CompUSA 333626 Скачать руководство пользователя страница 21

 

21

8.  What is TKIP? 

TKIP is a quick-fix method to quickly overcome the inherent weaknesses in WEP security, especially 
the reuse of encryption keys. TKIP is involved in the IEEE 802.11i WLAN security standard. 

9.  What is AES? 

AES (Advanced Encryption Standard), a chip-based security, has been developed to ensure the highest 
degree of security and authenticity for digital information, wherever and however communicated or 
stored, while making more efficient use of hardware and/or software than previous encryption standards. 
It is also included in IEEE 802.11i standard. Compare with AES, TKIP is a temporary protocol for 
replacing WEP security until manufacturers implement AES at the hardware level. 

10. Can Wireless products support printer sharing?  

Wireless products perform the same function as LAN products. Therefore, Wireless products can work 
with Netware

®

, Windows

®

 2000, or other LAN operating systems to support printer or file sharing. 

11. Would the information be intercepted while transmitting on air? 

WLAN features two-fold protection in security. On the hardware side, as with Direct Sequence Spread 
Spectrum (DSSS) technology, it has the inherent security feature of scrambling. On the software side, 
WLAN series offer the encryption function (WEP) to enhance security and Access Control. Users can 
set it up depending upon their needs. 

12. What is DSSS? What is FHSS? And what are their differences? 

Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that changes frequency in a 
pattern that is known to both transmitter and receiver. Properly synchronized, the net effect is to 
maintain a single logical channel. To an unintended receiver, FHSS appears to be short-duration 
impulse noise. Direct-sequence spread-spectrum (DSSS) generates a redundant bit pattern for each bit 
to be transmitted. This bit pattern is called a chip (or chipping code). The longer the chip is, the greater 
the probability that the original data can be recovered. Even if one or more bits in the chip are damaged 
during transmission, statistical techniques embedded in the radio can recover the original data without 
the need for retransmission. To an unintended receiver, DSSS appears as low power wideband noise 
and is rejected (ignored) by most narrowband receivers. 

13. What is Spread Spectrum? 

Spread Spectrum technology is a wideband radio frequency technique developed by the military for use 
in reliable, secure, mission-critical communication systems. It is designed to trade off bandwidth 
efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in the 
case of narrowband transmission, but the trade off produces a signal that is, in effect, louder and thus 
easier to detect, provided that the receiver knows the parameters of the spread-spectrum signal being 
broadcast. If a receiver is not tuned to the right frequency, a spread –spectrum signal looks like 
background noise. There are two main alternatives, Direct Sequence Spread Spectrum (DSSS) and 
Frequency Hopping Spread Spectrum (FHSS). 

 

 

 

Содержание 333626

Страница 1: ...54 Mbps Wireless G Mini USB Adapter SKU 333626 Rev 051216 ...

Страница 2: ... radio frequency energy and if not installed or used in accordance with the instructions may cause harmful interference to radio communication However there is no guarantee that interference will not occur in television reception which can be determined by turning the equipment off and on The user is encouraged to try and correct the interference by one or more of the following measures Reorient o...

Страница 3: ...P An Available USB Port CD ROM Drive for driver installation SYSTEM SPECIFICATIONS Complies with Both IEEE 802 11b IEEE 802 11g High Speed Data Transfer Rates Up To 54Mbps Supports Peer To Peer Communications Among Any Wireless Users No Access Point Required Supports 64 128bit WEP WPA and AES Functions Compliant with Both USB 2 0 and USB 1 1 Standards ...

Страница 4: ...s To install the driver and utility software for your Mini USB Adapter please follow the instructions below 1 Turn on your computer 2 Place the driver CD into the CD ROM drive of your computer 3 Click Start then Run then type D Setup exe in the dialog box NOTE D represents the drive letter assigned to the optical drive you are using If D is not the letter assigned to your optical drive replace D w...

Страница 5: ...on 7 During the installation your computer may ask you to plug your Mini USB Adapter into your computer If this occurs plug your Mini USB Adapter into an available USB port on your computer to complete the installation NOTE If your computer did not ask you to plug your Mini USB Adapter in during the installation please plug it into an available USB port on your computer after the installation is c...

Страница 6: ... access the Profile section to add a specific network manually To create a profile for your network please refer to the Profile section of this manual 1 The Ralink Wireless Utility icon will appear on the system tray on your desktop while your Mini USB Adapter is plugged in To access the utility double click on the icon to access the option menu 2 In Windows XP there is a Windows Zero Configuratio...

Страница 7: ...rks This list shows all available wireless networks within range of your Mini USB Adapter It also displays the information of the networks including the SSID BSSID Signal Strength Channel Encryption Method Authentication and Network Type If you want to connect to any network on the list double click the item on the list and your Mini USB Adapter will automatically connect to the selected network R...

Страница 8: ...reen check mark sign indicates the activated profile can establish a successful connection A red check mark sign indicates the activated profile can not establish a successful connection Add Click this button to open the Add Profile dialog box and add a new profile Delete Edit Button Click these buttons to delete or edit the selected profile Activate Button Click Activate to connect to the selecte...

Страница 9: ...he SSID into the field PSM Power Saving Mode The power saving function is only available when the network type is Infrastructure CAM Constantly Awake Mode Your Mini USB Adapter will always be in active mode PSM Power Saving Mode Enable your Mini USB Adapter in the power saving mode when it is idle Network Type Infrastructure This operation mode requires the presence of an 802 11 Access Point All c...

Страница 10: ...two modes including Auto and Long Preamble If Auto mode is selected your Mini USB Adapter will auto switch the preamble mode depending on the wireless network that your Mini USB Adapter is connecting to RTS Threshold Minimum packet size required for an RTS Request To Send For packets smaller than this threshold an RTS is not sent and the packet is transmitted directly to the wireless network Selec...

Страница 11: ...ion using either IEEE 802 1x Extensible Authentication Protocol EAP authentication or pre shared key PSK technology It provides a high level of assurance to enterprises small businesses and home users that data will remain protected and that only authorized users may access their networks For enterprises that have already deployed IEEE 802 1x authentication WPA offers the advantage of leveraging e...

Страница 12: ... changes the temporal key every 10 000 packets a packet is a kind of message transmitted over a network This ensures much greater security than the standard WEP security AES AES has been developed to ensure the highest degree of security and authenticity for digital information and it is the most advanced solution defined by IEEE 802 11i for security in wireless networks NOTE All devices in the ne...

Страница 13: ...ts identity and the AP relays this identity to an authentication server which is typically an external RADIUS server Using 802 1x Certification Parameter Description Authentication Type These settings have to be consistent with the wireless network that your Mini USB Adapter is connecting to Supported EAP authentication protocols are as followed PEAP TTLS PEAP and TTLS are similar and easier than ...

Страница 14: ... Tunneled Authentication Protocol When the authentication type is PEAP or TTLS select a protocol to be used to build the encrypted tunnel Identity This is the protected user EAP Identity used for authentication The identity specified may contain up to 63 ASCII characters is case sensitive and takes the form of a Network Access Identifier consisting of name of the user user s home realm The user s ...

Страница 15: ... placing the issuer s self signed certificate which contains the issuer s public key into the trusted root certification authority certificate store of the host computer Intermediate or subordinate certification authorities are trusted only if they have a valid certification path from a trusted root certification authority Server Name Enter the authentication server name Server Name Must Match Exa...

Страница 16: ... is 54Mbps Throughput Kbps Display the speed of data transmitted and received Link Quality This bar indicates the quality of the link The higher the percentage the better the quality dBm If you want to know the signal strength in the unit of dBm select this check box Signal Strength This bar shows the signal strength level The higher percentage shown in the bar the more radio signal has been recei...

Страница 17: ... mix If you have a mix of 802 11b and 802 11g wireless stations in your network it is recommended to set your Mini USB Adapter to this mode This mode is the default setting 802 11 B only This adapter will be compatible with 802 11b wireless stations ONLY If there are only 802 11b wireless stations in the network you can set your Mini USB Adapter to this mode 802 11 G only This adapter will be comp...

Страница 18: ...r to deliver better throughput in the same period and environment Enable TCP Window Size The TCP Window is the amount of data a sender can send on a particular connection before it gets an acknowledgment back from the receiver that it has received a portion of it When the Router or AP your Mini USB Adapter is connecting to have set up the TCP Window you can enable the parameter to meet the data si...

Страница 19: ...r is enabled Limit xxx milliseconds 0 2000 It limits the channel measurement time The default value is 250 milliseconds About By choosing this option you can click the hyperlink to connect to the website for more information on the wireless chipset vendor and review basic information about the Utilities such as the driver utility and EEPROM Version The MAC Address of your Mini USB Adapter is displ...

Страница 20: ...rotection mechanism called RTS CTS that governs how 802 11g devices and 802 11b devices interoperate 2 What is the IEEE 802 11b standard The IEEE 802 11b Wireless LAN standard subcommittee formulates the standard for the industry The objective is to enable wireless LAN hardware from different manufactures to communicate 3 What does IEEE 802 11 feature support The product supports the following IEE...

Страница 21: ... hopping spread spectrum FHSS uses a narrowband carrier that changes frequency in a pattern that is known to both transmitter and receiver Properly synchronized the net effect is to maintain a single logical channel To an unintended receiver FHSS appears to be short duration impulse noise Direct sequence spread spectrum DSSS generates a redundant bit pattern for each bit to be transmitted This bit...

Страница 22: ...22 ...

Страница 23: ...23 ...

Отзывы: