background image

 

 

 

 

54/108Mbps  

Super G Wireless LAN USB Adapter 

 

WL-U357v2 

 

User’s Manual 

 
 
 
 
 
 
 
 
 
 
 
 
 
 

(Version 1.0) 

 

Summary of Contents for WL-U357v2

Page 1: ...54 108Mbps Super G Wireless LAN USB Adapter WL U357v2 User s Manual Version 1 0...

Page 2: ...s equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there...

Page 3: ...uipment EU Countries Not Intended for Use The ETSI version of this device is intended for home and office use in Austria Belgium Denmark Finland France with Frequency channel restrictions Germany Gree...

Page 4: ...Minimum System Requirements 5 1 6 Installation Considerations 5 2 Installation Procedure 6 2 1 Utility Driver Installation 6 2 2 Hardware Installation 10 3 Configuration 12 3 1 Link Information 12 3...

Page 5: ...z Wireless connectivity without the hassles and cost of running cables z IEEE 802 11b g standard compliant z USB 2 0 A type standard connector compatible with USB 1 1 z Super G mode provides up to 108...

Page 6: ...ame radio channel Before adopting an ESS with roaming capability choosing an available radio channel with less interference is highly recommended Proper Access Point positioning combined with a clear...

Page 7: ...s and rearrange the workplace 4 Temporary network access Events exhibitions construction sites or some important occasions that require temporary network access 5 Access to database for mobile workers...

Page 8: ...dBm 36Mbps 16QAM 74dBm 24Mbps 16QAM 78dBm 18Mbps QPSK 82dBm 12Mbps QPSK 84dBm 9Mbps BPSK 86dBm 6Mbps BPSK 88dBm Typically PER 10 packet size 1024 and 25 C 5 C Working Mode Infrastructure Ad Hoc Power...

Page 9: ...form 3 90 feet Properly position your Access Points Residential Gateways and computers so that the number of walls or ceilings residing between Access Points and clients is minimized z Building mater...

Page 10: ...8SE ME 2000 Note 1 If you had ever installed the other Wireless Cards before please uninstall the existed drivers and utilities first Note 2 Please install the configuration utility before insert WL U...

Page 11: ...e Destination Folder that you want to install the utility Or keep the default setting and click Next to continue 5 You can change the Program Folder name as you wish or use the default name to continu...

Page 12: ...6 Installation will start copy driver and utility to your OS 7 When this dialog box appear please click Continue Anyway 8...

Page 13: ...8 Please click Finish to complete the installation 9 Please click Finish to restart your PC 9...

Page 14: ...ill prompt you there is a High Speed device connect to non High Speed USB hub Please don t worry about this and keep installing 3 After properly connect the WL U357 to your PC Windows will detect WL U...

Page 15: ...select Continue Anyway to continue 5 After the driver installation complete appears Please click Finish 11...

Page 16: ...ed for wireless communication Encryption Shows the current encryption mode used for wireless network Tx Rate Shows the current data rate used for transmitting Channel Shows the current channel for com...

Page 17: ...ireless network Wireless Mode There are two types available for selection Infrastructure To establish wireless communication with LAN and other wireless clients through the use the Access Points Ad Ho...

Page 18: ...the mandatory supported Long Preamble and header which interoperates with the 1 Mbit s and 2 Mbit s DSSS specification as described in IEEE Std 802 11 and an optional Short Preamble and header as desc...

Page 19: ...encryption feature If one of the three options is selected it is required to configure the following settings from the next dropping list If WPA WPA2 is selected configuration is enabled Please click...

Page 20: ...e Default Key select one of the 4 keys to use Network Key choose the encryption way either in HEX or ASCII formats and enter the password in the blank space Key Length select 64 or 128 bits as the len...

Page 21: ...t scanning for available network again Profile You can create and manage the created profiles for Home offices or public areas By double clicking on one of the created profile the setting will adapt t...

Page 22: ...ormation about the 108Mbps Wireless Network USB Dongle utility which includes the version numbers for Driver Firmware and Utility When there is new version of software available for upgrade you will b...

Page 23: ...19...

Page 24: ...gorithms Essentially it is a null authentication algorithm Any station that requests authentication with this algorithm may become authenticated if 802 11 Authentication Type at the recipient station...

Page 25: ...packet length and if the number of situations is small CSMA CD Carrier Sense Multiple Access Collision Detection which is a LAN access method used in Ethernet When a device wants to gain access to th...

Page 26: ...BSSs in an ESS ESSID The unique identifier that identifies the ESS In infrastructure association the stations use the same ESSID as AP s to get connected Ethernet A popular local area data communicat...

Page 27: ...e U S have set aside bandwidth for unlicensed use in the ISM Industrial Scientific and Medical band Spectrum in the vicinity of 2 4GHz in particular is being made available worldwide MAC Address Media...

Page 28: ...the transmitting station to the receiving station requesting permission to transmit RTS Threshold Transmitters contending for the medium may not be aware of each other RTS CTS mechanism can solve this...

Page 29: ...cheme used to protect wireless data communication To enable the icon will prevent other stations without the same WEP key from linking with the AP Wireless Bridge One of the additional AP operating mo...

Page 30: ...TS CTS feature Fragmentation Power Management What is Ad hoc An Ad hoc mode is a wireless network type in which a group of computers equipped with wireless adapters are connected as an independent wir...

Page 31: ...r more bits in the chip are damaged during transmission statistical techniques embedded in the radio can recover the original data without the need for retransmission To an unintended receiver DSSS ap...

Reviews: