Operating Manual
Appendix
Appendix
Before Using the Optional Wireless L AN
This manual describes the procedures required to properly set up and con¿gure t he optional
integrated W ireless LAN Mini-PCI device (referred to as "WLAN device" in the rest of the
manual). Before using the WLAN device, read th is manual carefully to ensure its correct
operation. Keep this manu al in a safe place for future reference.
Wireless LAN Devices Covered by this Document
This document is applicable to systems containing the following device:
• Intel® Dual Band Wireless-AC – 11a/b/g/
n/11ac
Characteristics of the WLAN Device
• The WLAN devices are PCI Express Mini cards attached to the main board of the mobile computer.
• The WLAN devices operate in license-free RF bands, eliminating the need to procure
an FCC operating license. The WLAN operates in the 2.4GHz Industrial, Scienti¿c,
and Medical (ISM) RF band and the lower, middle, and upper bands of the 5GHz
Unlicensed National Information Infrastructure (UNII) bands.
• The WLAN device is Wi-Fi certi¿ed and operates (as applicable) at the maximum data rate
of 867 Mbps in IEEE802.11ac mode, 450 Mbps in IEEE802.11n m o de (300 Mbps in this
con¿guration); 54 Mbps in IEEE802.11g mode; and 11 Mbps in IEEE802.11b mode.
• The WLAN devices support the following encryption methods - W EP,
TKIP, CKIP, and AES encryption.
• The Wireless LAN devices are compliant with the following standards: WPA,
WPA2, CCX1.0, CCX2.0, CCX3.0, and CCX4.0.
Wireless LAN Modes Using this Device
Ad Hoc Mod
e
"Ad Hoc Mo
de" refers to a wireless network architecture w here wireless network connectivity
between
multiple computers is established without a central wireless network device, typically
known as
Access Point(s). Connectivity is accomplished using only client de vice s in a peer-to-p eer
fashion
. That is why Ad H oc networks are also known as peer-to-peer networks. Ad Hoc
networ
ks a re an easy and inexpensive method for establishing network connectivity betw een
multip
le computers. Ad Hoc mode requires that the SSID, network authentication, and encryption
key set
tings are identically con¿gured on all computers in the Ad Hoc network.
Fujitsu 109