background image

 

WLAN 802.11 b/g/n USB Adapter   

 

IFU-WLM3     User Manual  

 

October 2010

 

Summary of Contents for DNUA-93F

Page 1: ...WLAN 802 11 b g n USB Adapter IFU WLM3 User Manual October 2010...

Page 2: ...ay be reproduced stored in a retrieval system or transmitted in any form or by any means whether electronic mechanical photocopying recording or otherwise without the prior writing of the publisher Pe...

Page 3: ...from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help FCC Caution Any changes or modifications not expressly approved by the party responsible...

Page 4: ...4 2 DRIVER UTILITY INSTALLATION UNINSTALLATION 4 3 CONNECTING TO AN EXISTING NETWORK 4 4 MODIFYING A WIRELESS NETWORK 5 4 1 MODIFYING GENERAL SETTINGS 5 4 2 MODIFYING SECURITY SETTINGS 6 5 SPECIFICAT...

Page 5: ...ts network function without installing driver or utility 3 Connecting to an Existing Network 1 Use the remote control that came with your TV to access the network configuration settings page 2 Select...

Page 6: ...settings below for your network Profile Name Identifies the configuration wireless network profile This name must be unique Profile names are not case sensitive Client Name Identifies the client machi...

Page 7: ...ons include EAP FAST EAP TLS EAP TTLS EAP SIM PEAP EAP GTC PEAP EAP MSCHAP V2 LEAP WPA WPA2 Passphrase Enables WPA WPA2 Passphrase security Click on the Configure button and fill in the WPA WPA2 Passp...

Page 8: ...ch means no time limit is imposed for finding the domain controller Note The authentication process times out whenever the authentication timer times out or the time for finding the domain controller...

Page 9: ...483GHz Japan 2 400 2 497GHz China 2 400 2 483GHz Channels support 802 11n b g US Canada 11 1 11 Major European country 13 1 13 France 4 10 13 Japan 11b 14 1 13 or 14th 11g 13 1 13 China 13 1 13 Operat...

Page 10: ...d receiver FHSS appears to be short duration impulse noise Direct Sequence Spread Spectrum DSSS generates a redundant bit pattern for each bit to be transmitted This bit pattern is called a chip or ch...

Page 11: ...ogy that links access points and nodes In such a system the user s end node undertakes a search for the best possible access to the system First it evaluates such factors as signal strength and qualit...

Reviews: