background image

HNW300CI  

User 

Manual 

12

 

 

Wireless PCI Card 

2.5 Network 

The 

Network

 tab displays the current status of the wireless radio. The following information is 

included in this tab, as the image depicts below. 
 

 

 

 

 

 

Status

: This indicates the state of the client. There are three options: 

o

 

Associated

: Indicates that the wireless client is connected to an Access Point (AP). 

The BSSID is shown in the form of 12 HEX digits, which is the MAC address of the AP. 

o

 

Scanning

: Indicates that the wireless client is searching for an AP in the area. 

o

 

Disconnected

: Indicates that there are no APs or clients in the area.  

 

Extra Info

: Displayed here are information about the link stats and the percent of output 

power. 

 

Current Channel

: The operating frequency channel that the client is using (infrastructure 

mode). 

 

Link Speed:

 The current rate at which the client is transmitting and receiving. 

 

Throughput (bytes/sec)

: Displays the Tx (transmit) and Rx (receive) kilo-bytes per second. 

 

Link Quality

: In infrastructure mode, this bar displays the transmission quality between an 

AP and a client. In Ad-hoc mode, this bar displays the transmission quality between one 
client, and another. 

 

Signal Strength

: This bar displays the strength of the signal received from an AP or client. 

 

Noise Level

: Displays the background noise level; a lower level indicates less interference. 

 

Click on the 

OK

 button to close this window. 

 

dBm

 

Check Box

. When you click on the check box as the drawing below. The signal 

strength and noise level will be shown as the dBm measurements. 

 

Содержание HNW300CI

Страница 1: ...Wireless PCI Card IEEE 802 11n 300Mbps USER MANUAL www hamletcom com...

Страница 2: ...ass B EN 61000 4 2 1995 A1 1998 A2 2001 EN 61000 4 3 2006 A1 2008 CE Mark Warning This is a Class B product In a domestic environment this product may cause radio interference in which case the user m...

Страница 3: ...K 12 2 6 SITE SURVEY 13 2 7 STATISTICS 14 2 8 WPS 14 2 9 ABOUT 15 2 10 UNINSTALL THE DRIVERS CLIENT UTILITY 15 3 PCI CARD ADAPTER FOR WINDOWS 2000 XP 16 3 1 BEFORE YOU BEGIN 16 3 2 INSTALLING THE DRIV...

Страница 4: ...plements the latest 11n 2 0 technology which extremely improves wireless signal for your computer than existing wireless 802 11g technology It supports the 1T2R architecture with fully forward compati...

Страница 5: ...Network conditions and environmental factors lower actual throughput rate All specifications are subject to change without notice 1 2 Package Contents Open the package carefully and make sure that no...

Страница 6: ...nd before installing the drivers 2 2 Installing the Drivers Follow the steps below in order to install the PCI CARD drivers Insert the CD ROM that was provided to you in this package The setup should...

Страница 7: ...rt the PCI Card into the PCI slot Windows will then detect and install the new hardware An Hamlet icon will then appear in the system tray Right click on the icon and then click on Launch Config Utili...

Страница 8: ...tings A profile can be configured as Infrastructure or Ad hoc mode The configuration settings for each mode are described below 2 3 1 Infrastructure Mode The infrastructure mode requires the use of an...

Страница 9: ...rs equipped with the PC Cards that form a wireless network whenever they are within range of one another In ad hoc mode each client is peer to peer would only have access to the resources of the other...

Страница 10: ...racter string into the field For 64 bit enter 5 alphanumeric or 10 hexadecimal characters For 128 bit enter 13 alphanumeric or 26 hexadecimal characters Click on the Apply button to save the changes S...

Страница 11: ...e computer matches that of the Access Point This approach offers the simplicity of the WEP key but uses stronger TKIP encryption EAP Extensible Authentication Protocol is an extension to the PPP proto...

Страница 12: ...and the percent of output power Current Channel The operating frequency channel that the client is using infrastructure mode Link Speed The current rate at which the client is transmitting and receivi...

Страница 13: ...receiving signal strength from the Access Point Channel Displays the channel number of the Access Point Encryption Displays the encryption on the Access Point this includes WEP TKIP AES or None Authe...

Страница 14: ...after retry received with CRC error duplicate frames received etc 2 8 WPS Click on the WPS Configuration tab WPS is used for WiFi Protected Setup By pressing this button the security settings of the d...

Страница 15: ...lation is unsuccessful for any reason the best way to solve the problem may be to completely uninstall the PCI CARD and its utility and repeat the installation procedure again Follow the steps below i...

Страница 16: ...vided to you in this package The setup should run automatically If the setup does not run automatically then you must manually select the setup exe file from the CD ROM drive Once the setup begins you...

Страница 17: ...ome office caf etc When adding a profile you are required to enter a profile name and SSID as well as configure the power saving mode network type RTS fragmentation threshold and encryption authentica...

Страница 18: ...k is always connected to the power supply o PSM Power Saving Mode Select this option if your notebook uses its battery power This option minimizes the battery usage while the network is idle Network T...

Страница 19: ...the network or select one from the drop down list The SSID is a unique name shared among all points in your wireless network The SSID must be identical for all points in the network and is case sensi...

Страница 20: ...adio using one of the Keys from a panel When you use WEP to communicate with the other wireless clients all the wireless devices in this network must have the same encryption key or pass phrase The fo...

Страница 21: ...y checking feature which makes sure that keys haven t been tampered with EAP Extensible Authentication Protocol is an extension to the PPP protocol that enables a variety of authentication protocols t...

Страница 22: ...Authentication Protocol is an extension to the PPP protocol that enables a variety of authentication protocols to be used It passes through the exchange of authentication messages allowing the authen...

Страница 23: ...s used by others sessions Dynamic key delivery eliminates one big vulnerability static encryption keys that are shared by all stations in the WLAN EAP Extensible Authentication Protocol is an extensio...

Страница 24: ...TLS Smartcard provides for certificate based and mutual authentication of the client and the network It relies on client side and server side certificates to perform authentication and can be used to...

Страница 25: ...be used It passes through the exchange of authentication messages allowing the authentication software stored in a server to interact with its counterpart in the client TLS Transport Layer Security is...

Страница 26: ...a check in this to enable the certificate use Certificate issuer Select the Certification Authority from the drop down list Allow intermediate certificates During tunnel creation the client must veri...

Страница 27: ...the client is using infrastructure mode Authentication Displays the authentication type Encryption Displays the encryption type Network Type Displays the network type infrastructure or ad hoc IP Addr...

Страница 28: ...al for all points in the network and is case sensitive Channel Displays the channel number of the Access Point Encryption Displays the encryption on the Access Point this includes WEP TKIP AES or None...

Страница 29: ...protection Select On to send a frame without protection and Off to send it with protection Enable Tx BURST Click the check box will enhance the throughput Enable TCP Window Size Enhance the throughpu...

Страница 30: ...f service QoS features to IEEE 802 11 networks WMM prioritizes traffic according to 4 AC Access Categories however it does not provide guaranteed throughput It is suitable for simple applications that...

Страница 31: ...ew PIN Code Config Mode The HNW300CI role playing as an Enrollee or an external Registrar Detail Information about Security and Key in the credential Connect Command to connect to the selected network...

Страница 32: ...bout tab displays information about the device such as the network driver version and date configuration utility version and date and the NIC Network Interface Card firmware version and date 3 11 Radi...

Страница 33: ...completely uninstall the PCI Card Adapter and its utility and repeat the installation procedure again Follow the steps below in order to uninstall the client utility Click on Start Hamlet HNW300CI Un...

Страница 34: ...ocols developed by Apple for their computer systems AppleTalk Address Resolution Protocol AARP Used to map the MAC addresses of Apple computers to their AppleTalk network addresses so that conversions...

Страница 35: ...at allows you to access resources on the web and provides them to you graphically C Cable modem A device that allows you to connect a computer up to a coaxial cable and receive Internet access from yo...

Страница 36: ...trum DSSS Modulation technique used by 802 11b wireless devices DMZ Demilitarized Zone A computer that logically sits in a no mans land between the LAN and the WAN The DMZ computer trades some of the...

Страница 37: ...e Transfer Protocol Easiest way to transfer files between computers on the Internet Full duplex Sending and Receiving data at the same time G Gain The amount an amplifier boosts the wireless signal Ga...

Страница 38: ...browser created and provided by Microsoft Internet Protocol The method of transferring data from one computer to another on the Internet Internet Protocol Security IPsec provides security at the packe...

Страница 39: ...port for a connection to a crossover cable MIB Management Information Base is a set of objects that can be managed by using SNMP Modem A device that Modulates digital signals from a computer to an an...

Страница 40: ...ire routing table at a regular interval which is how RIP functions P Password A sequence of characters that is used to authenticate requests to resources on a network Personal Area Network The interco...

Страница 41: ...l the routers on a network RJ 11 The most commonly used connection method for telephones RJ 45 The most commonly used connection method for Ethernet RS 232C The interface for serial communication betw...

Страница 42: ...rotocol for transmitting streams of printer data TCP IP Transmission Control Protocol Internet Protocol TFTP Trivial File Transfer Protocol is a utility used for transferring files that is simpler to...

Страница 43: ...Wired Equivalent Privacy is security for wireless networks that is supposed to be comparable to that of a wired network Wide Area Network The larger network that your LAN is connected to which may be...

Страница 44: ...4 QAM 16 QAM QPSK BPSK 802 11b DSSS DBPSK DQPSK CCK Operating Channels 11 for North America 14 for Japan 13 for Europe Receive Sensitivity Typical 2 412 2 472G IEEE802 11b 1Rx 91dBm 1Mbps 87dBm 11Mbps...

Страница 45: ...ng measures Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the rec...

Отзывы: