D-Link DIR-875 User Manual Download Page 6

Configuration 
The Configuration function helps you to configure the Network and the Security. 

 

Network: the setting of the Network mode, the SSID and the Channels. 

 

Network Mode:  

If you want to connect with an Access Point, please set to “Infrastructure” mode. If 

you  have  more  stations  and  just  want  to  set  them  as  local  network,  please  set  the 

mode to “Ad-Hoc” mode. 

 

Network SSID: 

The SSID differentiates one Wireless LAN group name from another; so all access 

points  and  all  devices  attempting  to  connect  to  a  specific  Wireless  LAN  group 

name  must  use  the  same  SSID.  A  device  will  not  be  permitted  to  join  the  BSS 

unless it can provide the unique SSID. 
If the SSID parameter is “ANY”, it will detect the strongest signal of the wireless 

station. 

 

Channel: 

It shows radio channel numbers that used for Wireless LAN networking.  
The channel number can be set only under the Ad-Hoc operation mode. In Ad-Hoc 
mode stations, each station must have the same channel numbers and SSID.  
In Infrastructure mode, the Wireless mini-PCI Adapter will automatically detect the 

channel number of the Access Point. 
Security: the setting of the Network Encryption. 
This  function  is  used  to  protect  wireless  communication  from  eavesdropping.  A 

secondary  function  of  encryption  is  to  prevent  unauthorized  access  to  a  wireless 

network, and it can be achieved by using the Encryption function. 

 

Encryption Mode:  

There are two kinds of encryption mode, WEP encryption and WPA-PSK
Click the Enable Encryption to activate the security of the mini-PCI Adapter. 

WEP-Key:  WEP  (Wired  Equivalent  Privacy)  relies  on  a  secret  key  that  is 
shared between a mobile station and a base station (Access Point). 
WEP-Passphrase:  the  Passphrase  in  the  dialog  box  helps  you  to  create  a 
group of WEP key in the Key Setting. 

 

Authentication Mode:  

Open  System:  with  the  same  WEP  key  between  the  stations,  the  stations 
don’t need to be authenticated, and this algorithm was set to default. 
Shared  Key:  with  the  same  WEP  key  between  the  stations  in  this 
Authentication  algorithm,  this  type  will  use  packets  with  encryption  by 
transferring  a  challenge  text  which  will  be  acknowledge  by  both  side  of  the 
stations. In order to choose which authentication algorithm will be used, you 
must know which one the station supports this algorithm first. 

Summary of Contents for DIR-875

Page 1: ...i HD Media Router 3000 DIR 875 User s Guide ...

Page 2: ...i TABLE OF CONTENT Introduction 1 Overview of this User s Guide 1 Software Installation 2 Windows 98se ME 2000 XP Utility and Driver Installation 2 Wireless Utility Setting 3 Technical Specifications 13 ...

Page 3: ... the need for wired connections at a speed of up to fifty four megabit per second Wireless PCIe Adapter provides users with an access to real time information anywhere in their organization The mobility provides productivity and service which are not available under wired networks The Wireless PCIe Adapter configuration is easy to change from peer to peer networks suitable for a small number of us...

Page 4: ...pend on where your CD ROM drive is located and click OK 2 If you need to install the driver manually refer each Windows OS to the following CD Rom directory path D Drivers Windows OS SIS163U INF Note D will depends on where the CD ROM drive is located and Windows OS will depend on the Windows Operating System you are using 3 The Install Shield Wizard screen will appear Click Next to continue 4 The...

Page 5: ...includes seven tabs Status Configuration Advanced Profile Network Statistics and About Status The Status screen shows you the status of the Wireless Adapter it shows that where the device is connected to the Network mode the Channel the transmit rate and the encryption mode There are two dialog boxes showing the data transmitted and the data received The two signal lines show the Signal Strength a...

Page 6: ...cally detect the channel number of the Access Point Security the setting of the Network Encryption This function is used to protect wireless communication from eavesdropping A secondary function of encryption is to prevent unauthorized access to a wireless network and it can be achieved by using the Encryption function Encryption Mode There are two kinds of encryption mode WEP encryption and WPA P...

Page 7: ...in Hex format you must type 10 values in the following range 0 F hexadecimal or 64bit in ASCII format you must type 5 values in the following range 0 9 A Z and a z Alphanumeric If you select 128bit in Hex format you must type 26 values 0 F hexadecimal or 128bit in ASCII format you must type 13 values in the following range 0 9 A Z and a z Alphanumeric Be sure that the mini PCI Adapter and the wire...

Page 8: ...key is a simpler version that does not support 802 1x and requires a separate RADIUS server for mutual authentication Enter a Passphrase in the WPA PSK dialog box This passphrase must be the same on each computer that is connected to the wireless network ...

Page 9: ...s 5 5Mbps 2Mbps 1Mbps and Fully Automatic The Fully Automatic will automatically detect the suitable linking transfer rate and auto fall back when the signal is not too strong to transmit data it will auto fall back from 54Mbps to 1 Mbps Power Saving To set your Wireless Adapter as power saving mode select Off Normal or Maximum Transmit Power By selecting the Transmit Power you can select the Radi...

Page 10: ...etting within a range of 256 to 2432 bytes It is recommended to fragment the packet when the link quality is bad it is to prevent the wasting time of resending a long packet that is lost RTS CTS Threshold The RTS CTS Threshold is a station initiates the process by sending a RTS frame the other ends receives the RTS and responds with a CTS frame the station must receive a CTS frame before sending t...

Page 11: ...a previously defined profile Type a name in the Profile Name field to create a profile click Save and then click Apply when a profile is done You can click Delete if the profile is no longer used to activate other profile choose a profile name in the Profile Name field and click Activate ...

Page 12: ...er The information of the wireless devices includes the SSID MAC Address Channels Signal the Security type and the Network mode You can click the Rescan button to find the new wireless devices and double click the device to choose the wireless station that you want to connect with ...

Page 13: ...11 Statistics The Statistics section shows the real time transmit and receive packets of the Wireless Adapter ...

Page 14: ...12 About The About section shows the Device Name Regulatory Domain Driver Version MAC Address and the Utility version ...

Page 15: ... 7Mbps 180 72 7Mbps 150 65Mbps 135 57 8Mbps 120 43 3Mbps 90 28 9Mbps 60 21 7Mbps 45 14 4Mbps 30 7 2Mbps 15 Frequency Range 2 4GHz to 2 483GHz 5 180GHz to 5 250GHz and 5 725GHz to 5 825GHz Modulation Schemes BPSK QPSK CCK OFDM Media Access Protocol CSMA CA with ACK Security WPA Personal WPA2 Personal WPA Enterprise WPA2 Enterprise Physical and Environmental Operating Temperature 32 F to 104 F 0 C t...

Page 16: ...ollowing two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation Operations in the 5 15 5 25GHz band are restricted to indoor usage only IMPORTANT NOTE FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled envi...

Page 17: ...al end product must be labeled in a visible area with the following Contains FCC ID KA2IR857MO1 The OEM integrator has to be aware not to provide information to the end user regarding how to install or remove this RF module in the user s manual of the end product which integrates this module The end user manual shall include all required regulatory information warning as show in this manual ...

Page 18: ...r then the Canada authorization is no longer considered valid and the IC ID can not be used on the final product In these circumstances the OEM integrator will be responsible for re evaluating the end product including the transmitter and obtaining a separate Canada authorization End Product Labeling This transmitter module is authorized only for use in device where the antenna may be installed su...

Page 19: ...ons d ordinateur portable ou de certaines co localisation avec un autre émetteur l autorisation du Canada n est plus considéré comme valide et l ID IC ne peut pas être utilisé sur le produit final Dans ces circonstances l intégrateur OEM sera chargé de réévaluer le produit final y compris l émetteur et l obtention d une autorisation distincte au Canada Plaque signalétique du p Plaque signalétique ...

Reviews: