background image

 

Preamble Type: 

During transmission, the PSDU shall be appended to a PLCP 

preamble and header to create the PPDU. Two different preambles and headers 
are defined as the mandatory supported long preamble and header which 
interoperates with the current 1 and 2 Mbit/s DSSS specification as described in 
IEEE Std 802.11-1999, and an optional short preamble and header. At the 
receiver, the PLCP preamble and header are processed to aid in demodulation 
and delivery of the PSDU.    The optional short preamble and header is intended 
for application where maximum throughput is desired and interoperability with 
legacy and non-short-preamble capable equipment is not consideration. That is, 
it is expected to be used only in networks of like equipment that can all handle 
the optional mode. (IEEE 802.11b standard) 

PSDU: 

PLCP service data unit 

Roaming: 

A LAN mobile user moves around an ESS and enjoys a continuous 

connection to an Infrastructure network. 

RTS: R

equest 

T

S

end. An RS-232 signal sent from the transmitting station to 

the receiving station requesting permission to transmit. 

RTS Threshold: 

Transmitters contending for the medium may not be aware of 

each other. RTS/CTS mechanism can solve this “Hidden Node Problem”. If the 
packet size is smaller than the preset RTS Threshold size, the RTS/CTS 
mechanism will NOT be enabled. 

SSID: 

Service Set Identifier, which is a unique name shared among all clients 

and nodes in a wireless network. The SSID must be identical for each clients 
and nodes in the wireless network. 

Subnet Mask: 

The method used for splitting IP networks into a series of 

sub-groups, or subnets. The mask is a binary pattern that is matched up with the 
IP address to turn part of the host ID address field into a field for subnets. 

TCP/IP: 

Transmission Control Protocol/ Internet Protocol. The basic 

communication language or protocol of the Internet. It can also be used as a 
communications protocol in a private network, i.e. intranet or internet. When you 
are set up with direct access to the Internet, your computer is provided with a 
copy of the TCP/IP program just as every other computer that you may send 
messages to or get information from also has a copy of TCP/IP. 

 

 

24 

Summary of Contents for WL-U357v2

Page 1: ...54 108Mbps Super G Wireless LAN USB Adapter WL U357v2 User s Manual Version 1 0...

Page 2: ...s equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there...

Page 3: ...uipment EU Countries Not Intended for Use The ETSI version of this device is intended for home and office use in Austria Belgium Denmark Finland France with Frequency channel restrictions Germany Gree...

Page 4: ...Minimum System Requirements 5 1 6 Installation Considerations 5 2 Installation Procedure 6 2 1 Utility Driver Installation 6 2 2 Hardware Installation 10 3 Configuration 12 3 1 Link Information 12 3...

Page 5: ...z Wireless connectivity without the hassles and cost of running cables z IEEE 802 11b g standard compliant z USB 2 0 A type standard connector compatible with USB 1 1 z Super G mode provides up to 108...

Page 6: ...ame radio channel Before adopting an ESS with roaming capability choosing an available radio channel with less interference is highly recommended Proper Access Point positioning combined with a clear...

Page 7: ...s and rearrange the workplace 4 Temporary network access Events exhibitions construction sites or some important occasions that require temporary network access 5 Access to database for mobile workers...

Page 8: ...dBm 36Mbps 16QAM 74dBm 24Mbps 16QAM 78dBm 18Mbps QPSK 82dBm 12Mbps QPSK 84dBm 9Mbps BPSK 86dBm 6Mbps BPSK 88dBm Typically PER 10 packet size 1024 and 25 C 5 C Working Mode Infrastructure Ad Hoc Power...

Page 9: ...form 3 90 feet Properly position your Access Points Residential Gateways and computers so that the number of walls or ceilings residing between Access Points and clients is minimized z Building mater...

Page 10: ...8SE ME 2000 Note 1 If you had ever installed the other Wireless Cards before please uninstall the existed drivers and utilities first Note 2 Please install the configuration utility before insert WL U...

Page 11: ...e Destination Folder that you want to install the utility Or keep the default setting and click Next to continue 5 You can change the Program Folder name as you wish or use the default name to continu...

Page 12: ...6 Installation will start copy driver and utility to your OS 7 When this dialog box appear please click Continue Anyway 8...

Page 13: ...8 Please click Finish to complete the installation 9 Please click Finish to restart your PC 9...

Page 14: ...ill prompt you there is a High Speed device connect to non High Speed USB hub Please don t worry about this and keep installing 3 After properly connect the WL U357 to your PC Windows will detect WL U...

Page 15: ...select Continue Anyway to continue 5 After the driver installation complete appears Please click Finish 11...

Page 16: ...ed for wireless communication Encryption Shows the current encryption mode used for wireless network Tx Rate Shows the current data rate used for transmitting Channel Shows the current channel for com...

Page 17: ...ireless network Wireless Mode There are two types available for selection Infrastructure To establish wireless communication with LAN and other wireless clients through the use the Access Points Ad Ho...

Page 18: ...the mandatory supported Long Preamble and header which interoperates with the 1 Mbit s and 2 Mbit s DSSS specification as described in IEEE Std 802 11 and an optional Short Preamble and header as desc...

Page 19: ...encryption feature If one of the three options is selected it is required to configure the following settings from the next dropping list If WPA WPA2 is selected configuration is enabled Please click...

Page 20: ...e Default Key select one of the 4 keys to use Network Key choose the encryption way either in HEX or ASCII formats and enter the password in the blank space Key Length select 64 or 128 bits as the len...

Page 21: ...t scanning for available network again Profile You can create and manage the created profiles for Home offices or public areas By double clicking on one of the created profile the setting will adapt t...

Page 22: ...ormation about the 108Mbps Wireless Network USB Dongle utility which includes the version numbers for Driver Firmware and Utility When there is new version of software available for upgrade you will b...

Page 23: ...19...

Page 24: ...gorithms Essentially it is a null authentication algorithm Any station that requests authentication with this algorithm may become authenticated if 802 11 Authentication Type at the recipient station...

Page 25: ...packet length and if the number of situations is small CSMA CD Carrier Sense Multiple Access Collision Detection which is a LAN access method used in Ethernet When a device wants to gain access to th...

Page 26: ...BSSs in an ESS ESSID The unique identifier that identifies the ESS In infrastructure association the stations use the same ESSID as AP s to get connected Ethernet A popular local area data communicat...

Page 27: ...e U S have set aside bandwidth for unlicensed use in the ISM Industrial Scientific and Medical band Spectrum in the vicinity of 2 4GHz in particular is being made available worldwide MAC Address Media...

Page 28: ...the transmitting station to the receiving station requesting permission to transmit RTS Threshold Transmitters contending for the medium may not be aware of each other RTS CTS mechanism can solve this...

Page 29: ...cheme used to protect wireless data communication To enable the icon will prevent other stations without the same WEP key from linking with the AP Wireless Bridge One of the additional AP operating mo...

Page 30: ...TS CTS feature Fragmentation Power Management What is Ad hoc An Ad hoc mode is a wireless network type in which a group of computers equipped with wireless adapters are connected as an independent wir...

Page 31: ...r more bits in the chip are damaged during transmission statistical techniques embedded in the radio can recover the original data without the need for retransmission To an unintended receiver DSSS ap...

Reviews: