirects it for clients to then receive the
information.
Access Points are typically strategically located within an area to provide optimal coverage for wireless clients. A
large WLAN uses multiple APs to provide coverage over a wide area. APs connect to a LAN through a wired
Ethernet connection. APs send and receive information from the LAN through this wired connection. Most
corporate WLANs operate in Infrastructure mode because they require access to the wired LAN in order to use
services such as file servers or printers.
The Marvell Client Card Configuration Utility is a Windows® based application that allows configuration and
management of the Marvell high throughput client cards. The Marvell Configuration Utility sets up profiles and
performs other wireless network management tasks. For information on installing the Marvell Configuration Utility
see the Installation Guide.
2.2Windows XP and Windows Server 2003 Users
For Windows XP and Windows Server 2003, either use the Windows Zero Configuration Utility or the Marvell
Configuration Utility to configure the Marvell client card. Both utilities cannot be used at the same time. When
launching the Marvell Configuration Utility, the Marvell Configuration Utility disables the Windows Zero
Configuration Utility automatically. While exiting, the Marvell Configuration Utility recovers the Windows Zero
Configuration Utility.
Note
When using the Marvell Configuration Utility on Windows XP or Windows Server 2003, Marvell
recommends turning off the Windows wireless configuration feature. For further information on this
feature, refer to Windows documentation.
2.2.1Disabling Windows Zero Configuration Utility
To disable the Windows Zero Configuration Utility (if not already disabled while running the setup program for the
Marvell Configuration Utility):
1.From Control Panel, click Network Connections.
2.Right-click the icon for the Marvell client card, and select
3.Click the Wireless Networks tab.
4.Clear the Use Windows to configure my wireless settings check box to disable the Windows Zero
Configuration Utility.
When Windows Zero Configuration Utility is enabled, the Marvell Configuration Utility enters Monitor mode. When
in Monitor mode, the Marvell Configuration Utility has the following properties:
•Limited tab display (Network Status, Statistics, About, and Readme tabs)
•Information reporting only (the utility cannot be used to configure the client card)
Figure 2:Marvell Configuration Utility (Windows Zero Configuration Utility Enabled)
Not approved by Document Control. For review only.
CONFIDENTIAL
Doc. No. MV-S800477-00 Rev. B
Page 16
CB-85/MB-85/EC-85/MC-85
User Guide
2.3Security
Implementing a security infrastructure to monitor physical access to WLAN networks is more difficult than
monitoring access on wired networks. Unlike wired networks where a physical connection is required, anyone
within the range of a wireless AP can send and receiv e frames, as well as listen for frames being sent.
IEEE 802.11 defines a set of standards and protocols for use in minimizing the security risks on wireless networks.
Three of these security standar ds ar e as fo l lo w s:
•802.1x—802.1x authentication provides authenticated access to 802.11 wireless networks and to wired
Ethernet networks. 802.1x minimizes wireless network security risks by providing user and computer identification, centralized authentication, and encryption services based on the Wired Equivalent Privacy (WEP)
algorithm. 802.1x supports the Extensible Authentication Protocol (EAP). EAP allows the use of different
authentication methods, such as smart cards and certificates.
•Wi-Fi Protected Access (WPA)—WPA is a security implementation based on a subset of the 802.11i stan-
dard. WPA provides enhanced security for wireless networks when used with the Temporal Key Integrity Protocol (TKIP) and the Message Integrity Check (MIC) algorithms.
•Wi-Fi Protected Access 2 (WPA2)—Next generation Wi-Fi security, based on the final 802.11i standard.
WPA2 offers the strongest available security in the form of Advanced Encryption Standard (AES) level
encryption, plus faster roaming between APs.
SECURITY CONFIGURATIONS
The Marvell Configuration Utility supports the following security protocols:
Not approved by Document Control. For review only.
CONFIDENTIAL
Doc. No. MV-S800477-00 Rev. B
Page 20
CB-85/MB-85/EC-85/MC-85
User Guide
Table 1:Link Information Section Description (Continued)
FieldDescription
Network TypeType of environment connected to:
•Infrastructure Mode
In this mode, wireless clients send and receive information through APs. When a
wireless client communicates with another, it transmits to the AP. First the AP
receives the information and rebroadcasts it, then other devices receive the information. The APs are strategically located wi thin an area to provide optimal coverage for
wireless clients. A large WLAN uses multiple APs to provide coverage over a wide
area. APs can connect to a LAN through a wired Ethernet connection. APs send and
receive information from the LAN through the wired connection.
•Ad-Hoc Mode
In this mode, wireless clients send and receive information to other wireless clients
without using an AP. This type of WLAN only contains wireless clients. Use Ad-Hoc
mode to connect network computers at home or in small office, or to set up a temporary wireless network for a meeting.
Network BSSIDNetwork Basic Service Set Identifier. The BSSID is a 48-bit identity used to identify a par-
ticular BSS within an area. In Infrastructure BSS networks, the BSSID is the MAC
address of the AP. In independent BSS or Ad-Hoc networks, the BSSID is generated randomly.
SecurityReports the type and level of security set. The security level is set through the Profile
Setting of the Profile Manager tab. Configure security settings also through the Site
Survey tab when connecting to a network.
Tx/Rx RatesCurrent Tx Rate and Rx Rate of the channel being monitored.
3.1.3Signal Strength / Wireless Mode Indicator
The color-coded Signal Strength bar displays the signal strength of the last packet received by the client card.
Figure 9:Signal Strength Bar
a means connected to an 802.11a capable AP
b means connected to an 802.11b capable AP
g means connected to an 802.11g capable AP
Signal strength is reported as a percentage. A signal in the red indicates a bad connection. A signal in the green
indicates a good connection.
The Wireless Mode indicator shows the data rates the client card operates. There are three modes:
•802.11a
•802.11b
•802.11g (backward compatible to 802.11b)
3.1.4Internet Protocol (TCP/IP)
The Internet Protocol specifies the format of packets, also called datagrams, and the addressing scheme. Most
networks combine IP with a higher-level protocol called TCP, which establishes a virtual connection between a
destination and a source.
Figure 10: Internet Protocol Section
Table 2:Internet Protocol Section Description
FieldDescription
DHCP OptionDynamic Host Configuration Protocol. Either enabled or disabled.
IP AddressAn identifier for a computer or device on a TCP/IP network. The format of an IP address
is a 32-bit numeric address written as four numbers separated by periods. Each number
can be 0 t o 255.
Subnet MaskA mask used to determine what subnet an IP address belongs to. An IP address has two
components, the network address and the host address. The first two numbers represent
the Class B network address, and the second two numbers identify a particular host on
this network.
Default GatewayThe default node on a network that serves as an entrance to another network. In
enterprises, the gateway is the computer that routes the traffic from a workstation to the
outside network that is serving the Web pages. In homes, the gateway is the ISP that
connects the user to the Internet.
Not approved by Document Control. For review only.
CONFIDENTIAL
Doc. No. MV-S800477-00 Rev. B
Page 22
CB-85/MB-85/EC-85/MC-85
User Guide
3.1.5Actual Throughput Performance
This section of the Network Status tab displays the Current Tx Rate and the Current Rx Rate of the channel
being monitored.
Figure 11: Actual Throughput Performance Section
Note
These are actual throughput diagrams (without the WLAN overhead delivered by the client card).
3.1.6Radio On/Off Check Box
Selecting the Radio Off check box turns off the radio. Clearing the check box turns on the radio.
Figure 12: Radio On/Off Check Box
Another way to turn the radio on or off is to right-click the Configuration Utility icon in System Tray and select
Turn Radio Off to turn the radio off. When the radio is off, select Turn Radio On to turn the radio back on.
Figure 13: Radio On/Off in the System Tray
The system hot key Alt+F2 can also be used to turn the radio on/off.
When the radio is off, there is no radio activity, and the following tabs are disabled:
Not approved by Document Control. For review only.
CONFIDENTIAL
Doc. No. MV-S800477-00 Rev. B
Page 24
CB-85/MB-85/EC-85/MC-85
User Guide
PROFILE MANAGER—PROFILE LIST
The section on the left side of this tab lists all of the profiles available. Highlighting a profile selects it. If the check
box next to the profile is selected, that profile is used in auto-configuration mode when the link is lost. If it is not
selected, that profile is excluded in auto-configuration. The buttons associated with this window are as follows.
Table 3:Profile List Section Description
ButtonDescription
Apply ProfileApplies the profile selected.
Apply the profile by double-clicking the desired profile.
Move Up / DownMoves the list up and down in the window.
All profiles with the Network Type set to Infrastructure are displayed before the profiles
with the Network Type set to Ad-Hoc. In auto-configuration mode, the selected profiles at
the top of the list have higher priority than selected profiles at the bottom of the list.
DeleteDeletes a profile
CreateCreates a profile
SaveSaves changes made to a selected profile
PROFILE MANAGER—PROFILE SETTING
The Profile Settings are used to set, modify, and display information about the profile selected in the Profile List
section. The information is divided into three tabs:
If enabled, the Modulation and Coding Scheme (MCS) index and 802.11n options can
be configured.
Channel WidthSets the channel bandwidth. Available options are Auto, 20 MHz, and 40 MHz.
The default is Auto.
Guard IntervalSets the Guard Interval. Available options are Auto, Standard, and Short.
The default is Auto.
Extension ChannelSets the extension channel mode when bandwidth is 40 MHz. Available options are
Auto, None, Lower, and Upper. The default is Auto.
Antenna SelectionSets the antenna selections. Available options are Auto, Antenna A, Antenna B, 2 by 2,
and 2 b y 3. The default is Auto.
Note
The fields Wireless Mode and Preferred Channel are used only when an Ad-Hoc network is started by
the client card. These two attributes are ignored if the client card is connected to an existing Ad-Hoc
network with the same desired SSID.
Login NameLogin name to the RADIUS server
CertificateCertificate selected for authentication
ViewShows the selected certificate
BrowseSelects the certificate
3.2.2.2.3 802.1X/WPA/WPA2 PEAP SUPPORT IN INFRASTRUCTURE MODE
To connect to an AP through the RADIUS server , select 802.1x/WPA/WP A2 as the Authentication Mode, PEAP as
the Authentication Protocol, and AES or TKIP as the Encryption Method.
Login NameLogin name to the RADIUS server
PasswordPassword to login to the RADIUS server
DomainDomain name for login to the RADIUS server (optional)
Inner EAP ProtocolUse EAP/MS-CHAP V2 or EAP/GTC to login to the RADIUS server
Click OK to set the configuration.
3.2.2.2.4 WPA/WPA2 EAP/TTLS
To connect to an AP through the RADIUS server, select WPA/WPA2 as the Authentication Mode, TTLS as the
802.1x Authentication Protocol, and TKIP as the Encryption Method for WPA TTLS or AES as the Encryption
Method for WPA2 TTLS.
Figure 26: WPA/WPA2 EAP/TTLS Authentication
Clicking the Configure WPA RADIUS button displ ays the WPA EAP/TTLS RADIUS Configuration window.
Enter all the required information.
Inner Authentication ProtocolCurrently supports EAP/MS-CHAP V2 only
Anonymous NameIndicates the identity of the authentication server with which to make contact
Login NameLogin name to the RADIUS server
PasswordPassword to login to the RADIUS server
DomainDomain name for login to the RADIUS server (optional)
Login NameLogin name to the RADIUS server
PasswordPassword to login to the RADIUS server
DomainDomain name for login to the RADIUS server (optional)
Click OK to set the configuration.
3.2.2.3Encryption Methods
The following encryption methods are available, depending on the authentication mode:
•Security Off
•WEP
•TKIP
•AES
Profile Manager Tab
3.2.2.4WEP Key Settings
If the WEP Encryption Method is selected, the Security tab displays the WEP Key Setting. To configure the WEP
keys, select the WEP Key Setting, and click the Configure WEP Keys button.
Note
The WEP key used for the transmission must be identical on the sending and the receiving station.
Figure 30: Security Tab—WEP Key Settings
Clicking the Configure WEP Keys button displays the Configure WEP Key window. Enter all the required
information.
If TKIP/AES is selected and the Authentication Mode is WPA-PSK or WPA2-PSK, the security tab displays the
TKIP/AES passphrase settings. Enter the passphrase into the Passphrase and Confirm boxes, and click OK.
Figure 32: TKIP/AES Settings
Currently, only the functions WPA-PSK + TKIP and WP A2-PSK + AES are available. There is no such combination
as WPA-PSK + AES or WPA2-PSK + TKIP.
3.2.3Profile Setting—Protocol Tab
The Protocol tab allows you to set or change the protocol information.
Not approved by Document Control. For review only.
CONFIDENTIAL
Doc. No. MV-S800477-00 Rev. B
Page 40
CB-85/MB-85/EC-85/MC-85
A
User Guide
3.3.2Site Survey—List of Detected Stations
This section reports information on the peer-to-peer (Ad-Hoc) stations or AP stations detected.
Figure 35: Site Survey—List of Detected Stations
802.11g AP Icon
d-Hoc Network
802.11b AP Icon
802.11a AP Icon
Circle means
connected
Table 11:List of Detected Stations Description
FieldDescription
Network SSIDNetwork SSID label (i.e., the Network Name). The Network Name is a text string.
MAC AddressMAC address, a hardware address that uniquely identifies each node of a
network
SecuritySecurity enabled or disabled
CHChannel used by the detected device
SignalSignal strength of the detected device as a percentage
IconsThe following icons may be displayed left of the Network SSID:
•An antenna icon with a subscript a indicates an 802.11a AP.
•An antenna icon with a subscript b indicates an 802.11b AP.
•An antenna icon with a subscript g indicates an 802.11g AP.
•A circle around the antenna icon means the client card is connected to this
network.
•A slash icon indicates an Ad-Hoc network.
WMMWireless Multimedia Enhancements (WMM) supported by the detected device
EWC Draft-802.11n/EWC functionality supported by the detected device
Network TypeType of environment connected to: Ad-Hoc or Infrastructure
Not approved by Document Control. For review only.
CONFIDENTIAL
Doc. No. MV-S800477-00 Rev. B
Page 42
CB-85/MB-85/EC-85/MC-85
User Guide
3.3.5Site Survey—Associate Button
Select an available network, and then click the Associate button to establish a connection. Alternatively, the connection can be established by double-clicking the selected network.
3.4Statistics Tab
Clicking the Statistics tab displays the statistics of the current connect session.
Figure 37: Statistics Tab
3.4.1Signal Strength
The color-coded Signal Strength bar displays the signal strength of the last packet received by the client card.
Signal strength is reported as a percentage. A signal in the red indicates a bad connection. A signal in the green
indicates a good connection.
The Transmit section displays the information on the packets sent.
Figure 38: Transmit Section
Table 12:Transmit Section Description
Statistics Tab
FieldDescription
Total PacketReports the total number of packets transmitted
Unicast PacketReports the number of packets transmitted by the client card that were destined
for a single network node
Multicast PacketReports the number of packets transmitted by the client card that were destined
for more than one network node
Single RetriesReports the number of packets that require one retry before the client card
received an acknowledgement.
NOTE:After the client card sends a packet, it waits for an acknowledge from the
receiving radio to confirm that the packet was successfully received. If the
acknowledge is not received within a specified period of time, the client
card retransmits the packet.
Multiple RetriesReports the number of packets that require more than one retry before the client
card received an acknowledgement
Failed CountReports the number of packets that were not successfully transmitted because
the client card did not receive an acknowledge within the specified period of time
RTS SuccessReports the number of RTS attempts that were successful
RTS FailureReports the number of RTS attempts that were not successful
ACK ErrorReports the number of unicast transmit attempts for which no acknowledgement
Not approved by Document Control. For review only.
CONFIDENTIAL
Doc. No. MV-S800477-00 Rev. B
Page 44
CB-85/MB-85/EC-85/MC-85
User Guide
3.4.3Receive Section
The Receive section displays the information on the packets received.
Figure 39: Receive Section
Table 13:Receive Section Description
FieldDescription
Total PacketReports the total number of packets received
Unicast PacketReports the number of packets received by the client card that were destined for
a single network node
Multicast PacketReports the number of packets received by the client card that were destined for
more than one network node
Duplicate FrameReports the number of duplicate frames received
Received BeaconsReports the number of beacons received after association is established
Beacon LossReports the number of missing beacons after association is established
Federal Communications Commission (FCC) Compliance
Appendix A.Compliance Statements
A.1Federal Communications Commission (FCC)
Compliance
Transmitter Module Approval Conditions
1.Antennas must be installed to provide 20 cm separation distance from the transmitting antenna to the body of
the user during normal operating condition. This device must not be co-located or operating in conjunction
with any other antenna or transmitter.
2.Only those antennas filed under FCC ID:UAY-MMC85M can be used with this device.
3.When the module is installed in the final system where the antenna location is less than 20 cm separation
distance to the body of user, additional equipment authorization must be applied.
4.FCC ID label on the final system must be labeled with "Contains FCC ID:UAY-MMC85M" or "Contains
transmitter module FCC ID:UAY-MMC85M".
5.In the user manual, final system integrator must be ensure that there is no instruction provided in the user
manual to install or remove the transmitter module.
6.The transmitter module must be installed and used in strict accordance with the manufacturer's instructions
as described in the user documentation that comes with the product. This device complies with the following
radio frequency and safety standards.
USA-Federal Communications Commission (FCC)
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to
Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in
a residential installation. This equipment generates, uses, and can radiate radio frequency energy. If not installed
and used in accordance with the instructions, it may cause harmful interference to radio communications.
However, there is no guarantee that interference will not occur in a particular installation.
If this equipment does cause harmful interference to radio or television reception, which can be determined by tuning the equipment off and on, the user is encouraged to try and correct the interference by one or more of the following measures:
•Reorient or relocate the receiving antenna.
•Increase the distance between the equipment and the receiver.
•Connect the equipment to outlet on a circuit different from that to which the receiver is connected.
•Consult the dealer or an experienced radio/TV technician for help.
Any changes or modifications not expressly approved by the party responsible for compliance could void the
user's authority to operate the equipment.
Not approved by Document Control. For review only.
CONFIDENTIAL
Doc. No. MV-S800477-00 Rev. B
Page 54
CB-85/MB-85/EC-85/MC-85
User Guide
Caution
This device is restricted to indoor use due to its operation in the 5.15 to 5.25 GHz frequency range. FCC
requires this product to be used indoors for frequency range 5.15 to 5.25 GHz to reduce the potential for
harmful interference to co-channel mobile satellite systems.
High power radars are allocated as primary users of the 5.25 to 5.35 GHz and 5.65 to 5.85 GHz bands.
These radar stations can cause interference with and/or damage this device.
Caution
Exposure to Radio Frequency Radiation
To comply with FCC RF exposure compliance requirements, a separation distance of at least 20 cm must
be maintained between the antenna of this device and all persons. This device must not be co-located or
operating in conjunction with any other antenna or transmitter.
A.2Industry Canada Notice
This device complies with Canadian RSS-210.
"This Class B digital apparatus complies with Canadian ICES-003"
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada
Operation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device
must accept any interference, including interference that may cause undesired operation of this device."
L'utilisation de ce dispositif est autorisée seulement aux conditions suivantes : (1) il ne doit pas produire de
brouillage et (2) l'utilisateur du dispositif doit étre prêt à accepter tout brouillage radioélectrique reçu, même si ce
brouillage est susceptible de compromettre le fonctionnement du dispositif.
The term "IC" before the equipment certification number only signifies that the Industry Canada technical
specifications were met.
To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the
equivalent isotropically radiated power (EIRP) is not more than that required for successful communication.
To prevent radio interference to the licensed service, this device is intended to be operated indoors and away from
windows to provide maximum shielding. Equipment (or its transmit antenna) that is installed outdoors is subject to
licensing.
This equipment is marked with the 0984 symbol and can be used throughout the European
community.
This indicates compliance with the R&TTE Directive 1999/5/EC and meets the relevant parts of following technical
specifications:
•EN 301 893 – Broadband Radio Access Networks (BRAN); 5 GHz high performance RLAN; Harmonized EN
covering essential requirements of article 3.2 of the R&TTE Directive.
•EN 300 328-2 – Electromagnetic compatibility and Radio spectrum Matters (ERM); Wideband Transmission
systems; data transmission equipment operating in the 2,4 GHz ISM band and using spread spectrum modulation techniques
•EN 301 489-17 – Electromagnetic compatibility and Radio Spectrum Matters (ERM); Electromagnetic Com-
patibility (EMC) standard for radio equipment and services; Part 17: Specific conditions for 2.4 GHz wideband
transmission systems and 5 GHz high performance RLAN equipment.
•EN 60950 – Safety of information technology equipment, including electrical business equipment. Marking by
the symbol: ! indicates that usage restrictions apply.
Marking by the symbol indicates that usage restrictions apply.
AESAdvanced Encryption Standard
APAccess Point
BRANBroadband Radio Access Networks
BSSBasic Service Set
BSSIDBasic Service Set ID
CCKMCisco Centralized Key Management
CCXCisco Compatible eXtensions
CEConformité Européenne (European Conformity)
CTSClear to Send
DFSDynamic Frequency Selection
DHCPDynamic Host Configuration Protocol
EAPExtensible Authentication Protocol
ECEuropean Community
EIRPEquivalent Isotropically Radiated Power
EMCElectromagnetic Compatibility
ENEuropean Standard
ERMElectromagnetic compatibility and Radio spectrum Matters
EWCEnhanced Wireless Consortium
FCCFederal Communications Commission
ICESInterference-Causing Equipment Standard
IEEEInstitute of Electrical and Electronics Engineers
IPInternet Protocol
ISMIndustrial, Scientific, and Medical appli cations (of radio)
LANLocal Area Network
LEAPLight EAP
ICIndustry Canada
MACMedium Access Controller
MbpsMegabits per second
MCSModulation and Coding Scheme
MICMessage Integrity Check
MIMOMultiple Input Multiple Output