background image

What is BSS ID? 

A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the 
same BSS ID. 
 

What is WEP? 

WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key algorithm, as 
described in the IEEE 802 .11 standard. 
 

What is TKIP? 

TKIP is a quick-fix method to quickly overcome the inherent weaknesses in WEP security, especially the 
reuse of encryption keys. TKIP is involved in the IEEE 802.11i WLAN security standard, and the specification 
might be officially released by early 2003. 
 

What is AES? 

AES (Advanced Encryption Standard), a chip-based security, has been developed to ensure the highest 
degree of security and authenticity for digital information, wherever and however communicated or stored, 
while making more efficient use of hardware and/or software than previous encryption standards. It is also 
included in IEEE 802.11i standard. Compare with AES, TKIP is a temporary protocol for replacing WEP 
security until manufacturers implement AES at the hardware level. 
 

Can Wireless products support printer sharing?  

Wireless products perform the same function as LAN products. Therefore, Wireless products can work with 
Netware, Windows 2000, or other LAN operating systems to support printer or file sharing. 
 

Would the information be intercepted while transmitting on air? 

WLAN features two-fold protection in security. On the hardware side, as with Direct Sequence Spread 
Spectrum technology, it has the inherent security feature of scrambling. On the software side, WLAN series 
offer the encryption function (WEP) to enhance security and Access Control. Users can set it up depending 
upon their needs. 
 

What is DSSS? What is FHSS? And what are their differences? 

Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that changes frequency in a pattern 
that is known to both transmitter and receiver. Properly synchronized, the net effect is to maintain a single 
logical channel. To an unintended receiver, FHSS appears to be short-duration impulse noise. Direct-
sequence spread-spectrum (DSSS) generates a redundant bit pattern for each bit to be transmitted. This bit 
pattern is called a chip (or chipping code). The longer the chip is, the greater the probability that the original 
data can be recovered. Even if one or more bits in the chip are damaged during transmission, statistical 
techniques embedded in the radio can recover the original data without-the need for retransmission. To an 
unintended receiver, DSSS appears as low power wideband noise and is rejected (ignored) by most 
narrowband receivers. 
 

What is Spread Spectrum? 

Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in 
reliable, secure, mission-critical communication systems. It is designed to trade off bandwidth efficiency for 
reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of 
narrowband transmission, but the trade off produces a signal that is, in effect, louder and thus easier to 
detect, provided that the receiver knows the parameters of the spread-spectrum signal being broadcast. If a 
receiver is not tuned to the right frequency, a spread –spectrum signal looks like background noise. There 
are two main alternatives, Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread 
Spectrum (FHSS). 
 

What is WMM? 

Wi-Fi Multimedia (WMM), a group of features for wireless networks that improve the user experience for 
audio, video and voice applications. WMM is based on a subset of the IEEE 802.11e WLAN QoS draft 
standard. WMM adds prioritized capabilities to Wi-Fi networks and optimizes their performance when 
multiple concurring applications, each with different latency and throughput requirements, compete for 
network resources. By using WMM, end-user satisfaction is maintained in a wider variety of environments 
and traffic conditions. WMM makes it possible for home network users and enterprise network managers to 
decide which data streams are most important and assign them a higher traffic priority. 
 

What is WMM Power Save? 

WMM Power Save is a set of features for Wi-Fi networks that increase the efficiency and flexibility of data 
transmission in order to conserve power. WMM Power Save has been optimized for mobile devices running 
latency-sensitive applications such as voice, audio, or video, but can benefit any Wi-Fi device. WMM Power 
Save uses mechanisms included in the IEEE 802.11e standard and is an enhancement of IEEE 802.11 
legacy power save. With WMM Power Save, the same amount of data can be transmitted in a shorter time 
while allowing the Wi-Fi device to remain longer in a low-power “dozing” state. 

Содержание WL250N-USB

Страница 1: ... company makes no representations or warranties either expressed or implied with respect to the contents hereof and specifically disclaims any warranties merchantability or fitness for any particular purpose Any software described in this manual is sold or licensed as is Should the programs prove defective following their purchase the buyer and not this company its distributor or its dealer assume...

Страница 2: ...se undesired operation Any changes or modifications not expressly approved by the party responsible for compliance could void the authority to operate equipment Federal Communication Commission FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure set forth for an uncontrolled environment In order to avoid the possibility of exceeding the FCC radio frequency exposure...

Страница 3: ... An Access Point To Profile 2 2 2 Using Windows Zero Configuration 2 3 Connection Profile Management 2 3 1 Add A profile 2 3 2 Edit An Existing Profile 2 3 3 Delete An Existing Profile 2 3 4 Activate A Profile 2 4 Advanced Settings 2 5 View Network Statistics 2 6 WMM Setting 2 7 WPS Configuration 2 7 1 WPS Setup PBC Push Button Configuration 2 7 2 WPS Setup PIN 2 8 Radio On Off 2 9 About 2 10 On l...

Страница 4: ...s network dongle at or near hot or humid places like kitchen or bathroom Also do not left this wireless network dongle in the car in summer 3 This network dongle is small enough to put in a child s mouth and it could cause serious injury or could be fatal If they throw the network dongle the dongle will be damaged PLEASE KEEP THIS NETWORK DONGLE OUT THE REACH OF CHILDREN 4 This network dongle will...

Страница 5: ... 2 1 Network Dongle Installation With Ralink Configuration Tools Please follow the following instructions to install your new wireless network dongle 1 Insert the Setup CD into your optical drive of your computer Click Next to accept the license agreement 2 It is recommend installing driver and utility if the network dongle is installing for the first time If you want to update the driver only cho...

Страница 6: ...tion Otherwise please select Microsoft Zero Configuration Tool then click Next 4 Please wait while the install procedure is running When you see this message please click Finish to complete the driver installation process 5 A new icon will appear at lower right corner of your computer desktop you can put the mouse cursor on the icon and the status of wireless dongle will be displayed as a popup ba...

Страница 7: ... specific wireless access point or the access point you wish to connect uses encryption you have to configure the wireless network dongle and input required parameters to get connected to the wireless access point you wish to connect NOTE In Vista the network dongle will not connect to any unencrypted wireless access point automatically There are two ways you can configure your wireless network do...

Страница 8: ...e here sometimes If you still can not see the access point you wish to use after clicking Rescan for more than five times please move your computer closer to the location where the wireless access point is If you wish to see detailed information for a specific access point please double click on it and you ll be provided with its detailed information 2 2 1 2 Connect To An Access Point If the wirel...

Страница 9: ... owner of the wireless access point you want to connect and input the correct key here and then click OK By checking Show Password box the encryption key you inputted here will be displayed If the value you inputted here is wrong you will not be able to connect to this wireless access point Authentication type will be selected by the authentication type of the access point automatically please don...

Страница 10: ...ng to another computer using Ad Hoc mode please select Ad hoc here If you selected an access point from the list above please keep this field unchanged Tx Power You can select the wireless output power here If you re not too far from access point good signal reception you can select a lower output power to save energy for a distant access point you can select a higher output power It s suggested t...

Страница 11: ...elected automatically and please do not modify it WPA Preshared Key Input WPA preshared key here If encryption is not enabled or you select WEP as encryption type this field will be disabled and grayed out WEP Key You can select key type Hexadecimal or ASCII and input WEP key here If encryption is not enabled or you select WPA as encryption type this field will be disabled and grayed out You can s...

Страница 12: ...ion resumption here If you don t know if you should enable session resumption or not please ask your 802 1x authentication administrator ID Password tab Input 802 1x username ID and password and other information if it is required here Click Show Password to show the password you typed Client Certification tab Use this tab to select a local certificate from dropdown menu If the access point you wi...

Страница 13: ...l be displayed here If the access point you want to use is not displayed here please try to move your computer closer to the access point or you can click Refresh network list to rescan access points Click the access point you want to use if it s shown then click Connect If the access point is protected by encryption you have to input its security key or passphrase here It must match the encryptio...

Страница 14: ... as a profile for every access point so you don t have to input these parameters every time when you want to connect to a specific wireless access point To manage profiles right click the Ralink configuration utility icon located at lower right corner of computer desktop then click Launch Config Utility Click the Profile menu All profiles will be listed in Profile List and you can select a profile...

Страница 15: ...bed in Section 2 2 1 3 2 3 2 Edit An Existing Profile If you have added a profile before and you wish to change the content of the profile you can use this function Please select a profile from the list first then click Edit button You ll be provided with the contents of selected profile and you can edit them Click OK to save changes or click Cancel to discard changes ...

Страница 16: ...delete it Select the profile you wish to delete from the list and click Delete button to delete it 2 3 4 Activate A Profile When you want to connect to a specific wireless device in the profile list you can select it and click Activate button to establish connection with it ...

Страница 17: ...understand what it means and you need to roam between multiple access points Show Authentication Status Dialog When your computer is being authenticated by wireless authentication server a dialog window with the process of authentication will appear This function is helpful to find out the problem when you cannot be authenticated and you can provide this information to authentication server s admi...

Страница 18: ...le provides WMM Wi Fi Multimedia function which can improve the performance of certain network applications like audio video streaming network telephony VoIP and others When you enable the WMM function of this network dongle you can define the priority of different kinds of data to give higher priority to applications that require instant responding Therefore you can improve the performance of suc...

Страница 19: ...er right corner of computer desktop and then click Launch Config Utility Click WPS menu and the following settings will appear Set Config Mode to Enrollee and then push the WPS button on your wireless access point the button used to activate WPS standby mode may have another name or use other way to start WPS PBC standby mode as the instruction given by your wireless access point s user manual You...

Страница 20: ...to access point by this way please make sure the PIN code you provided to access point is correct There are also some options available for WPS configuration WPS associate IE Check this box to send the association request with WPS IE during WPS setup This is optional and you can use default value if you don t know what will be affected WPS probe IE Check this box to send the WPS probe request with...

Страница 21: ...ault If you want to switch to AP mode please right click Ralink utility icon and select Switch to AP Mode After you select Switch to AP Mode the Ralink utility icon will changed A configuration window will appear after you switch the operation mode to AP which asks you to assign an existing network card with internet connection If your computer has another network card which is connected to Intern...

Страница 22: ...x and wireless clients will not be able to share data with each other Hide SSID Check this box and the SSID will not be broadcasted to the public Your wireless clients must know the exact SSID to be able to connect to your computer This option is useful to enhance security level Allow BW 40 MHz Check this box to allow BW 40MHz capability Tx BURST Check this box to accelerate the data transmit rate...

Страница 23: ...ckets to change the unit of time interval every 10 seconds or a thousand data packets times the value you specified in Group Rekey Interval field Wep Key Please input the WEP encryption key here when you select WEP as encryption type There are 2 types of WEP key Hex number 0 to 9 and ASCII characters A to F and ASCII all alphanumerical characters plus symbols Please select the type of WEP key firs...

Страница 24: ... in MAC address field to the list Delete Please select a MAC address from the list then click Delete button to remove it Remove All Delete all MAC addresses in the list When you finish with setting and want to save changes click Apply button 3 4 Connection Table If you want to see the list of all wireless clients connected to this access point please select Mac Table tab from the utility Here are ...

Страница 25: ...3 5 Event Log This software access point will log all wireless related activities as a log Click Event Log tab and the event log will be displayed You can click Clear to remove all entries in the log ...

Страница 26: ...ility driver and other important information about your wireless access point CHAPTER IV Appendix 4 1 Specification Standards IEEE 802 11b g Interface USB 2 0 USB 1 1 Compatible Frequency Band 2 4000 2 4835GHz Data Rate 11b 1 2 5 5 11Mbps 11g 6 9 12 24 36 48 54Mbps 11n 20MHz MCS0 7 up to 72Mbps 11n 40MHz MCS0 7 up to 150Mbps Securities WEP 64 128 WPA WPA2 Antenna Internal Printed Antenna Drivers W...

Страница 27: ...vides for up to 54 Mbps data rate in the 2 4 GHz band 802 11g is quickly becoming the next mainstream wireless LAN technology for the home office and public networks 802 11g defines the use of the same OFDM modulation technique specified in IEEE 802 11a for the 5 GHz frequency band and applies it in the same 2 4 GHz frequency band as IEEE 802 11b The 802 11g standard requires backward compatibilit...

Страница 28: ...lity that the original data can be recovered Even if one or more bits in the chip are damaged during transmission statistical techniques embedded in the radio can recover the original data without the need for retransmission To an unintended receiver DSSS appears as low power wideband noise and is rejected ignored by most narrowband receivers What is Spread Spectrum Spread Spectrum technology is a...

Страница 29: ... data by multiple antenna to improve data transfer performance By using multiple antennas not only data transfer rate is improved but also the wireless stability What is WPS WPS stands for Wi Fi Protected Setup It provides a simple way to establish unencrypted or encrypted connections between wireless clients and access point automatically User can press a software or hardware button to activate W...

Отзывы: