![Hama 00062764 V2 Operating Instructions Manual Download Page 31](http://html1.mh-extra.com/html/hama/00062764-v2/00062764-v2_operating-instructions-manual_3569163031.webp)
14
7.2.1 Creating a new profile
You need the following information to create a profile
(Profile):
•
SSID
(network ID): This is the name of the required network.
•
Encryption Type:
Encryption used in the target network
•
(Network Type)
: (type of network): Infrastructure or ad-hoc
Open the Wireless Utility. Using the Network overview
(Site survey
) tab, you can select the required network
and then open the dialog box using the
ADD PROFILE
button, or open the Profile tab and start the dialog box
by clicking the
ADD button
.
First enter a name for your profile
(Profile name).
Under SSID, select the network you want to connect to
from the list of available networks.
To reduce the energy consumption, you can run the
stick in
Power saving mode
. In this mode, certain
functions are deactivated or run at a lower setting if
they are not fully used. Select CAM (
Constantly Awake
Mode)
, if you want to run the stick at full power all
the time.
This Hama WLAN USB Stick allows you to set up two different network types. Select
Infrastructure
under
Network type, if you want to connect to a router or access point. The settings for
TX Power, RTS Threshold
and
Fragment Threshold
can be left at the default settings.
If you want to connect to another WLAN client device without a router or access point,
select
802.11 Ad-hoc.
The settings for
TX Power, Channel, RTS Threshold
and
Fragment Threshold
can be left at the
default settings.
7.2.2 Setting the wireless LAN encryption
First, it is important to understand a range of terms. The next section will explain the main terms
used here:
Authentication:
Authentication is a process in which the identity, e.g. of a person is determined based on a
certain characteristic. This can be done by fingerprint, password or any other proof of authorisation.
Encryption:
Encryption is a process in which a plain text is transformed into a coded text via an encryption
process (algorithm). One or more codes can be used for this.
It must also be mentioned that each individual encryption process offers one or more authentication
options.