background image

PW-MN421 

  Wireless Lite-N USB Module 

 

 

11

developed by the military for use in reliable, secure, mission-critical communications systems. 

It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other 

words, more bandwidth is consumed than in the case of narrowband transmission, but the 

trade off produces a signal that is, in effect, louder and thus easier to detect, provided that the 

receiver knows the parameters of the spread-spectrum signal being broadcast. If a receiver is 

not tuned to the right frequency, a spread-spectrum signal looks like background noise. 

There are two main alternatives, Direct Sequence Spread Spectrum (DSSS) and Frequency 

Hopping Spread Spectrum (FHSS). 

¾

 

WEP - 

(

W

ired 

E

quivalent 

P

rivacy) 

-

 A data privacy mechanism based on a 64-bit or 128-bit or 

152-bit shared key algorithm, as described in the IEEE 802.11 standard. To gain access to a 

WEP network, you must know the key. The key is a string of characters that you create. 

When using WEP, you must determine the level of encryption. The type of encryption 

determines the key length. 128-bit encryption requires a longer key than 64-bit encryption. 

Keys are defined by entering in a string in HEX (hexadecimal - using characters 0-9, A-F) or 

ASCII (American Standard Code for Information Interchange – alphanumeric characters) 

format. ASCII format is provided so you can enter a string that is easier to remember. The 

ASCII string is converted to HEX for use over the network. Four keys can be defined so that 

you can change keys easily. 

¾

 

Wi-Fi - 

A trade name for the 802.11b wireless networking standard, given by the Wireless 

Ethernet Compatibility Alliance (WECA, see http://www.wi-fi.net), an industry standards 

group promoting interoperability among 802.11b devices. 

¾

 

WLAN -

  (

W

ireless 

L

ocal 

A

rea 

N

etwork) - A group of computers and associated devices 

communicate with each other wirelessly, which network serving users are limited in a local 

area. 

¾

 

WPA - 

(

W

i-Fi 

P

rotected 

A

ccess) 

-

 A wireless security protocol uses TKIP (Temporal Key 

Integrity Protocol) encryption, which can be used in conjunction with a RADIUS server. 

 

Summary of Contents for PW-MN421

Page 1: ...PW MN421 Wireless Lite N USB Module...

Page 2: ...re trademarks or registered trademarks of their respective holders No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation transf...

Page 3: ...an experienced radio TV technician for help This device complies with part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference 2...

Page 4: ...ongoing in recent years to allow current relaxed regulation Full implementation planned 2012 Italy If used outside of own premises general authorization is required Luxembourg None General authorizati...

Page 5: ...ontents 1 Chapter 1 Introduction 2 1 1 Overview of the Product 2 1 2 Features 2 Chapter 2 Installation Guide 3 2 1 Hardware Installation 3 2 2 Software Installation 3 Appendix A Specifications 9 Appen...

Page 6: ...Lite N USB Module Note Make sure that the package contains the above items If any of the listed items are damaged or missing please contact with your distributor Conventions The Module mentioned in th...

Page 7: ...odule supports WEP WPA and WPA2 encryption to prevent outside intrusion and protect your personal information from being exposed With unmatched wireless performance reception and security protection i...

Page 8: ...for your system For installation you must be sure to connect this module to your device or system s compatible connector sometimes you should use a connecting wire first Then the promoted Found New Ha...

Page 9: ...nue Figure 2 2 3 After that you should choose a Setup type It is recommended that you select Install Client Utilities and Driver Select Install Driver Only to install driver only select Make Driver In...

Page 10: ...n for the software then click Next in the screen below shown in Figure 2 4 Figure 2 4 5 After that select the program folder you should create a new folder name or select one from the Existing Folders...

Page 11: ...USB Module 6 Figure 2 5 6 Choose configuration tool if you are not sure please leave it default Then click Next to continue Figure 2 6 7 Click OK to continue the Installation Wait a while for the setu...

Page 12: ...proceed with the installation during these steps shown in Figure 2 8 Our drivers have been tested thoroughly and are able to work with the operating system Click Continue Anyway to continue the Insta...

Page 13: ...PW MN421 Wireless Lite N USB Module 8 Figure 2 9...

Page 14: ...4 QAM DBPSK DQPSK and CCK Media Access Protocol CSMA CA with ACK Data Security WPA WPA2 64 128 152 bit WEP TKIP AES Frequency 2 412 2 472 GHz For CE Area 2 412 2 462 GHz For FCC Area Spread Spectrum D...

Page 15: ...eer to peer mode and is useful at a departmental scale or SOHO operation DSSS Direct Sequence Spread Spectrum DSSS generates a redundant bit pattern for all data transmitted This bit pattern is called...

Page 16: ...f characters that you create When using WEP you must determine the level of encryption The type of encryption determines the key length 128 bit encryption requires a longer key than 64 bit encryption...

Reviews: