Acurix X52-N Скачать руководство пользователя страница 30

Acurix Networks - User Manual X52-N

 

 

Confidential. © 2010 Acurix Networks  
 

 

 

 

Page 31 of 31

 

Appendix A: FAQ about WLAN 

1. Can I run an application from a remote computer over the wireless network? 

This will depend on whether or not the application is designed to be used over a network. Consult the 
application

s user guide to determine whether it supports operation over a network. 

2. Can I play computer games with other members of the wireless network? 

Yes,  as  long  as  the  game  supports  multiple  players  over  a  LAN  (local  area  network).  Refer  to  the 
game

s user guide for more information. 

3. What is Spread Spectrum? 

Spread Spectrum technology is a wideband radio frequency technique developed by the military for 
use in reliable, secure, mission-critical communications systems. It is designed to trade off bandwidth 
efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in 
the case of narrowband transmission, but the trade-off produces a signal that is, in effect, louder and 
thus easier to detect, provided that the receiver knows the parameters of the spread-spectrum signal 
being broadcast. If a receiver is not tuned to the right frequency, a spread-spectrum signal looks like 
background  noise.  There  are  two  main  alternatives,  Direct  Sequence  Spread  Spectrum  (DSSS)  and 
Frequency Hopping Spread Spectrum (FHSS). 

4. What is DSSS? What is FHSS? And what are their differences? 

Frequency-Hopping  Spread-Spectrum  (FHSS)  uses  a  narrowband  carrier  that  changes  frequency  in  a 
pattern  that  is  known  to  both  transmitter  and  receiver.  Properly  synchronized,  the  net  effect  is  to 
maintain  a  single  logical  channel.  To  an  unintended  receiver,  FHSS  appears  to  be  short-duration 
impulse  noise.  Direct-Sequence  Spread-Spectrum  (DSSS)  generates  a  redundant  bit pattern  for  each 
bit  to  be  transmitted.  This  bit  pattern  is  called  a  chip  (or  chipping  code).  The  longer  the  chip,  the 
greater the probability that the original data can be recovered. Even if one or more bits in the chip are 
damaged  during  transmission,  statistical  techniques  embedded  in  the  radio  can  recover  the  original 
data  without  the  need  for  retransmission.  To  an  unintended  receiver,  DSSS  appears  as  low  power 
wideband noise and is rejected (ignored) by most narrowband receivers. 

5. Would the information be intercepted while transmitting on air? 

WLAN features two-fold protection in security. On the hardware side, as with Direct Sequence Spread 
Spectrum technology, it has the inherent security feature of scrambling. On the software side, WLAN 
offers the encryption function (WEP) to enhance security and access control. 

6. What is WEP? 

WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 64-bit or 128-bit shared key 
algorithm, as described in the IEEE 802.11 standard. 

7. What is infrastructure mode? 

When  a  wireless  network  is  set  to  infrastructure  mode,  the  wireless  network  is  configured  to 
communicate with a wired network through a wireless access point. 

8. What is roaming? 

Roaming is the ability of a portable computer user to communicate continuously while moving freely 
throughout  an  area  greater  than  that  covered  by  a  single  access  point.  Before  using  the  roaming 
function, the workstation must make sure that it is the same channel number with the access point of 
dedicated coverage area. 

To  achieve  true  seamless  connectivity,  the  wireless  LAN  must  incorporate  a  number  of  different 
functions.  Each  node  and  access  point,  for  example,  must  always  acknowledge  receipt  of  each 
message.  Each  node  must  maintain  contact  with  the  wireless  network  even  when  not  actually 
transmitting  data.  Achieving  these  functions  simultaneously  requires  a  dynamic  RF  networking 
technology  that  links  access  points  and  nodes.  In  such  a  system,  the  user

s  end  node  undertakes  a 

search for the best possible access to the system. First, it evaluates such factors as signal strength and 

Содержание X52-N

Страница 1: ...WLAN 802 11 A B G N MINI PCI WIRELESS RADIO MODULE USER MANUAL MODEL X52 N Version 1 0 27 August 2010 2010 Acurix Networks...

Страница 2: ...ng antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an...

Страница 3: ...nges or modifications not expressly approved by the manufacturer could void the user s authority to operate this equipment If the size of the end product is smaller than 8x10cm then additional FCC par...

Страница 4: ...1 System Requirements 6 2 Driver Utility Installation Uninstallation 7 2 1 Installation 7 2 2 Additional Setup Processes 11 2 3 Uninstallation 11 3 Connecting to an Existing Network 15 4 Additional No...

Страница 5: ...ule that provides the easiest way to wireless networking This User Manual contains detailed instructions in the operation of this product Please keep this manual for future reference 1 1 System Requir...

Страница 6: ...ation for Windows To re install the driver please first uninstall the previously installed driver See Chapter 2 3 Uninstallation in this User Manual Follow the steps below to complete the driver utili...

Страница 7: ...User Manual X52 N Confidential 2010 Acurix Networks Page 8 of 31 4 Choose this option to install the driver and client utilities and click Next 5 Click Next to continue or click Browse to choose a des...

Страница 8: ...Acurix Networks User Manual X52 N Confidential 2010 Acurix Networks Page 9 of 31 6 Click Next to continue or change the name of the program folder 7 Click Next...

Страница 9: ...x Networks User Manual X52 N Confidential 2010 Acurix Networks Page 10 of 31 8 Choose the configuration tool for your client card and click Next to continue 9 Click Yes to continue 10 Click OK to cont...

Страница 10: ...ure each operating system may prompt different specific options 1 Windows 2000 XP Vista Select Install the software automatically when the window with this option appears and then click Next to contin...

Страница 11: ...rks User Manual X52 N Confidential 2010 Acurix Networks Page 12 of 31 2 Choose Remove Click Next 3 Choose Uninstall the previous installation and click Next to start Uninstall 4 Click OK or Yes to sta...

Страница 12: ...Acurix Networks User Manual X52 N Confidential 2010 Acurix Networks Page 13 of 31 5 Click Yes to remove the profiles and click No to remove your profiles...

Страница 13: ...Acurix Networks User Manual X52 N Confidential 2010 Acurix Networks Page 14 of 31 6 Click Finish and reboot your computer The Uninstall is now completed...

Страница 14: ...nfidential 2010 Acurix Networks Page 15 of 31 3 Connecting to an Existing Network 1 Double click the shortcut icon of Atheros Client Utility on the desktop and the Configuration window appears 2 Click...

Страница 15: ...Acurix Networks User Manual X52 N Confidential 2010 Acurix Networks Page 16 of 31 4 Choose which AP you want to link and click Activate 5 Give a Profile name for the SSID and Click OK...

Страница 16: ...ly connect to the network with the strongest signal select Enable Smart Selection Any displays in Profile List 7 If the chosen network has security enabled the Security tab displays Select the securit...

Страница 17: ...Acurix Networks User Manual X52 N Confidential 2010 Acurix Networks Page 18 of 31 8 Once connected you can check the signal strength from the following icon in the Windows System Tray...

Страница 18: ...peed and the wireless adapter name and IP address Right click on the tray icon to Help Open the online help Open Atheros Client Utility Launch the Atheros Client Utility ACU Use the ACU to configure t...

Страница 19: ...the associated network Access Point Shows the name of the access Name point the wireless adapter is connected to Access Point IP Shows the IP address of the access Address point the wireless adapter...

Страница 20: ...configure my wireless network settings and then click OK 4 Creating an Ad Hoc New Network NOTE Ad hoc mode is available only for 802 11b g It is not available for 802 11a This is a client product and...

Страница 21: ...works User Manual X52 N Confidential 2010 Acurix Networks Page 22 of 31 2 In the Profile Management window click Advance tab and choose Ad Hoc in the Network Type function 3 Select the Channel tab and...

Страница 22: ...N Confidential 2010 Acurix Networks Page 23 of 31 4 Give a Profile name for the SSID and Click OK to save the settings 5 Click the Security tab If not using security select None Please refer to the ch...

Страница 23: ...ure mode devices communicate with each other by first going through an Access Point AP Wireless devices can communicate with each other or can communicate with a wired network When one AP is connected...

Страница 24: ...ni cardModule Configuration by double clicking the shortcut icon on the desktop Note If there s no network name listed in the Profile List click Refresh button and double click a Network Name from Ava...

Страница 25: ...e up to three SSIDs SSID1 SSID2 and SSID3 4 Select Security tab and choose the security mode Note Check with your Network Administrator for the security features supported by your AP Set Security Opti...

Страница 26: ...set to Optional and the client has WEP enabled make sure that Allow Association to Mixed Cells is checked on the Security Tab to allow association None No security not recommended Allow Association to...

Страница 27: ...ode causes the access point to buffer incoming messages for the wireless adapter The adapter periodically polls the access point to see if any messages are waiting Normal uses maximum when retrieving...

Страница 28: ...cation Mode Select what mode the wireless adapter uses to authenticate to an access point Auto causes the adapter to attempt authentication using shared but switches it to open authentication if share...

Страница 29: ...ro Configuration You may also choose the default parameters and directly proceed to Windows XP zero configuration through the steps below 1 Go to Control Panel and open Network Connections 2 Right cli...

Страница 30: ...s called a chip or chipping code The longer the chip the greater the probability that the original data can be recovered Even if one or more bits in the chip are damaged during transmission statistica...

Страница 31: ...egisters its address Communications between end node and host computer can then be transmitted up and down the backbone As the user moves on the end node s RF transmitter regularly checks the system t...

Отзывы: