background image

 

27

  The IEEE 802.11b/g Wireless LAN standards subcommittee formulating standards for the industry. The objective is 

to enable wireless LAN hardware from different manufacturers to communicate. 

Infrastructure Mode   

  A client setting providing connectivity to an Access Point. As compared to Ad-Hoc Mode where PCs communicate 

directly with each other clients set in   

Infrastructure Mode all pass data through a central Access Point. The Access Point not only mediates Wireless network 

traffic in the immediate neighborhood but also pro-vides communication with the wired network. An integrated wireless 

and wireless and wired LAN is called an Infrastructure configuration. Infrastructure is applicable to enterprise scale for 

wireless access to central database, or wireless application for mobile workers.   

Roaming   

  The ability to use a wireless device and be able to move from one access point range to another without losing the 

connection. 

RTS/CTS Threshold Value   

  Should remain at its default setting of 2,347. A preamble is a signal used to synchronize the transmission timing 

between two or more systems. A series of transmission pulses is sent before the data to indicate that someone is about 

transmit data.?This ensures that systems receiving the information correctly when the data transmission starts.   

Shared Key   

  Is when both the sender and recipient share a secret key. Both units use this key for an extended length of time, 

sometimes indefinitely. Any eavesdropper that discovers the key may decipher all packets until the key is changed.   

Signal Strength   

  The signal level indicates the strength of the signal as received at the wireless network interface.   

SSID (Service Set Identifier)   

  Is the unique name shared among all points in a wireless network. The SSID must be identical for all points in the 

network. It is case sensitive and must not exceed 32 characters.   

WEP (Wired Equivalent Privacy)   

  A data privacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .11 standard. The 

optional cryptographic confidentiality algorithm specified by IEEE 802.11 used to provide data confidentiality that is 

subjectively equivalent to the confidentiality of a wired LAN medium that does not employ cryptographic techniques to 

enhance privacy. 

WPA 

Wi-Fi Protected Access, a specification to improve the security level of wireless networks. It uses 802.1x and EAP to 

control network access. Temporal Key Integrity Protocol (TKIP) is used to secure data during transmission. 

 

 

 

 

 

Summary of Contents for EP-9001-g

Page 1: ...EP 9001 g 54M WLAN USB Adapter User Manual...

Page 2: ...e Installation 7 3 1Installing WLAN USB Adapter Utility and Driver 7 3 2Uninstalling the Driver and Utility 11 4 Configuration Utility 14 4 1Using the configuration utility 14 4 1 1Profile 15 4 1 1 1...

Page 3: ...e set up process within minutes This WLAN USB Adapter has been designed for both home and business users enables you to communicate seamlessly with other wireless networking products wherever you are...

Page 4: ...36 48 54Mbps Output Power 18dBm 11Mbps 15dBm 54Mbps Receive sensitivity Min 80dBm for 11Mbps BER 8 Min 70dBm for 54 Mbps FER 10 Antenna Type Build in PCB patch antenna Current Consumption 3 3V Tx mode...

Page 5: ...stallation Note If you insert the 802 11g WLAN USB Adapter before installing the driver and utility the operating system will detect a new device and start to configure the new device Click Cancel to...

Page 6: ...6 2 2 Removing the WLAN USB Adapter If you want to remove the WLAN USB Adapter you can direct remove the WLAN USB Adapter out of the slot...

Page 7: ...Installing WLAN USB Adapter Utility and Driver Insert the setup CD into your CD ROM Device Then the Install ShieldWizard should launch automatically if it does not launch automatically Double click se...

Page 8: ...8 Click Next button in the following window The InstallShield Wizard is copying the necessary files to the system The progress indicator shows the installing...

Page 9: ...tatus Plug in the WLAN USB Adapter into your USB slot when the window below appears If this is the first time you install the software the window below will appear Select your current country region t...

Page 10: ...10 click Next Click Finish when the installation is completed...

Page 11: ...r in the system tray Double click the icon to configure the WLAN USB Adapter 3 2 Uninstalling the Driver and Utility You may follow the instruction step by step to uninstall the WLAN USB Adapter compl...

Page 12: ...12 The following window should launch automatically Select Remove and click Next...

Page 13: ...13 Select OK to continue uninstallation...

Page 14: ...14 Click OK to finish when the uninstallation is completed 4 Configuration Utility...

Page 15: ...all your configuration settings for your WLAN USB Adapter using this utility 4 1 Using the configuration Utility After the Configuration Utility has been installed an icon will placed in the system tr...

Page 16: ...ach profile you can specify a network type network name WEP and security setting parameters required for that operating location 4 1 1 1 System Configuration Edit profile Network Type The column in Pr...

Page 17: ...es authentication type of the wireless networks including Open System and Share Key authentication The wireless adapter will need to be set to the same authentication type to communicate Encryption In...

Page 18: ...ttle latency for responding to messages Max_PSP Maximum Power Save Fast_PSP Fast Awake Network Type The network type of the wireless network An Ad Hoc wireless LAN is a group of computers each with wi...

Page 19: ...rent throughput of other network packets However the more often RTS packets are sent the quicker the system can recover from interference or collisions Refer to the IEEE 802 11 Standard for more infor...

Page 20: ...s LAN can associate with an Access Point to receive and to transmit data Share Key Is when both the sender and recipient share a secret key Both units use this key for an extended length of time somet...

Page 21: ...ent Privacy Algorithm You can decide the network key to be encoded by ASCII characters or hexadecimal digitals A key of 10 hexadecimal characters 0 9 A F is required if a 64 bit Key Length was selecte...

Page 22: ...see the signal strength channel Encryption authentication and network type of available wireless network The AP MAC address will also be displayed at the Preferred BSSID field Select the AP you want...

Page 23: ...23 4 1 4 Statistics You can see the information of transmit statistics and receive statistics in this screen...

Page 24: ...f all the devices in your wireless network are 802 11g ones choose 802 11g mode to get better transfer rate Tx Burst Enable this function to burst the transmit speed but it may affect signal quality R...

Page 25: ...25 4 1 6 About This screen shows copyright Utility Driver version and MAC Address of this wireless LAN Card...

Page 26: ...ic algorithm to data in order to alter the data appearance and prevent other devices from reading the information Firmware Program that is inserted into programmable read only memory programmable read...

Page 27: ...before the data to indicate that someone is about transmit data This ensures that systems receiving the information correctly when the data transmission starts Shared Key Is when both the sender and...

Page 28: ...of the following measures 1 Re orient or relocate the receiving antenna 2 Increase the separation between the equipment and receiver 3 Connect the equipment to an outlet on a circuit different from th...

Page 29: ...l be free from material defects in workmanship and materials from the date of original retail purchase of the product for the period set forth below applicable to the product type warranty Period exce...

Reviews: