background image

23

   

WPA2

 

It is the second generation of WPA. WPA2 is based on the final IEEE 802.11i 
amendment to the 802.11 standard. 

 

Temporal Key Integrity Protocol (TKIP)

 

The Temporal Key Integrity Protocol, pronounced tee-kip, is part of the IEEE 
802.11i encryption standard for wireless LANs. TKIP is the next generation 

of WEP, the Wired Equivalency Protocol, which is used to secure 802.11 
wireless LANs. TKIP provides per-packet key mixing, a message integrity 

check and a re-keying mechanism, thus fixing the flaws of WEP. 
 

802.1x Authentication

 

802.1x is a framework for authenticated MAC-level access control, defines 
Extensible Authentication Protocol (EAP) over LANs (WAPOL). The standard 

encapsulates and leverages much of EAP, which was defined for dial-up 
authentication with Point-to-Point Protocol in RFC 2284. 

 
Beyond encapsulating EAP packets, the 802.1x standard also defines EAPOL 

messages that convey the shared key information critical for wireless 
security. 

 

Advanced Encryption Standard (AES)

 

Security issues are a major concern for wireless LANs, AES is the U.S. 
government’s next-generation cryptography algorithm, which will replace 

DES and 3DES. 

Содержание UGL2430-U2H2

Страница 1: ...ss N USB Adapter USER S GUIDE VERSION 1 0 All rights reserved All trade names are registered trademarks of respective manufacturers listed This manual may not be copied in any media or form without th...

Страница 2: ...Wireless LAN Basics 3 3 IP ADDRESS 4 4 Install Driver Utility 5 4 1 Windows XP Vista 5 5 Wireless Network Configuration 7 5 1 Utility Icon 7 5 2 Client Mode Default Setting 7 6 Technical Specification...

Страница 3: ...for help REGULATION INFORMATION The WLAN 11n USB Client Adapter must be installed and used in strict accordance with the manufacturer s instructions This device complies with the following radio freq...

Страница 4: ...This equipment is marked with the symbol and can be used throughout the European community Marking by the symbol indicates that usage restrictions apply France 2 4GHz for Metropolitan France In all M...

Страница 5: ...ins of each 22 MHz wide channel are shown in following Table Regulatory Domains Channel Identifier Frequency MHZ Japan ETSI North America Israel France Outdoor Mexico 1 2412 2 2417 3 2422 4 2427 5 243...

Страница 6: ...ISM Frequency Band Modulation Method IEEE 802 11b DSSS Direct Sequence Spread Spectrum IEEE 802 11g 802 11n OFDM Orthogonal Frequency Division Multiplexing Easy operation and setting up SYSTEM REQUIR...

Страница 7: ...to the Internet Ad Hoc Wireless Network Infrastructure Wireless Network The most obvious difference between Infrastructure wireless network and Ad Hoc wireless network is that the PCs in Infrastructur...

Страница 8: ...fied by a unique network address There are two methods to assign a network address to a computer on a TCP IP network Static IP addressing Dynamic IP addressing DHCP Client In network with static IP ad...

Страница 9: ...installation program after you insert the disk into your CD drive Step 1 Insert the installation CD into your CD ROM Choose the Setup Language and click Next button Step 2 Installation descriptions s...

Страница 10: ...10 Installing configuring WLAN utility Installing Drivers Step 3 Click Finish to complete installation...

Страница 11: ...cally 5 1 Utility Icon Client mode utility running but no Wireless N USB Adapter plugged Client mode utility running and Wireless N USB Adapter scan available network Client mode utility running and W...

Страница 12: ...he link between the node and its Access Point Link Quality is a measurement of receiving and transmitting performances over the radio Network Address displays current MAC Address IP Address Subnet And...

Страница 13: ...rescan available networks currently Select one of SSIDs and click Add to Profile to create profile that can be configured more wireless parameters In this page you can edit your profile name configur...

Страница 14: ...nters to check or evaluate the wireless performance Click Reset button to set counter to zero 5 2 6 Wi Fi Protected Setup An easy and secure setup solution for Wi Fi network you can choose PIN Code or...

Страница 15: ...15 Step 2 Select a specific AP Step 3 Enter the PIN code into your AP Step 4 Select AP that you want to configure Step 5 Wait for configuring your wireless AP to be the security setting...

Страница 16: ...16 PBC method Step 1 Push the PBC button Step 2 Push the physical button on your AP or visual button on the WPS config page...

Страница 17: ...ion Multiplexing RF Output Power 14dBm 11n 17dBm 11b 14dBm 11g Operation Mode Ad hoc Infrastructure Receiver Sensitivity 11Mbps 80dBm 8 54Mbps 70dBm 10 300Mbps 64dBm 10 Operation Range Indoor Up to 10...

Страница 18: ...emedy Make sure that you have installed the Utility from the attached CD Symptom The PC Card is linking but can t share files with others Remedy Make sure the file and printer sharing function is enab...

Страница 19: ...reless cards use to transmit data over the frequency spectrum The other method is frequency hopping Direct sequence spreads the data over one frequency range channel while frequency hopping jumps from...

Страница 20: ...t of rules that specify how a conversation is to take place including the format timing sequencing and or error checking SSID A Network ID unique to a network Only clients and Access Points that share...

Страница 21: ...ervices and or fiber optic cabling WANs may span a city a state a country or even the world Wired Equivalent Privacy WEP Now widely recognized as flawed WEP was a data encryption method used to protec...

Страница 22: ...TS CTS transactions Each station can have a different RTS threshold RTS CTS is used when the data packet size exceeds the defined RTS threshold With the CSMA CA transmission mechanism the transmitting...

Страница 23: ...mechanism thus fixing the flaws of WEP 802 1x Authentication 802 1x is a framework for authenticated MAC level access control defines Extensible Authentication Protocol EAP over LANs WAPOL The standar...

Отзывы: