Edimax 802.11b/g WLAN USB adapter with Wi-Fi Detector Скачать руководство пользователя страница 33

 

 

5.  What is Infrastructure

 

An integrated wireless a nd wireless and wired LAN is called a n Infrastructure 

config uratio n. Infrastruct ure is applicab le to enterprise scale for wireless access to 

central database, or wireless applicatio n for mobile workers. 

 

6.  What is BSS ID

 

A specific Ad hoc LAN is called a Basic Service Set (BSS). Comp uters in a BSS must 

be config ured with t he same BSS ID. 

 

7.  What is WEP

 

WEP is Wired Equivale nt Privacy, a data privacy mec ha nis m based o n a 40 bit shared 

key algorithm, as described in the IEEE 802 .11 standard. 

 

8.  What is TKIP? 

TKIP is a quick-fix met hod to quickly o vercome the inhere nt weaknesses in WEP 

security, especially the re use of encryptio n keys. TKIP is invo lved in the IEEE 802.11i 

WLAN sec urity standard, and the spec ificatio n mig ht be officially released by early 

2003. 

 

9.  What is AES? 

AES (Ad va nced Encryptio n Sta ndard), a chip-based sec urity, has bee n de veloped to 

ens ure the  hig hest degree of security and a uthe nticity for digital informatio n, wherever 

and  howe ver communicated or stored, while making more efficient  use of hardware 

and/or software than pre vio us e ncryptio n sta ndards. It is also inc luded in IEEE 802.11 i 

standard. Compare with AES, TKIP is a temporary protocol for replacing WEP sec urity 

until ma nufact urers imple me nt AES at the hardware leve l. 

 

10. Can Wireles s products support printer sharing

  

Wireless products perform the same functio n as LAN prod ucts. Therefore, Wireless 

products can work with Netware, Windows 2000, or other LAN operating systems to 

support printer or file sharing. 

 

11. Would the information be intercepted while transmitting on air

 

WLAN features two-fold protection in secur ity. On the hardware side, as with Direct 

Seq ue nce Spread Spectr um tec hnolo gy, it has the inhere nt secur ity feature of 

scrambling. On the software side, WLAN series offer the encryptio n functio n (WEP) to 

enha nce sec urity and Access Co ntrol.  Users can set it up depe nd ing  upo n the ir needs. 

 

 

 

 

 

 

 

 

 

28 

Содержание 802.11b/g WLAN USB adapter with Wi-Fi Detector

Страница 1: ...8 80 02 2 1 11 1b b g g W WL LA AN N U US SB B A Ad da ap pt te er r w wi it th h W Wi i F Fi i D De et te ec ct to or r User s Manual Version 1 1 Mar 2006...

Страница 2: ...arranties merchantability or fitness for any particular purpose Any software described in this manual is sold or licensed as is Should the programs prove defective following their purchase the buyer a...

Страница 3: ...an outlet on a circuit different from that to which the receiver is connected 4 Consult the dealer or an experienced radio technician for help FCC Caution This equipment must be installed and operated...

Страница 4: ...of those who install and use it However special attention must be paid to the dangers of electric shock and static electricity when working with electrical equipment All guidelines of this and of the...

Страница 5: ...Detector 5 5 How to install the driver and utility 7 6 How to configure the utility 12 6 1 Wireless Connection Status 12 6 2 General Connection Setting 14 6 3 WEP and WPA Encryption 17 6 3 1 WEP Setti...

Страница 6: ...y This adapter has built in AES engine which ensure the highest degree of security and authenticity for digital information and it is the most advanced solution defined by IEEE 802 11i for the securit...

Страница 7: ...ver Transmit Power 16dBm Typical Dimension 14 H x 28 5 W x 91 D Temperature 32 140 F 0 60 C Humidity 0 85 NonCondensing Certification FCC CE 1 3 Package Contents Before you begin the installation plea...

Страница 8: ...2 The Outward Appearance of the Wi Fi Detector 3...

Страница 9: ...when the Wi Fi detector is being used as a wireless USB adapter to surf the internet 2 When the Wi Fi detector is finished recharging it will automatically stop charging the battery When it is finishe...

Страница 10: ...o detect Wi Fi signals In scanning mode the display will display the total number of both non encrypted and encrypted Wi Fi signals detected 3 Once scanning mode is complete the detector will enter it...

Страница 11: ...l is an infrastructure mode signal Ad indicates the signal is an Adhoc mode signal 7 Battery indicator with 3 bars indicating battery power When the indicator is empty please recharge the detector by...

Страница 12: ...m from the CD Note2 The following installation was operated in Windows XP Procedures are similar for Windows 98SE Me 2000 2003 Server Note3 If you have installed the Wireless PC Card driver utility be...

Страница 13: ...B If you want to install the software program in another location click Browse and select an alternative destination Then click Next C Click Continue Anyway to finish the installation 8...

Страница 14: ...SB adapter into the USB port of your computer B The Found New Hardware Wizard is displayed select Install the software automatically Recommended and click Next C Click Continue Anyway and the system w...

Страница 15: ...n Utility To setup the USB adapter double click the icon in the system tray For Windows XP there is a Windows Zero Configuration Tool by default for you to setup wireless clients If you want to use th...

Страница 16: ...uble click the utility icon in the system tray B Click Yes to use the utility of the USB adapter 11 Second Way A Double click the icon B Click Advance C Uncheck Use Windows to configure my wireless ne...

Страница 17: ...install the adapter to PC or laptop with USB 2 0 interface This adapter runs at lower performance while you connect it to the USB 1 1 1 0 port of your computer instead 2 This adapter will work in 11b...

Страница 18: ...nd the wireless station on the list 1 Double click the wireless station on the list directly 2 Select the station you intend to connect and then click Connect this site Current Network Information Dis...

Страница 19: ...ality TX Frame It shows the number of data frames which are transmitted by the adapter successfully RX Frame It shows the number of data frames which are received by the adapter successfully 6 2 Gener...

Страница 20: ...nly the device with the same SSID can interconnect to the adapter Any If Any check box is enabled the adapter will survey and connect to one of the available wireless stations without checking the con...

Страница 21: ...Click this button to setup the WPA function Please refer to Section 6 3 for the details Profile Profile Name You can save the network setting as a profile To connect to the network without making addi...

Страница 22: ...This adapter is also built in AES engine which ensure the highest degree of security and authenticity for digital information and it is the most advanced solution defined by IEEE 802 11i for the secu...

Страница 23: ...ings 6 3 2 WPA Setting The adapter can automatically detect the WPA setting of the AP which the adapter intends to connect to To connect to the AP you should setup the same setting with the AP There a...

Страница 24: ...e contact with your administrator TLS Select a certificate from the Certificate list PEAP Input the User Name and Password and also select a certificate from the Certificate list User Name It is the s...

Страница 25: ...he fragmentation threshold and RTS CTS threshold of the adapter Parameter Description User Interface Select the display language of the utility Two languages are enabled English and Chinese Country Ro...

Страница 26: ...ve decreased this value and experience high packet error rates you can increase it again but it will likely decrease overall network performance Select a setting within a range of 256 to 2346 bytes Mi...

Страница 27: ...s which are connecting to the AP Current Network Setting Display the connection setting of the current network It includes Channel SSID WEP and TX Power Level More Setting For setting more functions i...

Страница 28: ...ral Connection Setting Channel Select the number of the radio channel used by the AP The wireless adapters which connects to the AP should set up the same channel Basic Rate Select the basic data tran...

Страница 29: ...he AP will not appear in the site survey list of any wireless adapters It means Only the wireless adapters set the same SSID can connect to the AP It aviods the AP being connected by unauthorized user...

Страница 30: ...sent and the packet is transmitted directly to the WLAN Select a setting within a range of 0 to 2347 bytes Minor change is recommended Preamble The preamble defines the length of the CRC block for co...

Страница 31: ...ireless adapters with the MAC Address setup in the table will be rejected to connect to the AP Filter MAC Address MAC Address is a unique identification for hardware devices in the network It is a 12...

Страница 32: ...as a mandatory new coding scheme for 6 12 and 24 Mbps mandatory speeds and 18 36 48 and 54 Mbps optional speeds The ERP includes the modulation schemes found in 802 11b including CCK for 11 and 5 5 M...

Страница 33: ...sed security has been developed to ensure the highest degree of security and authenticity for digital information wherever and however communicated or stored while making more efficient use of hardwar...

Страница 34: ...e original data without the need for retransmission To an unintended receiver DSSS appears as low power wideband noise and is rejected ignored by most narrowband receivers 13 What is Spread Spectrum S...

Отзывы: