background image

 

CONTENTS 

Package Contents .................................................................................................... 1

 

Chapter 1

 

Introduction ........................................................................................... 2

 

1.1

 

Overview of the Product .......................................................................................... 2

 

1.2

 

Features .................................................................................................................. 2

 

Chapter 2

 

Installation Guide.................................................................................. 3

 

2.1

 

Hardware Installation .............................................................................................. 3

 

2.2

 

Software Installation................................................................................................ 3

 

Appendix A: Specifications ..................................................................................... 9

 

Appendix B: Glossary............................................................................................ 10

 

 

Summary of Contents for PW-MN421

Page 1: ...PW MN421 Wireless Lite N USB Module...

Page 2: ...re trademarks or registered trademarks of their respective holders No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation transf...

Page 3: ...an experienced radio TV technician for help This device complies with part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference 2...

Page 4: ...ongoing in recent years to allow current relaxed regulation Full implementation planned 2012 Italy If used outside of own premises general authorization is required Luxembourg None General authorizati...

Page 5: ...ontents 1 Chapter 1 Introduction 2 1 1 Overview of the Product 2 1 2 Features 2 Chapter 2 Installation Guide 3 2 1 Hardware Installation 3 2 2 Software Installation 3 Appendix A Specifications 9 Appen...

Page 6: ...Lite N USB Module Note Make sure that the package contains the above items If any of the listed items are damaged or missing please contact with your distributor Conventions The Module mentioned in th...

Page 7: ...odule supports WEP WPA and WPA2 encryption to prevent outside intrusion and protect your personal information from being exposed With unmatched wireless performance reception and security protection i...

Page 8: ...for your system For installation you must be sure to connect this module to your device or system s compatible connector sometimes you should use a connecting wire first Then the promoted Found New Ha...

Page 9: ...nue Figure 2 2 3 After that you should choose a Setup type It is recommended that you select Install Client Utilities and Driver Select Install Driver Only to install driver only select Make Driver In...

Page 10: ...n for the software then click Next in the screen below shown in Figure 2 4 Figure 2 4 5 After that select the program folder you should create a new folder name or select one from the Existing Folders...

Page 11: ...USB Module 6 Figure 2 5 6 Choose configuration tool if you are not sure please leave it default Then click Next to continue Figure 2 6 7 Click OK to continue the Installation Wait a while for the setu...

Page 12: ...proceed with the installation during these steps shown in Figure 2 8 Our drivers have been tested thoroughly and are able to work with the operating system Click Continue Anyway to continue the Insta...

Page 13: ...PW MN421 Wireless Lite N USB Module 8 Figure 2 9...

Page 14: ...4 QAM DBPSK DQPSK and CCK Media Access Protocol CSMA CA with ACK Data Security WPA WPA2 64 128 152 bit WEP TKIP AES Frequency 2 412 2 472 GHz For CE Area 2 412 2 462 GHz For FCC Area Spread Spectrum D...

Page 15: ...eer to peer mode and is useful at a departmental scale or SOHO operation DSSS Direct Sequence Spread Spectrum DSSS generates a redundant bit pattern for all data transmitted This bit pattern is called...

Page 16: ...f characters that you create When using WEP you must determine the level of encryption The type of encryption determines the key length 128 bit encryption requires a longer key than 64 bit encryption...

Reviews: