background image

 

 

CNet Technology Inc. 

www.CNet.com.tw 

21. Wi-Fi Protected Access (WPA) 

The Wi-Fi Alliance put together WPA as a data encryption method for 802.11 wireless LANs. WPA is an indus-
try-supported, pre-standard version of 802.11i utilizing the Temporal Key Integrity Protocol (TKIP), which fixes 
the problems of WEP, including using dynamic keys. 

22. Wide Area Network (WAN) 

A  WAN  consists  of  multiple  LANs  that  are  tied  together  via  telephone  services  and  /  or  fiber  optic  cabling. 
WANs may span a city, a state, a country, or even the world 

23. Wired Equivalent Privacy (WEP) 

Now widely recognized as flawed, WEP was a data encryption method used to protect the transmission between 
802.11  wireless  clients  and  APs.  However,  it  used  the  same  key  among  all  communicating  devices.  WEP’s 
problems  are  well-known,  including  an  insufficient  key  length  and  no  automated  method  for  distributing  the 
keys. WEP can be easily cracked in a couple of hours with off-the-shelf tools. 

24. Wireless LAN (WLAN) 

A  wireless  LAN  does  not  use  cable  to  transmit  signals,  but  rather  uses  radio  or  infrared  to  transmit  packets 
through the air. Radio Frequency (RF) and infrared are the commonly used types of wireless transmission. Most 
wireless LANs use spread spectrum technology.  It offers limited bandwidth, usually under 11Mbps, and users 
share the bandwidth with other devices in the spectrum; however, users can operate a spread spectrum device 
without licensing from the Federal Communications Commission (FCC). 

25. Fragment Threshold 

The  proposed  protocol  uses  the  frame  fragmentation  mechanism  defined  in  IEEE  802.11  to  achieve  parallel 
transmissions. A large data frame is fragmented into several fragments each of size equal to fragment threshold. 
By  tuning  the  fragment  threshold  value,  we can  get  varying  fragment  sizes. The  determination  of  an  efficient 
fragment threshold is an important issue in this scheme. If the fragment threshold is small, the overlap part of 
the master and parallel transmissions is large.   

This means the spatial reuse ratio of parallel transmissions is high. In contrast, with a large fragment threshold, 
the overlap is small and the spatial reuse ratio is low. However high fragment threshold leads to low fragment 
overhead.  Hence  there  is a  trade-off  between spatial  re-use  and  fragment  overhead.  Fragment  threshold  is  the 
maximum  packet  size  used  for  fragmentation.  Packets  larger  than  the  size  programmed  in  this  field  will  be 
fragmented If you find that your corrupted packets or asymmetric packet reception (all send packets, for exam-
ple).  You  may  want  to  try  lowering  your  fragmentation  threshold.  This  will  cause  packets  to  be  broken  into 
smaller fragments. These small fragments, if corrupted, can be resent faster than a larger fragment. Fragmenta-
tion increases overhead, so you'll want to keep this value as close to the maximum value as possible. 

26. RTS (Request To Send) Threshold 

The RTS threshold is the packet size at which packet transmission is governed by the RTS/CTS transaction. The 
IEEE802.11-1997 standard allows for short packets to be transmitted without RTS/CTS transactions. Each sta-
tion can have a different RTS threshold. RTS/CTS is used when the data packet size exceeds the defined RTS 
threshold. With the CSMA/CA transmission mechanism, the transmitting station sends out an RTS packet to the 
receiving station, and waits for the receiving station to send back a CTS (Clear to Send) packet before sending 
the actual packet data. This setting is useful for networks with many clients. With many clients, and a high net-
work load, there will be many more collisions. By lowering the RTS threshold, there may be fewer collisions, 
and performance should improve. Basically, with a faster RTS threshold, the system can recover from problems 
faster. RTS packets consume valuable bandwidth, however, so setting this value too low will limit performance.   

27. Beacon Interval 

Summary of Contents for WNUD1150H

Page 1: ...CNet Technology Inc www CNet com tw User Manual Wireless N USB Dongle Model WNUD1150H...

Page 2: ...ista 7 2 3 Windows 7 10 3 Wireless Network Configuration 13 3 1 Utility Icon 13 3 2 Client Mode 13 3 2 1 Wireless Device Control 13 3 2 2 General Setting 14 3 2 3 Profile Setting 15 3 2 4 Available Ne...

Page 3: ...icate with WLAN Dongle BEFORE YOU START 1 Contents confirmation Wireless LAN USB Dongle Driver CD CONNECTING YOUR WLAN Dongle TO PC 2 Connect your WLAN USB dongle to your PC after the driver installat...

Page 4: ...CNet Technology Inc www CNet com tw Step 2 Welcome Installation dialog prompt shown Click Next to continue Click Cancel to close installation Installing and configuring WLAN utility...

Page 5: ...CNet Technology Inc www CNet com tw Step 3 Click Install...

Page 6: ...CNet Technology Inc www CNet com tw Step 4 Click Finish to complete installation...

Page 7: ...CD into your CD ROM Installation program will prompt language setup Choose the Setup Language you would like to use and click Next button Step 2 Welcome Installation dialog prompt shown Click Next to...

Page 8: ...CNet Technology Inc www CNet com tw Step 3 Click Install Step 4 Click Finish to complete installation...

Page 9: ...CNet Technology Inc www CNet com tw...

Page 10: ...D into your CD ROM Installation program will prompt language setup Choose the Setup Language you would like to use and click Next button Step 2 Welcome Installation dialog prompt shown Click Next to c...

Page 11: ...CNet Technology Inc www CNet com tw Step 3 Click Install Step 4 Click Finish to complete installation...

Page 12: ...CNet Technology Inc www CNet com tw...

Page 13: ...the Windows System Tray automatically 3 1 Utility Icon Client mode utility running but no WLAN Adapter plugged Client mode utility running and WLAN Adapter scan available network Client mode utility...

Page 14: ...rk The signal strength and link quality are displayed also The bar graph displays the quality and strength of the link between the node and its Access Point Link Quality is a measurement of re ceiving...

Page 15: ...gy Inc www CNet com tw 3 2 3 Profile Setting In profile tab you can Add Remove Edit Duplicate and Set Default to manipulate profile content manually Strongly recommend to use profile after you do Avai...

Page 16: ...tab and it will show all available networks that radio can reaches Select proper SSID BSSID you want to connect Click Refresh button to force and rescan available networks currently Select one of SSID...

Page 17: ...CNet Technology Inc www CNet com tw In this page you can edit your profile name configure wireless security like WEP WPA WPA2 802 1x etc After finishing setup click OK button to save configuration...

Page 18: ...CNet Technology Inc www CNet com tw 3 2 5 Status In this page it shows all wireless networking and device driver version in details...

Page 19: ...et Technology Inc www CNet com tw 3 2 6 Statistics Statistics page tab will show real time TX RX relative counters to check or evaluate the wireless performance Click Reset button to set counter to ze...

Page 20: ...CNet Technology Inc www CNet com tw 3 2 7 Wi Fi Protected Setup There is an easy and secure setup solution for Wi Fi network You can choose PIN Code or Push Button method to connect to an AP...

Page 21: ...appear in your icon tray Remedy Make sure that you have installed the Utility from the attached CD Symptom The PC Card is linking but can t share files with others Remedy Make sure the file and print...

Page 22: ...uence spreads the data over one frequency range channel while frequency hop ping jumps from one narrow frequency band to another many times per second 7 ESSID An Infrastructure configuration could als...

Page 23: ...o clients on the network In networks with Static IP address the network administrator manually assigns an IP address to each computer Once a Static IP address is assigned a computer uses the same IP a...

Page 24: ...is an important issue in this scheme If the fragment threshold is small the overlap part of the master and parallel transmissions is large This means the spatial reuse ratio of parallel transmissions...

Page 25: ...ble is 128 bits and the short is 56 bits 29 WPA2 It is the second generation of WPA WPA2 is based on the final IEEE 802 11i amendment to the 802 11 stand ard 30 Temporal Key Integrity Protocol TKIP Th...

Reviews: