background image

 

18 

DSSS: 

Direct Sequence Spread Spectrum. DSSS generates a redundant bit 

pattern for each bit to be transmitted. This bit pattern is called a chip (or chipping 
code). The longer the chip, the greater the probability that the original data can 
be recovered. Even if one or more bits in the chip are damaged during 
transmission, statistical techniques embedded in the radio can recover the 
original data without the need for retransmission. To an unintended receiver, 
DSSS appears as low power wideband noise and is rejected (ignored) by most 
narrowband receivers. 

Dynamic IP Address:

 An IP address that is assigned automatically to a client 

station in a TCP/IP network by a DHCP server.

 

Encryption:

 A security method that uses a specific algorithm to alter the data 

transmitted, thus prevent others from knowing the information transmitted. 

ESS:

 ESS stands for “Extended Service Set”. More than one BSS is configured 

to become Extended Service Set. LAN mobile users can roam between different 
BSSs in an ESS. 

ESSID:

 The unique identifier that identifies the ESS. In infrastructure association, 

the stations use the same ESSID as AP’s to get connected. 

Ethernet:

 A popular local area data communications network, originally 

developed by Xerox Corp., that accepts transmission from computers and 
terminals.    Ethernet operates on a 10/100 Mbps base transmission rate, using 
a shielded coaxial cable or over shielded twisted pair telephone wire. 

Fragmentation: 

When transmitting a packet over a network medium, 

sometimes the packet is broken into several segments, if the size of packet 
exceeds that allowed by the network medium. 

Fragmentation Threshold: 

The Fragmentation Threshold defines the number 

of bytes used for the fragmentation boundary for directed messages. The 
purpose of "Fragmentation Threshold" is to increase the transfer reliability thru 
cutting a MAC Service Data Unit (MSDU) into several MAC Protocol Data Units 
(MPDU) in smaller size. The RF transmission can not allow to transmit too big 
frame size due to the heavy interference caused by the big size of transmission 
frame. But if the frame size is too small, it will create the overhead during the 
transmission. 

 

 

Summary of Contents for XWL-11GUAR

Page 1: ...WLAN 11g USB Adapter User Manual ver 1 0...

Page 2: ...erence to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures R...

Page 3: ...P Netherlands 2400 2483 5 MHz 1 13 100 mW EIRP 100 mW EIRP Germany 2400 2483 5 MHz 1 13 100 mW EIRP 100 mW EIRP Austria 2400 2483 5 MHz 1 13 100 mW EIRP 100 mW EIRP Belgium 2400 2483 5 MHz 1 13 100 mW...

Page 4: ...disclaims any warranties merchantability or fitness for any particular purpose Any software described in this manual is sold or licensed as is Should the programs prove defective following their purch...

Page 5: ...etting Start 2 2 1 LED Indicators 2 2 2 Install the 108Mbps Wireless Network USB Dongle 2 2 2 1 Utility Installation 2 2 2 2 Driver Installation 6 3 Configuration 10 3 1 Link Information 10 3 2 Config...

Page 6: ...the two standards IEEE 802 11b and 802 11g Driver Utility support most commonly used operating systems including Windows 2000 XP Pen size which is easy to carry provides users the most mobility and f...

Page 7: ...ity Installation 1 Before insert USB Dongle into the PC USB of your computer please install the Utility Program first Make sure that the 108Mbps Wireless Network USB Dongle is NOT inserted into the US...

Page 8: ...3 2 Turn on the computer Insert the CD into the CD ROM Drive Please select USB Dongle and then click the Install 3 InstallShield Wizard will automatically start Please click Next to continue...

Page 9: ...4 If user wants to change the installation folder press Brower to change the directory or press Next to continue...

Page 10: ...5 4 Click Finish to finish the installation...

Page 11: ...rt computer to make the settings effective 2 2 2 Driver Installation 1 After restarting the computer insert the USB dongle into USB port Few seconds later there will be a window popup as the following...

Page 12: ...7 2 Click Continue Anyway to keep installation going 3 Click Finish to finish the driver of USB installation...

Page 13: ...After installing the driver of USB there will be another pop up window as the following picture to guide you to keep installing the driver of USB Dongle 5 Click Continue Anyway to keep installation go...

Page 14: ...le installation 7 To make sure if the installation is successful you could check it through the device management 8 Once the installation is successful a utility program icon will show on your desktop...

Page 15: ...used for wireless communication Encryption Shows the current encryption mode used for wireless network Tx Rate Shows the current data rate used for transmitting Channel Shows the current channel for...

Page 16: ...ireless communication with LAN and other wireless clients through the use the Access Points Ad Hoc to establish point to point wireless communication directly with other wireless client devices such a...

Page 17: ...SS specification as described in IEEE Std 802 11 and an optional Short Preamble and header as described in IEEE Std 802 11b At the receiver the Preamble and header are processed to aid in demodulation...

Page 18: ...ts to use and enter the server name and login name If WPA PSK is selected click the configuration button The popping window is as the below Please enter the key Auth Mode There are three modes availab...

Page 19: ...Survey function to scan for the available wireless network wireless clients and Access Points and establish wireless communications with one Available Network displays the wireless networks wireless...

Page 20: ...ile Then the following screen would appear 3 5 About US This page displays some information about the 108Mbps Wireless Network USB Dongle utility which includes the version numbers for Driver Firmware...

Page 21: ...algorithms Essentially it is a null authentication algorithm Any station that requests authentication with this algorithm may become authenticated if 802 11 Authentication Type at the recipient stati...

Page 22: ...to packet length and if the number of situations is small CSMA CD Carrier Sense Multiple Access Collision Detection which is a LAN access method used in Ethernet When a device wants to gain access to...

Page 23: ...ent BSSs in an ESS ESSID The unique identifier that identifies the ESS In infrastructure association the stations use the same ESSID as AP s to get connected Ethernet A popular local area data communi...

Page 24: ...the U S have set aside bandwidth for unlicensed use in the ISM Industrial Scientific and Medical band Spectrum in the vicinity of 2 4GHz in particular is being made available worldwide MAC Address Me...

Page 25: ...om the transmitting station to the receiving station requesting permission to transmit RTS Threshold Transmitters contending for the medium may not be aware of each other RTS CTS mechanism can solve t...

Page 26: ...n scheme used to protect wireless data communication To enable the icon will prevent other stations without the same WEP key from linking with the AP Wireless Bridge One of the additional AP operating...

Page 27: ...n this document Note The user must use the configuration utility provided with this product to check the current channel of operation and confirm that the device is operating in conformance with the s...

Page 28: ...www x micro com...

Reviews: