Kozumi K-300MWUN User Manual Download Page 26

 
 

   

(TKIP), which fixes the problems of WEP, including using dynamic keys. 

22. Wide Area Network (WAN) 

A WAN consists of multiple LANs that are tied together via telephone services and / or fiber optic 

cabling. WANs may span a city, a state, a country, or even the world. 

23. Wired Equivalent Privacy (WEP) 

Now widely recognized as flawed, WEP was a data encryption method used to protect the 

transmission between 802.11 wireless clients and APs. However, it used the same key among all 

communicating devices. WEP’s problems are well-known, including an insufficient key length and no 

automated method for distributing the keys. WEP can be easily cracked in a couple of hours with 

off-the-shelf tools. 

24. Wireless LAN (WLAN) 

A wireless LAN does not use cable to transmit signals, but rather uses radio or infrared to transmit 

packets through the air. Radio Frequency (RF) and infrared are the commonly used types of wireless 

transmission. Most wireless LANs use spread spectrum technology. It offers limited bandwidth, 

usually under 11Mbps, and users share the bandwidth with other devices in the spectrum; however, 

users can operate a spread spectrum device without licensing from the Federal Communications 

Commission (FCC). 

25. Fragment Threshold 

The proposed protocol uses the frame fragmentation mechanism defined in IEEE 802.11 to achieve 

parallel transmissions. A large data frame is fragmented into several fragments each of size equal to 

fragment threshold. By tuning the fragment threshold value, we can get varying fragment sizes. The 

determination of an efficient fragment threshold is an important issue in this scheme. If the fragment 

threshold is small, the overlap part of the master and parallel transmissions is large. This means the 

spatial reuse ratio of parallel transmissions is high. In contrast, with a large fragment threshold, the 

overlap is small and the spatial reuse ratio is low. However high fragment threshold leads to low 

fragment overhead. Hence there is a trade-off between spatial re-use and fragment overhead. 

Fragment threshold is the maximum packet size used for fragmentation. Packets larger than the size 

programmed in this field will be fragmented If you find that your corrupted packets or asymmetric 

packet reception (all send packets, for example). You may want to try lowering your fragmentation 

threshold. This will cause packets to be broken into smaller fragments. These small fragments, if 

corrupted, can be resent faster than a larger fragment. Fragmentation increases overhead, so you'll 

want to keep this value as close to the maximum value as possible. 

26. RTS (Request To Send) Threshold 

The RTS threshold is the packet size at which packet transmission is governed by the RTS/CTS 

transaction. The IEEE 802.11-1997 standard allows for short packets to be transmitted without 

RTS/CTS transactions. Each station can have a different RTS threshold. RTS/CTS is used when the 

data packet size exceeds the defined RTS threshold. With the CSMA/CA transmission mechanism, 

the transmitting station sends out an RTS packet to the receiving station, and waits for the receiving 

station to send back a CTS (Clear to Send) packet before sending the actual packet data. This setting 

is useful for networks with many clients. With many clients, and a high network load, there will be 

many more collisions. By lowering the RTS threshold, there may be fewer collisions, and performance 

should improve. Basically, with a faster RTS threshold, the system can recover from problems faster. 

Summary of Contents for K-300MWUN

Page 1: ...HIGH POWER WIRELESS N MINI USB ADAPTER K 300MWUN USER S MANUAL...

Page 2: ...in7 Operating distance of up to 300 meters in free space 300 270 240 180 120 90 60 54 48 36 30 24 22 18 12 11 6 5 5 2 1 Mbps selectable Data Rate 64 128 bit WEP WPA Wi Fi Protected Access WPA2 WPS 2 4...

Page 3: ...ce CD 2 dBi Antenna CONNECTING YOUR WLAN ADAPTER TO PC 2 Connect your WLAN adaptor to your PC And Install driver GETTING TO KNOW WIRELESS LAN ADAPTER 3 LEDs LED turns on when WLAN link to WLAN adaptor...

Page 4: ...t connect to the Internet Ad Hoc Wireless Network Infrastructure Wireless Network The most obvious difference between Infrastructure wireless network and Ad Hoc wireless network is that the PCs in Inf...

Page 5: ...nique network address There are two methods to assign a network address to a computer on a TCP IP network Static IP addressing Dynamic IP addressing DHCP Client In network with static IP addressing th...

Page 6: ...e Windows XP 2K Step 1 Insert the installation CD into your CD ROM Installation program will prompt language setup Choose the Setup Language you would like to use and click Next button Step 2 Welcome...

Page 7: ...Step3 Click Install...

Page 8: ......

Page 9: ...Step4 Click Finish to complete installation...

Page 10: ...Windows Vista Step 1 Insert the installation CD into your CD ROM Installation program will prompt language setup Choose the Setup Language you would like to use and click Next button...

Page 11: ...Step 2 Welcome Installation dialog prompt shown Click Next to continue Click Cancel to close installation Installing and configuring wlan utility...

Page 12: ...Step3 Click Install Step4 Click Finish to complete installation...

Page 13: ......

Page 14: ...g and WLAN Adapter scan available network Client mode utility running and WLAN Adapter can not scan any AP Client Mode Default Setting Wireless Device Control Show Tray Icon Show icon or not show icon...

Page 15: ...ddress displays current MAC Address IP Address Subnet and Gateway Click Renew IP button to refresh IP address leased from wireless AP PROFILE SETTING In profile tab you can Add Remove Edit Duplicate a...

Page 16: ...all available networks that radio can reaches Select proper SSID BSSID you want to connect Click Refresh button to force and rescan available networks currently Select one of SSIDs and click Add to Pr...

Page 17: ...In this page you can edit your profile name configure wireless security like WEP WPA WPA2 802 1x etc After finishing setup click OK button to save configuration...

Page 18: ...Status Status page tab shows all wireless networking and device driver version in details...

Page 19: ...Statistics Statistics page tab will show real time TX RX relative counters to check or evaluate the wireless performance Click Reset button to set counter to zero...

Page 20: ...Wi Fi Protected Setup An easy and secure setup solution for Wi Fi network you can choose PIN Code or Push Button method to connect to an AP...

Page 21: ......

Page 22: ...36 48 54 60 90Mbps IEEE 802 11n Maximum of 300Mbps Operation Mode Ad hoc Infrastructure Transmitter Power 25 1 dBm 11b 20 1 dBm 11g 19 1 dBm 11n Receive Sensitivity Operating at 11Mbps 80 dBm 8 FER 5...

Page 23: ...n tray Remedy Make sure that you have installed the Utility from the attached CD Symptom The PC Card is linking but can t share files with others Remedy Make sure the file and printer sharing function...

Page 24: ...from one narrow frequency band to another many times per second 7 ESSID An Infrastructure configuration could also support roaming capability for mobile workers More than one BSS can be configured as...

Page 25: ...r uses the same IP address every time it reboots and logs on to the network unless it is manually changed 17 Temporal Key Integrity Protocol TKIP The Temporal Key Integrity Protocol pronounced tee kip...

Page 26: ...l the overlap part of the master and parallel transmissions is large This means the spatial reuse ratio of parallel transmissions is high In contrast with a large fragment threshold the overlap is sma...

Page 27: ...in the Synchronization field The long preamble is 128 bits and the short is 56 bits 29 WPA2 It is the second generation of WPA WPA2 is based on the final IEEE 802 11i amendment to the 802 11 standard...

Reviews: