background image

20

   

IEEE 

Institute of Electrical and Electronics Engineers Infrastructure An integrated 
wireless and wired LAN is called an Infrastructure configuration. 

Infrastructure is applicable to enterprise scale for wireless access to central 
database, or wireless application for mobile workers. 

 

ISM Band 

The FCC and their counterparts outside of the U.S. have set aside bandwidth 
for unlicensed use in the so-called ISM (Industrial, Scientific and Medical) 

band. Spectrum in the vicinity of 2.4 GHz, in particular, is being made 
available worldwide. This presents a truly revolutionary opportunity to place 

convenient high-speed wireless capabilities in the hands of users around the 
globe. 

 

Local Area Network (LAN) 

A LAN is a group of computers, each equipped with the appropriate network 

adapter card connected by cable/air, that share applications, data, and 
peripherals. All connections are made via cable or wireless media, but a LAN 

does not use telephone services. It typically spans a single building or 
campus. 

 

Network 

A network is a system of computers that is connected. Data, files, and 
messages can be transmitted over this network. Networks may be local or 

wide area networks. 
 

Protocol 

A protocol is a standardized set of rules that specify how a conversation is 
to take place, including the format, timing, sequencing and/ or error 

checking. 
 

 

SSID 

A Network ID unique to a network. Only clients and Access Points that share 
the same SSID are able to communicate with each other. This string is 

case-sensitive. 
 

Static IP Addressing 

A method of assigning IP addresses to clients on the network. In networks 
with Static IP address, the network administrator manually assigns an IP 

address to each computer. Once a Static IP address is assigned, a computer 
uses the same IP address every time it reboots and logs on to the network, 

unless it is manually changed. 
 

Temporal Key Integrity Protocol (TKIP) 

The Temporal Key Integrity Protocol, pronounced tee-kip, is part of the IEEE 

802.11i encryption standard for wireless LANs. TKIP is the next generation 
of WEP, the Wired Equivalency Protocol, which is used to secure 802.11 

wireless LANs. TKIP provides per-packet key mixing, a message integrity 
check and a re-keying mechanism, thus fixing the flaws of WEP. 

 

Transmission Control Protocol / Internet Protocol (TCP/IP) 

TCP/IP is the protocol suite developed by the Advanced Research Projects 

Agency (ARPA). It is widely used in corporate Internet works, because of its 
superior design for WANs. TCP governs how packet is sequenced for 

transmission the network. The term “TCP/IP” is often used generically to 
refer to the entire suite of related protocols. 

Summary of Contents for UGL2430-U2H2

Page 1: ...ss N USB Adapter USER S GUIDE VERSION 1 0 All rights reserved All trade names are registered trademarks of respective manufacturers listed This manual may not be copied in any media or form without th...

Page 2: ...Wireless LAN Basics 3 3 IP ADDRESS 4 4 Install Driver Utility 5 4 1 Windows XP Vista 5 5 Wireless Network Configuration 7 5 1 Utility Icon 7 5 2 Client Mode Default Setting 7 6 Technical Specification...

Page 3: ...for help REGULATION INFORMATION The WLAN 11n USB Client Adapter must be installed and used in strict accordance with the manufacturer s instructions This device complies with the following radio freq...

Page 4: ...This equipment is marked with the symbol and can be used throughout the European community Marking by the symbol indicates that usage restrictions apply France 2 4GHz for Metropolitan France In all M...

Page 5: ...ins of each 22 MHz wide channel are shown in following Table Regulatory Domains Channel Identifier Frequency MHZ Japan ETSI North America Israel France Outdoor Mexico 1 2412 2 2417 3 2422 4 2427 5 243...

Page 6: ...ISM Frequency Band Modulation Method IEEE 802 11b DSSS Direct Sequence Spread Spectrum IEEE 802 11g 802 11n OFDM Orthogonal Frequency Division Multiplexing Easy operation and setting up SYSTEM REQUIR...

Page 7: ...to the Internet Ad Hoc Wireless Network Infrastructure Wireless Network The most obvious difference between Infrastructure wireless network and Ad Hoc wireless network is that the PCs in Infrastructur...

Page 8: ...fied by a unique network address There are two methods to assign a network address to a computer on a TCP IP network Static IP addressing Dynamic IP addressing DHCP Client In network with static IP ad...

Page 9: ...installation program after you insert the disk into your CD drive Step 1 Insert the installation CD into your CD ROM Choose the Setup Language and click Next button Step 2 Installation descriptions s...

Page 10: ...10 Installing configuring WLAN utility Installing Drivers Step 3 Click Finish to complete installation...

Page 11: ...cally 5 1 Utility Icon Client mode utility running but no Wireless N USB Adapter plugged Client mode utility running and Wireless N USB Adapter scan available network Client mode utility running and W...

Page 12: ...he link between the node and its Access Point Link Quality is a measurement of receiving and transmitting performances over the radio Network Address displays current MAC Address IP Address Subnet And...

Page 13: ...rescan available networks currently Select one of SSIDs and click Add to Profile to create profile that can be configured more wireless parameters In this page you can edit your profile name configur...

Page 14: ...nters to check or evaluate the wireless performance Click Reset button to set counter to zero 5 2 6 Wi Fi Protected Setup An easy and secure setup solution for Wi Fi network you can choose PIN Code or...

Page 15: ...15 Step 2 Select a specific AP Step 3 Enter the PIN code into your AP Step 4 Select AP that you want to configure Step 5 Wait for configuring your wireless AP to be the security setting...

Page 16: ...16 PBC method Step 1 Push the PBC button Step 2 Push the physical button on your AP or visual button on the WPS config page...

Page 17: ...ion Multiplexing RF Output Power 14dBm 11n 17dBm 11b 14dBm 11g Operation Mode Ad hoc Infrastructure Receiver Sensitivity 11Mbps 80dBm 8 54Mbps 70dBm 10 300Mbps 64dBm 10 Operation Range Indoor Up to 10...

Page 18: ...emedy Make sure that you have installed the Utility from the attached CD Symptom The PC Card is linking but can t share files with others Remedy Make sure the file and printer sharing function is enab...

Page 19: ...reless cards use to transmit data over the frequency spectrum The other method is frequency hopping Direct sequence spreads the data over one frequency range channel while frequency hopping jumps from...

Page 20: ...t of rules that specify how a conversation is to take place including the format timing sequencing and or error checking SSID A Network ID unique to a network Only clients and Access Points that share...

Page 21: ...ervices and or fiber optic cabling WANs may span a city a state a country or even the world Wired Equivalent Privacy WEP Now widely recognized as flawed WEP was a data encryption method used to protec...

Page 22: ...TS CTS transactions Each station can have a different RTS threshold RTS CTS is used when the data packet size exceeds the defined RTS threshold With the CSMA CA transmission mechanism the transmitting...

Page 23: ...mechanism thus fixing the flaws of WEP 802 1x Authentication 802 1x is a framework for authenticated MAC level access control defines Extensible Authentication Protocol EAP over LANs WAPOL The standar...

Reviews: