Alfa Network AWUS036NHA Скачать руководство пользователя страница 28

24 

 

 

 

 

Hopping Spread Spectrum (FHSS). 

 

 

SSID  - 

S

ervice 

S

et 

Id

entification  is  a  thirty-two  character  (maximum)  alphanumeric  key 

identifying  a  wireless  local  area  network.  For  the  wireless  devices  in  a  network  to 

communicate  with  each  other,  all  devices  must  be  configured  with  the  same  SSID.  This  is 

typically the configuration parameter for a wireless PC card. It corresponds to the ESSID in 

the  wireless  Access  Point  and  to  the  wireless  network  name. 

See  also 

Wireless  Network 

Name and ESSID. 

 

 

WEP - 

(

W

ired 

E

quivalent 

P

rivacy) 

A data privacy mechanism based on a 64-bit or 128-bit or 

152-bit shared key algorithm, as described in the IEEE 802.11 standard. To gain access to a 

WEP  network,  you  must  know  the  key.  The  key  is  a  string  of  characters  that  you  create. 

When  using  WEP,  you  must  determine  the  level  of  encryption.  The  type  of  encryption 

determines  the  key  length.  128-bit  encryption  requires  a  longer  key  than  64-bit  encryption. 

Keys are defined by entering in a string in HEX (hexadecimal - using characters 0-9, A-F) or 

ASCII  (American  Standard  Code  for  Information  Interchange 

–  alphanumeric  characters) 

format.  ASCII  format  is provided so  you  can enter  a  string  that is  easier to  remember.  The 

ASCII string is converted to HEX for use over the network. Four keys can be defined so that 

you can change keys easily. 

 

 

Wi-Fi  - 

A  trade  name  for  the  802.11b  wireless  networking  standard,  given  by  the  Wireless 

Ethernet  Compatibility  Alliance  (WECA,  see  http://www.wi-fi.net),  an  industry  standards 

group promoting interoperability among 802.11b devices. 

 

 

WLAN  - 

(

W

ireless 

L

ocal 

A

rea 

N

etwork)  -  A  group  of  computers  and  associated  devices 

communicate  with  each  other  wirelessly,  which  network  serving  users  are limited  in  a  local 

area. 

 

 

WPA  - 

(

W

i-Fi 

P

rotected 

A

ccess) 

A  wireless  security  protocol  use  TKIP  (Temporal  Key 

Integrity Protocol) encryption, which can be used in conjunction with a RADIUS server. 

Содержание AWUS036NHA

Страница 1: ...User s Guide AWUS036NHA 150Mbps Wireless High Gain USB Adapter...

Страница 2: ...nnect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help This device complies with part...

Страница 3: ...tdoor use and public service France Outdoor use limited to 10 mW e i r p within the band 2454 2483 5 MHz Military Radiolocation use Refarming of the 2 4 GHz band has been ongoing in recent years to al...

Страница 4: ...3 Configuration for Windows XP 9 3 1 Current Status 9 3 2 Profile Management 11 3 2 1 Add or Modify a Configuration Profile 11 3 2 2 Remove a profile 15 3 2 3 Switch another Profile 16 3 2 4 Export a...

Страница 5: ...6NHA including Atheros Wireless Client Utility and Drivers User Guide Other Helpful Information Note Make sure that the package contains the above items If any of the listed items are damaged or missi...

Страница 6: ...up Wizard guides you step by step through the installation process the Atheros Wireless Client Utility ACU helps you create a wireless connection immediately With unmatched wireless performance recept...

Страница 7: ...ternately The adapter is trying to scan a networking connection Activity Green Status Green Intermittently The adapter is already connected but is not transmitting or receiving data Activity Green Sta...

Страница 8: ...vers When you install the hardware prior to before installing the software the system will prompt Found New Hardware Wizard click Cancel and run the Setup Wizard program on the CD ROM The Setup steps...

Страница 9: ...cense Agreement you should choose a Setup type It is recommended that you select Install Client Utilities and Driver Select Install Driver Only to install driver only select Make Driver Installation D...

Страница 10: ...then click Next in the screen below shown in Figure 2 5 Figure 2 5 6 After that select the program folder you should create a new folder name or select one from the Existing Folders list It is recomm...

Страница 11: ...e 2 6 7 Choose configuration tool if you are not sure please leave it default Then click Next to continue Figure 2 7 8 Click OK to continue the Installation Wait a while for the setup as shown in Figu...

Страница 12: ...ove you will see the screen below click Finish to reboot the system Figure 2 10 Now carefully insert the device into the USB port of your computer Windows will automatically detect the device and disp...

Страница 13: ...connection If the icon is red there is poor signal strength and the RSSI is less than 5dB If the icon is yellow there is poor signal strength and the RSSI is between 5dB and 10dB If the icon is green...

Страница 14: ...shown here The options include Infrastructure access point Ad Hoc Note You can configure the network type and wireless mode on the Advanced tab of Profile Management IP Address This displays the comp...

Страница 15: ...Modify a Configuration Profile To add a new configuration profile click New on the Profile Management tab To modify a configuration profile select the configuration profile from the Profile list and c...

Страница 16: ...eld has a maximum limit of 32 characters Figure 3 3 2 Edit the Security tab Select the Security tab in the screen above and then you can edit the fields to configure the profile To define the security...

Страница 17: ...sociated has WEP set and the client has WEP enabled make sure that Allow Association to Mixed Cells is checked on the Security tab to allow association To complete WEP encryption configuration you mus...

Страница 18: ...modes of networking Infrastructure All wireless clients will connect to an access point or wireless router Ad Hoc Directly connecting to another computer for peer to peer communication using wireless...

Страница 19: ...o an access point Auto Automatic causes the adapter to attempt authentication using shared but switches it to open authentication if shared fails Open Open System enables an adapter to attempt authent...

Страница 20: ...ofile to export 2 Click Export the Export Profile window will then appear below 3 Browse the directory to export the profile to 4 Click Save The profile should then be exported to the specified locati...

Страница 21: ...General tab screen Fill in the Profile name and click OK to create the configuration profile for that network Figure 3 10 3 2 7 Auto Profile Selection Management The auto selection feature allows the...

Страница 22: ...ection is enabled by checking Auto Select Profiles on the Profile Management tab the client adapter will scan for an available network The profile with the highest priority and the same SSID as one of...

Страница 23: ...l see the adapter information including general information about the wireless network adapter and the Network Driver Interface Specification NDIS driver Access the adapter information from the Diagno...

Страница 24: ...eive and Transmit Statistical Information The Advanced Statistics show receiving and transmitting statistical information about the following receiving and transmitting diagnostics for frames received...

Страница 25: ...54Mbps 11n Up to 150Mbps Modulation 11b CCK QPSK BPSK 11n 11g OFDM Media Access Protocol CSMA CA with ACK Data Security WPA WPA2 64 128 bit WEP TKIP AES Frequency 2 4 2 4835GHz Spread Spectrum Direct...

Страница 26: ...data transmitted This bit pattern is called a chip or chipping code Even if one or more bits in the chip are damaged during transmission statistical techniques embedded in the receiver can recover th...

Страница 27: ...provided that the receiver knows the parameters of the spread spectrum signal being broadcast If a receiver is not tuned to the right frequency a spread spectrum signal looks like background noise Th...

Страница 28: ...termines the key length 128 bit encryption requires a longer key than 64 bit encryption Keys are defined by entering in a string in HEX hexadecimal using characters 0 9 A F or ASCII American Standard...

Отзывы: