background image

HNW300CI  

User 

Manual 

Wireless PCI Card

 

 

31 

3.9 WPS 

WPS is used for WiFi Protected Setup. By pressing this button, the security settings of the 
device will automatically synchronize with other wireless devices on your network that support 
Wi-Fi Protected Setup. 
 

 

 

 

Rescan:

 Click on this button to view a list of Access Points in the area. 

 

WPS Information:

 Display the information about WPS on the selected network. List 

information include Authentication Type, Encryption Type, Config Methods, Device 
Password ID, Selected Registrar, State, Version, AP Setup Locked, UUID-E and RF Bands 

 

Pin Code:

 8-digit numbers. It is required to enter PIN Code into 

Registrar

 using PIN method. 

When HNW300CI is 

Enrollee

, you can use "Renew" button to re-generate new PIN Code.

 

 

Config Mode: 

The HNW300CI role-playing as an 

Enrollee 

or an external 

Registrar 

 

Detail: 

Information about Security and Key in the credential.

 

 

Connect: 

Command to connect to the selected network inside credentials. The active 

selected credential is as like as the active selected Profile. 

 

Rotate:

 Command to rotate to connect to the next network inside credentials.

 

 

Disconnect:

 Stop WPS action and disconnect this active link. And then select the last 

profile at the Profile Page of RaUI if exist. If there is an empty profile page, the driver will 
select any non-security AP.

 

 

Export Profile:

 Export all credentials to Profile.

 

 

PBC:

 Start to add to AP using PBC configuration method.

 

 

WPS Associate IE:

 Send the association request with WPS IE during WPS setup. It is 

optional for HNW300CI.

 

 

WPS Probe IE: 

Send the probe request with WPS IE during WPS setup. It is optional for 

HNW300CI. 

 

Click on the 

OK

 button if you have made any changes. 

 

Содержание HNW300CI

Страница 1: ...Wireless PCI Card IEEE 802 11n 300Mbps USER MANUAL www hamletcom com...

Страница 2: ...ass B EN 61000 4 2 1995 A1 1998 A2 2001 EN 61000 4 3 2006 A1 2008 CE Mark Warning This is a Class B product In a domestic environment this product may cause radio interference in which case the user m...

Страница 3: ...K 12 2 6 SITE SURVEY 13 2 7 STATISTICS 14 2 8 WPS 14 2 9 ABOUT 15 2 10 UNINSTALL THE DRIVERS CLIENT UTILITY 15 3 PCI CARD ADAPTER FOR WINDOWS 2000 XP 16 3 1 BEFORE YOU BEGIN 16 3 2 INSTALLING THE DRIV...

Страница 4: ...plements the latest 11n 2 0 technology which extremely improves wireless signal for your computer than existing wireless 802 11g technology It supports the 1T2R architecture with fully forward compati...

Страница 5: ...Network conditions and environmental factors lower actual throughput rate All specifications are subject to change without notice 1 2 Package Contents Open the package carefully and make sure that no...

Страница 6: ...nd before installing the drivers 2 2 Installing the Drivers Follow the steps below in order to install the PCI CARD drivers Insert the CD ROM that was provided to you in this package The setup should...

Страница 7: ...rt the PCI Card into the PCI slot Windows will then detect and install the new hardware An Hamlet icon will then appear in the system tray Right click on the icon and then click on Launch Config Utili...

Страница 8: ...tings A profile can be configured as Infrastructure or Ad hoc mode The configuration settings for each mode are described below 2 3 1 Infrastructure Mode The infrastructure mode requires the use of an...

Страница 9: ...rs equipped with the PC Cards that form a wireless network whenever they are within range of one another In ad hoc mode each client is peer to peer would only have access to the resources of the other...

Страница 10: ...racter string into the field For 64 bit enter 5 alphanumeric or 10 hexadecimal characters For 128 bit enter 13 alphanumeric or 26 hexadecimal characters Click on the Apply button to save the changes S...

Страница 11: ...e computer matches that of the Access Point This approach offers the simplicity of the WEP key but uses stronger TKIP encryption EAP Extensible Authentication Protocol is an extension to the PPP proto...

Страница 12: ...and the percent of output power Current Channel The operating frequency channel that the client is using infrastructure mode Link Speed The current rate at which the client is transmitting and receivi...

Страница 13: ...receiving signal strength from the Access Point Channel Displays the channel number of the Access Point Encryption Displays the encryption on the Access Point this includes WEP TKIP AES or None Authe...

Страница 14: ...after retry received with CRC error duplicate frames received etc 2 8 WPS Click on the WPS Configuration tab WPS is used for WiFi Protected Setup By pressing this button the security settings of the d...

Страница 15: ...lation is unsuccessful for any reason the best way to solve the problem may be to completely uninstall the PCI CARD and its utility and repeat the installation procedure again Follow the steps below i...

Страница 16: ...vided to you in this package The setup should run automatically If the setup does not run automatically then you must manually select the setup exe file from the CD ROM drive Once the setup begins you...

Страница 17: ...ome office caf etc When adding a profile you are required to enter a profile name and SSID as well as configure the power saving mode network type RTS fragmentation threshold and encryption authentica...

Страница 18: ...k is always connected to the power supply o PSM Power Saving Mode Select this option if your notebook uses its battery power This option minimizes the battery usage while the network is idle Network T...

Страница 19: ...the network or select one from the drop down list The SSID is a unique name shared among all points in your wireless network The SSID must be identical for all points in the network and is case sensi...

Страница 20: ...adio using one of the Keys from a panel When you use WEP to communicate with the other wireless clients all the wireless devices in this network must have the same encryption key or pass phrase The fo...

Страница 21: ...y checking feature which makes sure that keys haven t been tampered with EAP Extensible Authentication Protocol is an extension to the PPP protocol that enables a variety of authentication protocols t...

Страница 22: ...Authentication Protocol is an extension to the PPP protocol that enables a variety of authentication protocols to be used It passes through the exchange of authentication messages allowing the authen...

Страница 23: ...s used by others sessions Dynamic key delivery eliminates one big vulnerability static encryption keys that are shared by all stations in the WLAN EAP Extensible Authentication Protocol is an extensio...

Страница 24: ...TLS Smartcard provides for certificate based and mutual authentication of the client and the network It relies on client side and server side certificates to perform authentication and can be used to...

Страница 25: ...be used It passes through the exchange of authentication messages allowing the authentication software stored in a server to interact with its counterpart in the client TLS Transport Layer Security is...

Страница 26: ...a check in this to enable the certificate use Certificate issuer Select the Certification Authority from the drop down list Allow intermediate certificates During tunnel creation the client must veri...

Страница 27: ...the client is using infrastructure mode Authentication Displays the authentication type Encryption Displays the encryption type Network Type Displays the network type infrastructure or ad hoc IP Addr...

Страница 28: ...al for all points in the network and is case sensitive Channel Displays the channel number of the Access Point Encryption Displays the encryption on the Access Point this includes WEP TKIP AES or None...

Страница 29: ...protection Select On to send a frame without protection and Off to send it with protection Enable Tx BURST Click the check box will enhance the throughput Enable TCP Window Size Enhance the throughpu...

Страница 30: ...f service QoS features to IEEE 802 11 networks WMM prioritizes traffic according to 4 AC Access Categories however it does not provide guaranteed throughput It is suitable for simple applications that...

Страница 31: ...ew PIN Code Config Mode The HNW300CI role playing as an Enrollee or an external Registrar Detail Information about Security and Key in the credential Connect Command to connect to the selected network...

Страница 32: ...bout tab displays information about the device such as the network driver version and date configuration utility version and date and the NIC Network Interface Card firmware version and date 3 11 Radi...

Страница 33: ...completely uninstall the PCI Card Adapter and its utility and repeat the installation procedure again Follow the steps below in order to uninstall the client utility Click on Start Hamlet HNW300CI Un...

Страница 34: ...ocols developed by Apple for their computer systems AppleTalk Address Resolution Protocol AARP Used to map the MAC addresses of Apple computers to their AppleTalk network addresses so that conversions...

Страница 35: ...at allows you to access resources on the web and provides them to you graphically C Cable modem A device that allows you to connect a computer up to a coaxial cable and receive Internet access from yo...

Страница 36: ...trum DSSS Modulation technique used by 802 11b wireless devices DMZ Demilitarized Zone A computer that logically sits in a no mans land between the LAN and the WAN The DMZ computer trades some of the...

Страница 37: ...e Transfer Protocol Easiest way to transfer files between computers on the Internet Full duplex Sending and Receiving data at the same time G Gain The amount an amplifier boosts the wireless signal Ga...

Страница 38: ...browser created and provided by Microsoft Internet Protocol The method of transferring data from one computer to another on the Internet Internet Protocol Security IPsec provides security at the packe...

Страница 39: ...port for a connection to a crossover cable MIB Management Information Base is a set of objects that can be managed by using SNMP Modem A device that Modulates digital signals from a computer to an an...

Страница 40: ...ire routing table at a regular interval which is how RIP functions P Password A sequence of characters that is used to authenticate requests to resources on a network Personal Area Network The interco...

Страница 41: ...l the routers on a network RJ 11 The most commonly used connection method for telephones RJ 45 The most commonly used connection method for Ethernet RS 232C The interface for serial communication betw...

Страница 42: ...rotocol for transmitting streams of printer data TCP IP Transmission Control Protocol Internet Protocol TFTP Trivial File Transfer Protocol is a utility used for transferring files that is simpler to...

Страница 43: ...Wired Equivalent Privacy is security for wireless networks that is supposed to be comparable to that of a wired network Wide Area Network The larger network that your LAN is connected to which may be...

Страница 44: ...4 QAM 16 QAM QPSK BPSK 802 11b DSSS DBPSK DQPSK CCK Operating Channels 11 for North America 14 for Japan 13 for Europe Receive Sensitivity Typical 2 412 2 472G IEEE802 11b 1Rx 91dBm 1Mbps 87dBm 11Mbps...

Страница 45: ...ng measures Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the rec...

Отзывы: