background image

21 

 

wired LAN is called an Infrastructure configuration. Infrastructure is applicable to enterprise 
scale for wireless access to central database, or wireless  

11. ISM Band 

The FCC and their counterparts outside of the U.S. have set aside bandwidth for unlicensed 
use in the so-called ISM (Industrial, Scientific and Medical) band. Spectrum in the vicinity of 
2.4 GHz, in particular, is being made available (Industrial, Scientific and Medical) band. 
Spectrum in the vicinity of 2.4 GHz, in particular, is being made available of users around the 
globe. 

12. Local Area Network (LAN) 

A LAN is a group of computers, each equipped with the appropriate network adapter card 
connected by cable/air, that share applications, data, and peripherals. All connections are 
made via cable or wireless media, but a LAN does not use telephone services. It typically 
spans a single building or campus. 

13. Network 

A network is a system of computers that is connected. Data, files, and messages can be 
transmitted over this network. Networks may be local or wide area networks. 

14. Protocol 

A protocol is a standardized set of rules that specify how a conversation is to take place, 
including the format, timing, sequencing and/ or error checking. 

15. SSID 

A Network ID unique to a network. Only clients and Access Points that share the same SSID 
are able to communicate with each other. This string is case-sensitive. 

16. Static IP Addressing 

A method of assigning IP addresses to clients on the network. In networks with Static IP 
address, the network administrator manually assigns an IP address to each computer. Once a 
Static IP address is assigned, a computer uses the same IP address every time it reboots and 
logs on to the network, unless it is manually changed. 

17. Temporal Key Integrity Protocol (TKIP) 

The Temporal Key Integrity Protocol, pronounced tee-kip, is part of the IEEE 802.11i 
encryption standard for wireless LANs. TKIP is the next generation of WEP, the Wired 
Equivalency Protocol, which is used to secure 802.11 wireless LANs. TKIP provides per-
packet key mixing, a message integrity check and a re-keying mechanism, thus fixing the 
flaws of WEP. 

18. Transmission Control Protocol / Internet Protocol (TCP/IP) 

TCP/IP is the protocol suite developed by the Advanced Research Projects Agency (ARPA). It 
is widely used in corporate Internet works, because of its superior design for WANs. TCP 
governs how packet is sequenced for transmission the network. The term “TCP/IP” is often 
used generically to refer to the entire suite of related protocols. 

19. Transmit / Receive 

The wireless throughput in Bytes per second averaged over two seconds. 

Summary of Contents for LP-8097

Page 1: ...1 802 11ac Wireless USB 3 0 Dongle USER MANUAL 1 0 2013...

Page 2: ...guration 6 3 1 Utility Icon 6 3 2 Client Mode 6 3 2 1 Wireless Device Control 6 3 2 2 General Setting 7 3 2 3 Profile Setting 8 3 2 4 Available Network Setting 9 3 2 5 Status 11 3 2 6 Statistics Page...

Page 3: ...32 64 Win7 32 64 Win 8 32 64 PCs must have a device driver installed It allows you to communicate with WLAN Dongle BEFORE YOU START 1 Contents confirmation Wireless LAN USB Dongle Driver CD CONNECTING...

Page 4: ...was operated under Windows 7 Procedures are similar for Windows XP vista Step 1 Insert the installation CD into your CD ROM Step 2 Welcome Installation dialog prompt shown Click Next to continue Clic...

Page 5: ...5 Step 3 Click Finish to complete installation...

Page 6: ...ity Icon Client mode utility running but no WLAN Adapter plugged Client mode utility running and WLAN Adapter scan available network Client mode utility running and WLAN Adapter cannot scan any AP 3 2...

Page 7: ...y are also displayed The bar graph displays the quality and strength of the link between the node and its Access Point Link Quality is a measurement of receiving and transmitting performances over the...

Page 8: ...8 3 2 3 Profile Setting In profile tab you can Add Remove Edit Duplicate and Set Default to manipulate profile content manually Strongly recommend to use profile after you do Available Network...

Page 9: ...hat radio can reaches Select proper SSID BSSID you want to connect Click Refresh button to force and rescan available networks currently Select one of SSIDs and click Add to Profile to create profile...

Page 10: ...10 In this page you can edit your profile name configure wireless security like WEP WPA WPA2 802 1x etc After finishing setup click OK button to save configuration...

Page 11: ...3 2 5 Status In this page it shows all wireless networking and device driver version of 2 4GHz in detail In this page it shows all wireless networking and device driver version of 802 11n 5GHz in deta...

Page 12: ...12 In this page it shows all wireless networking and device driver version of 802 11ac 5GHz in detail...

Page 13: ...13 3 2 6 Statistics Page The Tx Rx status of current wireless connection is shown A statistic analysis of packet transition is listed...

Page 14: ...14 3 2 7 Wi Fi Protected Setup There is an easy and secure setup solution for Wi Fi network You can choose PIN Code or Push Button method to connect to an AP...

Page 15: ...t ID of a station It is a unique value assigned by AP 5 MAC address It is the six two digit numbers that assemble the MAC address of respected joined station 6 Life Time It is the timer that counts do...

Page 16: ...n to prevent unauthorized login WPA PSK TKIP WPA2 PSK TKIP The most advanced authentication and data encryption that provide the best security protection d ASCII PASSPHRASE ASCII You should provide ei...

Page 17: ...n that this AP sends out in unit of TU 1024 micro seconds 2 DTIM Period The DTIM Period field is the number of Beacon intervals between successive DTIMs 3 Preamble Mode Long higher quality but with lo...

Page 18: ...18 4 3 Statistics Page The Tx Rx status of current wireless connection is shown A statistic analysis of packet transition is listed...

Page 19: ...con tray Remedy Make sure that you have installed the Utility from the attached CD Symptom The PC Card is linking but can t share files with others Remedy Make sure the file and printer sharing functi...

Page 20: ...uency spectrum The other method is frequency hopping Direct sequence spreads the data over one frequency range channel while frequency hopping jumps from one narrow frequency band to another many time...

Page 21: ...cking 15 SSID A Network ID unique to a network Only clients and Access Points that share the same SSID are able to communicate with each other This string is case sensitive 16 Static IP Addressing A m...

Page 22: ...um technology It offers limited bandwidth usually under 11Mbps and users share the bandwidth with other devices in the spectrum however users can operate a spread spectrum device without licensing fro...

Page 23: ...eacon and learn whether there are buffered frames at the access point 28 Preamble Type There are two preamble types defined in IEEE 802 11 specification A long preamble basically gives the decoder mor...

Reviews: