Acurix X52-N Скачать руководство пользователя страница 27

Acurix Networks - User Manual X52-N

 

 

Confidential. © 2010 Acurix Networks  
 

 

 

 

Page 28 of 31

 

authentication  occurs.  Valid  ranges  are  from  0  to  65535 
seconds. The value that you set goes into effect after you 
reboot  your  computer  with  this  profile  set  as  the  active 
profile.  This  drop-down  menu  is  active  only  if  you  chose 
EAP-based authentication. 

6. Select 

Advanced 

tab. 

 

Transmit Power Level  

Selects the transmit power level for 80211b/g or 802.11a 
in  mW.  Actual  transmit  power  may  be  limited  by 
regulatory domain or hardware limitations. Also note that 
administrator  has  the  privilege  of  locking  these  power 
levels,  so  that  these  values  are  pre-selected  and  not 
editable. 

Power Save Mode  

 

Specify: 

 

Maximum  mode  causes  the  access  point  to  buffer 

incoming messages for the wireless adapter. The adapter 
periodically polls the access point to see if any messages 
are waiting. 

 

Normal uses maximum when retrieving a large number 

of packets, then switches back to power save mode after 
retrieving the packets. 

 

Off  turns  power  saving  off,  thus  powering  up  the 

wireless  adapter  continuously  for  a  short  message 
response time. 

Network Type  

Specifies  the  network  as  either  infrastructure  (access 
point mode) or ad hoc. 

Wireless Mode  

Specifies  5  GHz  54Mbps,  5  GHz  300Mbps,  2.4  GHz  54 
Mbps,  2.4  GHz  11Mbps,  2.4  GHz  300Mbps  or  Quality  of 
Service operation in an access point network. 

The  wireless  adapter  must  match  the  wireless  mode  of 
the access point it associates to. 

Wireless Mode when Starting  

Specifies 5 GHz 54 Mbps, 5 GHz 108 Mbps, or 2.4 GHz 

an 

Ad Hoc Network   

 

54/11 Mbps to start an 

ad hoc 

network if no matching 

Содержание X52-N

Страница 1: ...WLAN 802 11 A B G N MINI PCI WIRELESS RADIO MODULE USER MANUAL MODEL X52 N Version 1 0 27 August 2010 2010 Acurix Networks...

Страница 2: ...ng antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an...

Страница 3: ...nges or modifications not expressly approved by the manufacturer could void the user s authority to operate this equipment If the size of the end product is smaller than 8x10cm then additional FCC par...

Страница 4: ...1 System Requirements 6 2 Driver Utility Installation Uninstallation 7 2 1 Installation 7 2 2 Additional Setup Processes 11 2 3 Uninstallation 11 3 Connecting to an Existing Network 15 4 Additional No...

Страница 5: ...ule that provides the easiest way to wireless networking This User Manual contains detailed instructions in the operation of this product Please keep this manual for future reference 1 1 System Requir...

Страница 6: ...ation for Windows To re install the driver please first uninstall the previously installed driver See Chapter 2 3 Uninstallation in this User Manual Follow the steps below to complete the driver utili...

Страница 7: ...User Manual X52 N Confidential 2010 Acurix Networks Page 8 of 31 4 Choose this option to install the driver and client utilities and click Next 5 Click Next to continue or click Browse to choose a des...

Страница 8: ...Acurix Networks User Manual X52 N Confidential 2010 Acurix Networks Page 9 of 31 6 Click Next to continue or change the name of the program folder 7 Click Next...

Страница 9: ...x Networks User Manual X52 N Confidential 2010 Acurix Networks Page 10 of 31 8 Choose the configuration tool for your client card and click Next to continue 9 Click Yes to continue 10 Click OK to cont...

Страница 10: ...ure each operating system may prompt different specific options 1 Windows 2000 XP Vista Select Install the software automatically when the window with this option appears and then click Next to contin...

Страница 11: ...rks User Manual X52 N Confidential 2010 Acurix Networks Page 12 of 31 2 Choose Remove Click Next 3 Choose Uninstall the previous installation and click Next to start Uninstall 4 Click OK or Yes to sta...

Страница 12: ...Acurix Networks User Manual X52 N Confidential 2010 Acurix Networks Page 13 of 31 5 Click Yes to remove the profiles and click No to remove your profiles...

Страница 13: ...Acurix Networks User Manual X52 N Confidential 2010 Acurix Networks Page 14 of 31 6 Click Finish and reboot your computer The Uninstall is now completed...

Страница 14: ...nfidential 2010 Acurix Networks Page 15 of 31 3 Connecting to an Existing Network 1 Double click the shortcut icon of Atheros Client Utility on the desktop and the Configuration window appears 2 Click...

Страница 15: ...Acurix Networks User Manual X52 N Confidential 2010 Acurix Networks Page 16 of 31 4 Choose which AP you want to link and click Activate 5 Give a Profile name for the SSID and Click OK...

Страница 16: ...ly connect to the network with the strongest signal select Enable Smart Selection Any displays in Profile List 7 If the chosen network has security enabled the Security tab displays Select the securit...

Страница 17: ...Acurix Networks User Manual X52 N Confidential 2010 Acurix Networks Page 18 of 31 8 Once connected you can check the signal strength from the following icon in the Windows System Tray...

Страница 18: ...peed and the wireless adapter name and IP address Right click on the tray icon to Help Open the online help Open Atheros Client Utility Launch the Atheros Client Utility ACU Use the ACU to configure t...

Страница 19: ...the associated network Access Point Shows the name of the access Name point the wireless adapter is connected to Access Point IP Shows the IP address of the access Address point the wireless adapter...

Страница 20: ...configure my wireless network settings and then click OK 4 Creating an Ad Hoc New Network NOTE Ad hoc mode is available only for 802 11b g It is not available for 802 11a This is a client product and...

Страница 21: ...works User Manual X52 N Confidential 2010 Acurix Networks Page 22 of 31 2 In the Profile Management window click Advance tab and choose Ad Hoc in the Network Type function 3 Select the Channel tab and...

Страница 22: ...N Confidential 2010 Acurix Networks Page 23 of 31 4 Give a Profile name for the SSID and Click OK to save the settings 5 Click the Security tab If not using security select None Please refer to the ch...

Страница 23: ...ure mode devices communicate with each other by first going through an Access Point AP Wireless devices can communicate with each other or can communicate with a wired network When one AP is connected...

Страница 24: ...ni cardModule Configuration by double clicking the shortcut icon on the desktop Note If there s no network name listed in the Profile List click Refresh button and double click a Network Name from Ava...

Страница 25: ...e up to three SSIDs SSID1 SSID2 and SSID3 4 Select Security tab and choose the security mode Note Check with your Network Administrator for the security features supported by your AP Set Security Opti...

Страница 26: ...set to Optional and the client has WEP enabled make sure that Allow Association to Mixed Cells is checked on the Security Tab to allow association None No security not recommended Allow Association to...

Страница 27: ...ode causes the access point to buffer incoming messages for the wireless adapter The adapter periodically polls the access point to see if any messages are waiting Normal uses maximum when retrieving...

Страница 28: ...cation Mode Select what mode the wireless adapter uses to authenticate to an access point Auto causes the adapter to attempt authentication using shared but switches it to open authentication if share...

Страница 29: ...ro Configuration You may also choose the default parameters and directly proceed to Windows XP zero configuration through the steps below 1 Go to Control Panel and open Network Connections 2 Right cli...

Страница 30: ...s called a chip or chipping code The longer the chip the greater the probability that the original data can be recovered Even if one or more bits in the chip are damaged during transmission statistica...

Страница 31: ...egisters its address Communications between end node and host computer can then be transmitted up and down the backbone As the user moves on the end node s RF transmitter regularly checks the system t...

Отзывы: