ALCON AOU-2410 User Manual Download Page 33

http://www.alcon.tw 

 

 

33 

Appendix A: Specification

 

 

Standards Compliance

 

IEEE 802.11b/g, 802.11 draft n 2.0, USB 2.0 

Chipsets Solution

 

RT3070L 

Modulation

 

IEEE802.11b: CCK,DQPSK,DBPSK 

IEEE802.11g: OFDM with BPSK, QPSK, 16QAM, 

64QAM 

IEEE802.11n draft 2.0:

 

Frequency Band

 

America/FCC

2.412~2.462 GHz (11 channels) 

Europe CE/ETSI

2.412~2.472 GHz (13 channels) 

Japan : 2.412~2.484 GHz (14 channels) 

Transmission Power

 

20~30dBm (100mW~1W) adjustable 

Transmission Rate

 

IEEE802.11b: 1/2/5.5/11 Mbps 

IEEE802.11g: 6/9/12/18/24/36/48/54 Mbps 

IEEE802.11n draft 2.0: 150 Mbps 

Access Protocol

 

CSMA/CA

 

Sensitivity 

-91dBm @ 11Mbps, PER < 8% packet size 1024; 

-76dBm @ 54Mbps, PER < 10% packet size 1024; 

-76

±

2dBm @ 65Mbps: 802.11n(20MHz); -74

±

2dBm 

@ 135Mbps: 802.11n(40MHz); 

Frequency Stability 

With 

±

10ppm 

Antenna Type

 

External 7dBi Dipole Antenna(Optional) 

Security Systems

 

64/128-bit WEP,WPA-PSK,WPA2-PSK,802.1X and 

Cisco CCX support WPS PIN/PBC 

USB 

USB 2.0 with 5m cable 

Temperature 

32~122°F (0 ~50°C) 

Network Management   

System OS Support

 

Windows 2000/ XP32-64/ Vista32-64/ Macintosh/ 

Linux

 

Warranty

 

One year limited 

 

 

Summary of Contents for AOU-2410

Page 1: ...http www alcon tw 1 Long Range 802 11b g n USB Adapter for OUTDOOR use User Manual Revision 1 0...

Page 2: ...http www alcon tw 2 U Note Make sure there are antennas installed on each unit otherwise the RF will be damaged when power is on...

Page 3: ...turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation...

Page 4: ...he correct configuration steps to get your device up and running Before you begin You must have at least the following A laptop computer Desktop PC with an available 32 bit USB port At least a 300MHz...

Page 5: ...ww alcon tw 5 6 If you wish to install the driver with utility software recommended select Install driver and Ralink WLAN Utility If you wish to install driver only click Install driver only and click...

Page 6: ...use the software included with the adapter recommended select Install driver and Ralink Configuration Tool and click Next If you wish to use your system s wireless network wizard select Microsoft Zer...

Page 7: ...l the driver and configuration utility 9 If a restart is required select Yes to restart my computer now to restart the computer after the installation or select No to restart the computer at a later t...

Page 8: ...http www alcon tw 8...

Page 9: ...be installed automatically Wireless adapter configuration A configuration application is installed with adapter drivers The application s icon is displayed in the system tray next to the clock and it...

Page 10: ...ireless network Authentication Authentication method by wireless network Encryption Encryption method by wireless network Network Type Ad hoc Connection peer to peer with other wireless adapter Infras...

Page 11: ...ots The profile can be activated as required Profile List This list contains configured profiles profile name SSID information Icons on the list means as below Add Click Add to create a new profile Ed...

Page 12: ...er communications between two wireless network devices TX Power Set the signal transmit power to be used by the radio transmitter Choose the appropriate value from the drop down list Preamble Select t...

Page 13: ...keys and supports two way authentications WPA and WPA2 IEEE 802 1x protocol is used for authentication and AES or TKIP for encryption WPA PSK and WPA2 PSK Station requesting authentication must provi...

Page 14: ...nd WPA2 Authentication Change authentication method Encryption Select the encryption method to be used AES Advanced Encryption System uses symmetrical 128 bit data block encryption TKIP Temporal Key I...

Page 15: ...d Encryption System uses symmetrical 128 bit data block encryption TKIP Temporal Key Integrity protocol uses stronger encryption algorithms and MIC Message Integrity Check to provide security against...

Page 16: ...ications between the WLAN client and the AP TTLS Tunnel Transport Layer Security This security method provides for certificate based mutual authentication of the client and network through an encrypte...

Page 17: ...ication method Session Resumption Enable disable session resumption Authentication ID Password Identity Password and Domain Name for server Only EAP FAST authentication can key in domain name Domain n...

Page 18: ...ate below this list Server Certificate Tab Use certificate chain Enable this option to enable the certification feature and select the certificate issue Allow intermediate certificates Select this opt...

Page 19: ...authentication to authenticate now It causes to continue with the establishment of the inner tunnel even through it is made with an unknown server Use protected authentication credential During the PA...

Page 20: ...roadcast on AP is disabled network type icon infrastructure or Ad hoc and used channel supported 802 11 standards i e 802 11g security and signal strength Double click on network to display detailed n...

Page 21: ...equency used by this network Network Type Infrastructure or Ad Hoc Beacon Interval Interval for sending beacon to sustain connection WPS Tab Information on WPS Wi Fi Protected Setup Authentication Typ...

Page 22: ...ute Walk Time Value Description 0x0000 Default PIN 0x0001 User specified 0x0002 Rekey 0x0003 Display 0x0004 Push Button PBC 0x0005 Registrar specified 0x0006 0x000F Integrated NFC Token Selected Regis...

Page 23: ...regarding CCX Cisco Compatible eXtensions supported by AP 802 11n Tab Detailed information about APs support of 802 11n protocol and its functions FALSE value means the function is not supported or d...

Page 24: ...alog When you connect AP with authentication choose whether show Authentication Status Dialog or not It displays the process about 802 1 x authentications Select Your Country Region Code The item sele...

Page 25: ...ceive acknowledgement after all retries RTS Frames Successfully Receive CTS shows the number of RTS Request To Send frames which received responses in the form of CTS Clear To Send frames RTS Frames F...

Page 26: ...rs Frames Dropped Due To Out of Resource shows the number of frames dropped due to resource issue Duplication Frames Received show the number of duplicate frames received Reset Counter Click this butt...

Page 27: ...WMM Power Save Enable Enable WMM Power Save and select ACs AC_BK background AC_BE best effort AC_VI Video AC_VO Voice Direct Link Setup Enable Enable DLS Direct Link Setup MAC address MAC Address of r...

Page 28: ...ed network List information includes Authentication Type Encryption Type Config Methods Device Password ID Selected Registrar State Version AP Setup Locked UUID E and RF Bands Details can be found in...

Page 29: ...ect any non security AP PIN Start to add to Registrar using PIN configuration method If STA Registrar remember that enter PIN Code read from your Enrollee before starting PIN PBC Start to add to Regis...

Page 30: ...Network BSSID in credential Authentication Type Authentication used by network in credential Encryption Type Encryption used by network in credential Key Length Encryption Key length Key Index Encryp...

Page 31: ...1 The Wireless USB Adapter does not work properly Reinsert the Wireless Adapter into your PC s USB port Right click on My Computer and select Properties Select the device manger and click on Network...

Page 32: ...ter or AP to see if they are functioning properly If not check if the AC power and Ethernet cable are firmly connected Check the IP address subnet mask gateway and DNS settings are correctly entered f...

Page 33: ...Transmission Rate IEEE802 11b 1 2 5 5 11 Mbps IEEE802 11g 6 9 12 18 24 36 48 54 Mbps IEEE802 11n draft 2 0 150 Mbps Access Protocol CSMA CA Sensitivity 91dBm 11Mbps PER 8 packet size 1024 76dBm 54Mbps...

Reviews: