background image

 

23 

Chapter 4 Troubleshooting 

This section provides solutions to problems usually encountered during the installation and operation 
of the USB adapter. Read the description below to diffuse your doubts. 
 

What is the IEEE 802.11g standard?   
         

802.11g is the latest IEEE standard for high-speed WLAN communications that provides up to 
54Mbps data rate in the 2.4GHZ band. It has become the mainstream technology of current 
WLAN  networks.  It  uses  OFDM  modulation  to  reach  higher  data  transmission  rate  and 
backward compatible with 802.11b 

What is the IEEE 802.11b standard? 

The IEEE 802.11b WLAN standard subcommittee, which formulates a standard for the industry. 
The objective is to enable WLAN hardware from different manufacturers to interoperate. 

What features does the IEEE 802.11 standard provide? 

The product supports the following IEEE 802.11 functions: 

 

CSMA/CA plus Acknowledge protocol 

 

Multi-Channel Roaming 

 

Automatic Rate Selection 

 

RTS/CTS feature 

 

Fragmentation 

 

Power Management 

What is Ad-hoc? 

An  Ad-hoc  mode  is  a  wireless  network  type  in  which  a  group  of  computers  equipped  with 
wireless adapters are connected as an independent wireless LAN without any access point. All 
computers  operating  in this  mode must  be  configured  to share  the  same  radio channel  and 
SSID. 

What is Infrastructure? 

The difference between Infrastructure network and Ad-hoc network is that the former requires 
an Access point. The Infrastructure mode is appropriate for enterprise-scale wireless access to 
a central database or provides various wireless applications for mobile users. 

What is BSS ID? 

An Infrastructure network is called a Basic Service Set (BSS). All the wireless stations in a BSS 
must share the same BSS ID. 

What is TKIP? 

It  is  another  encryption  method  to  overcome  the  inherent  weaknesses  of  WEP,  a  next 
generation of WEP. It adopts new algorithm (Michael) to generate 128/192-bit encryption keys 
and provides per-packet key mixing, a message integrity check and a re-keying mechanism. 

What is AES? 

         

AES (Advanced Encryption Standard) is a chip-based encryption method of new generation 
and has been incorporated into the newly-approved security standard 802.11i. It supports 128, 
192 and 256-bit encryption key length and adopts Rijndael algorithm. It is widely believed it is 
impossible to crack AES. 

What is DSSS?    What is FHSS?    And what are their differences? 

Frequency-hopping  spread-spectrum  (FHSS)  uses  a  narrowband  carrier  that  changes 
frequency in a pattern that is known to both transmitters and receivers. Properly synchronized, 
the net effect is to maintain a single logical channel. To an unintended receiver, FHSS appears 
to  be  short-duration  impulse  noise.  Direct-sequence  spread-spectrum  (DSSS)  generates  a 
redundant bit pattern for each bit to be transmitted. This bit pattern is called a chip (or chipping 
code). The longer the chip is, the greater the probability that the original data can be recovered. 
Even if one or more bits in the chip are damaged during transmission, statistical techniques 
embedded in the radio can recover the original data without-the need for retransmission. To an 
unintended receiver, DSSS appears as low power wideband noise and is rejected (ignored) by 
most narrowband receivers. 

What is Spread Spectrum?

 

Spread  Spectrum  technology  is  a  wideband  radio  frequency  technique  developed  by  the 

Summary of Contents for WL-U356

Page 1: ...802 11g Wireless USB 2 0 Adapter WL U356 User s Manual...

Page 2: ...limits for a Class B digital device pursuant to Part 15 of FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipmen...

Page 3: ...Equipment As of April 8 2000 Safety This equipment is designed with the utmost care for the safety of those who install and use it However special attention must be paid to the dangers of electric sh...

Page 4: ...tion Considerations 5 CHAPTER 2 INSTALLATION PROCEDURE 6 2 1 Configuration Utility Installation 6 2 2 Driver Installation 9 CHAPTER 3 CONFIGURATION UTILITY 12 3 1 Wireless Connection Status 12 3 2 Mor...

Page 5: ...ables or in constant need of wireless access 1 1 Features l 2 4GHz ISM band unlicensed operation l Wireless connectivity without the hassles and cost of running cables l IEEE 802 11b g standard compli...

Page 6: ...ability choosing an available radio channel with less interference is highly recommended Proper Access Point positioning combined with a clear radio channel will greatly enhance performance Ad Hoc Sti...

Page 7: ...E mail file transfer and terminal service 2 Difficult to wire environments Historical or old buildings public occasions venues and open area where it is difficult to wire 3 Frequently changing environ...

Page 8: ...Built in utility or Windows XP Server 2003 Wireless Zero Configuration utility STANDARDS COMPLIANCE Electromagnetic Compatibility FCC CE 1 4 Package Contents Before installation please check the item...

Page 9: ...ts and clients is minimized l Building materials make a difference A solid metal door or aluminum studs may have a negative effect on signal coverage range Try to properly position Access Points and c...

Page 10: ...stallation operates under Window XP The procedure also applies to Windows 98SE ME 2000 Server 2003 Note If you had ever installed the other Wireless Cards before please uninstall the existed drivers a...

Page 11: ...y WL U356 setup exe where E is your CD ROM drive C You may click Browse to specify the destination folder you prefer for the installation of utility Otherwise you can keep the default setting and clic...

Page 12: ...operating system is Windows XP Server 2003 the below window will pop up Please select Continue Anyway to continue Note If your operating system is Windows 2000 the below window will pop up Please choo...

Page 13: ...98SE Windows will automatically detect and install the device and ask you to insert the system installation CD to complete the entire procedure Just click Yes to continue A Insert WL U356 into a vacan...

Page 14: ...e the card has been tested thoroughly to verify the compatibility Note If your operating system is Windows 2000 the below window will pop up Please click Yes to continue D When the driver is installed...

Page 15: ...11...

Page 16: ...g icon in the system tray and then click Advanced in Wireless Network Connection window Uncheck Use Windows to configure my wireless network settings and click OK to exit If your operating system is W...

Page 17: ...eless network which WL U356 is connected to The information includes Channel Type SSID TX Rate and Encryption settings Please refer to the section 3 2 for detailed descriptions of each item u More Set...

Page 18: ...parameter is not configurable in the Infrastructure mode Tx Rate Shows the Data Transfer Rate There are Auto 1 2 5 5 11 6 9 12 18 24 36 48 54Mbps for selection If the Auto Mode is selected the device...

Page 19: ...ified settings u Encryption Setting You can enable disable WEP and WPA encryption within the wireless network Please refer to the Section 3 3 for detailed descriptions u Profile Profile Name You can s...

Page 20: ...CII values as the encryption keys For example 01234567890123456789abcdef 256 bit Enter 58 digit Hex values or 29 digit ASCII values as the encryption keys u Change Apply Click Change enables you to co...

Page 21: ...preconfigured by the network administrator User name It is the setting for PEAP protocol Password It is the setting for PEAP protocol u Pre shared key It is used for WPA PSK mode Enter 8 to 63 charact...

Page 22: ...the associated AP automatically User Select Users can select the country where they are located The available channels will vary based on the selected country u Power Consumption Setting Continuous A...

Page 23: ...your wireless network However its implementation will cause additional overhead to your wireless network 3 5 Information This screen shows the current driver and utility version and the MAC Address of...

Page 24: ...frames of the AP 3 7 Access Point Setting You can enter this screen by clicking the More Setting button Here you can configure the AP connection settings such as Channel Basic Rate SSID Tx Power WEP A...

Page 25: ...length 64 128 256 bit and ID 1 4 must be identical on the AP and client side The AP supports 64 128 256 bit Hex ASCII WEP encryption About detailed descriptions please refer to the Section 3 3 u Auth...

Page 26: ...ifies only wireless stations with the MAC addresses preconfigured in the below list will be denied access After finishing the setting press the Apply button to make the new setting into effect Filter...

Page 27: ...ile users What is BSS ID An Infrastructure network is called a Basic Service Set BSS All the wireless stations in a BSS must share the same BSS ID What is TKIP It is another encryption method to overc...

Page 28: ...of narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver knows the parameters of the spread spectrum signal being b...

Reviews: