background image

HNW300CI  

User 

Manual 

44

 

 

Wireless PCI Card 

5.  Appendix B – Specifications 

 
 

Data Rates 

1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, 
54, 72, 84, 150 and 300Mbps (300 Rx 
PHY rate; 150Mbps Tx PHY support) 
 

Standards / Compliance 

IEEE802.3, IEEE802.3u, IEEE802.11b, 
IEEE802.11g, 802.11n (2.0) 
 

Regulation Certifications 

FCC Part 15, ETSI 300/328/CE 
 

Operating Voltage 

3.3V ± 0.25V 
 

Status LEDs 

LINK/ACTIVITY 
 

Drivers 

Windows 2000/XP/Vista 
 

RF INFORMATION 
Frequency Band 

U.S., Europe and Japan product 
covering 2.4 to 2.484 GHz, 
programmable for different country 
regulations 
 

Media Access Protocol 

Carrier Sense Multiple Access with 
Collision Avoidance (CSMA/CA) 
 

Modulation Technology 

802.11g: OFDM (64-QAM, 16-QAM, 
QPSK, BPSK) 
802.11b: DSSS (DBPSK, DQPSK, CCK) 
 

Operating Channels 

11 for North America, 14 for Japan, 13 
for Europe 
 

Receive Sensitivity (Typical)  

 

2.412~2.472G(IEEE802.11b) (1Rx) 

-91dBm @ 1Mbps 
-87dBm @ 11Mbps 
 

 

2.412~2.472G(IEEE802.11g) (2Rx) 
-90dBm @ 6Mbps 
-75dBm @ 54Mbps 

 

2.412~2.472G(IEEE802.11N) (2Rx) 
-88 dBm MCS 8 
-65 dBm MCS 15 

 

Available transmit power 

 

2.412~2.472G(IEEE802.11b) 
18dBm @1~11Mbps 

 

2.412~2.472G(IEEE802.11g) 
15 dBm @6Mbps 
14 dBm @54Mbps 

 

2.412~2.472G(IEEE802.11N) 
15dBm 

 

Antenna Configuration 

1T2R Mode 
 

NETWORKING  
Topology 

Ad-Hoc, Infrastructure 
 

Security 

WPA/WPA2 (AES, 64,128-WEP with 
shared-key authentication) 
 

PHYSICAL 
Form Factor 

PCI Card 
 

ENVIRONMENTAL 
Temperature Range 

Operating: 0°C to 45°C 
Storage: -10°C to 70°C 
 

Humidity (non-condensing) 

15%~95% Typical 
 

 Package Contents 

 

Wireless-N PCI Card 

 

Two Detachable Antennas 

 

User’s Manual 

 

CD-ROM with Drivers and Manual 

 

 
 

Содержание HNW300CI

Страница 1: ...Wireless PCI Card IEEE 802 11n 300Mbps USER MANUAL www hamletcom com...

Страница 2: ...ass B EN 61000 4 2 1995 A1 1998 A2 2001 EN 61000 4 3 2006 A1 2008 CE Mark Warning This is a Class B product In a domestic environment this product may cause radio interference in which case the user m...

Страница 3: ...K 12 2 6 SITE SURVEY 13 2 7 STATISTICS 14 2 8 WPS 14 2 9 ABOUT 15 2 10 UNINSTALL THE DRIVERS CLIENT UTILITY 15 3 PCI CARD ADAPTER FOR WINDOWS 2000 XP 16 3 1 BEFORE YOU BEGIN 16 3 2 INSTALLING THE DRIV...

Страница 4: ...plements the latest 11n 2 0 technology which extremely improves wireless signal for your computer than existing wireless 802 11g technology It supports the 1T2R architecture with fully forward compati...

Страница 5: ...Network conditions and environmental factors lower actual throughput rate All specifications are subject to change without notice 1 2 Package Contents Open the package carefully and make sure that no...

Страница 6: ...nd before installing the drivers 2 2 Installing the Drivers Follow the steps below in order to install the PCI CARD drivers Insert the CD ROM that was provided to you in this package The setup should...

Страница 7: ...rt the PCI Card into the PCI slot Windows will then detect and install the new hardware An Hamlet icon will then appear in the system tray Right click on the icon and then click on Launch Config Utili...

Страница 8: ...tings A profile can be configured as Infrastructure or Ad hoc mode The configuration settings for each mode are described below 2 3 1 Infrastructure Mode The infrastructure mode requires the use of an...

Страница 9: ...rs equipped with the PC Cards that form a wireless network whenever they are within range of one another In ad hoc mode each client is peer to peer would only have access to the resources of the other...

Страница 10: ...racter string into the field For 64 bit enter 5 alphanumeric or 10 hexadecimal characters For 128 bit enter 13 alphanumeric or 26 hexadecimal characters Click on the Apply button to save the changes S...

Страница 11: ...e computer matches that of the Access Point This approach offers the simplicity of the WEP key but uses stronger TKIP encryption EAP Extensible Authentication Protocol is an extension to the PPP proto...

Страница 12: ...and the percent of output power Current Channel The operating frequency channel that the client is using infrastructure mode Link Speed The current rate at which the client is transmitting and receivi...

Страница 13: ...receiving signal strength from the Access Point Channel Displays the channel number of the Access Point Encryption Displays the encryption on the Access Point this includes WEP TKIP AES or None Authe...

Страница 14: ...after retry received with CRC error duplicate frames received etc 2 8 WPS Click on the WPS Configuration tab WPS is used for WiFi Protected Setup By pressing this button the security settings of the d...

Страница 15: ...lation is unsuccessful for any reason the best way to solve the problem may be to completely uninstall the PCI CARD and its utility and repeat the installation procedure again Follow the steps below i...

Страница 16: ...vided to you in this package The setup should run automatically If the setup does not run automatically then you must manually select the setup exe file from the CD ROM drive Once the setup begins you...

Страница 17: ...ome office caf etc When adding a profile you are required to enter a profile name and SSID as well as configure the power saving mode network type RTS fragmentation threshold and encryption authentica...

Страница 18: ...k is always connected to the power supply o PSM Power Saving Mode Select this option if your notebook uses its battery power This option minimizes the battery usage while the network is idle Network T...

Страница 19: ...the network or select one from the drop down list The SSID is a unique name shared among all points in your wireless network The SSID must be identical for all points in the network and is case sensi...

Страница 20: ...adio using one of the Keys from a panel When you use WEP to communicate with the other wireless clients all the wireless devices in this network must have the same encryption key or pass phrase The fo...

Страница 21: ...y checking feature which makes sure that keys haven t been tampered with EAP Extensible Authentication Protocol is an extension to the PPP protocol that enables a variety of authentication protocols t...

Страница 22: ...Authentication Protocol is an extension to the PPP protocol that enables a variety of authentication protocols to be used It passes through the exchange of authentication messages allowing the authen...

Страница 23: ...s used by others sessions Dynamic key delivery eliminates one big vulnerability static encryption keys that are shared by all stations in the WLAN EAP Extensible Authentication Protocol is an extensio...

Страница 24: ...TLS Smartcard provides for certificate based and mutual authentication of the client and the network It relies on client side and server side certificates to perform authentication and can be used to...

Страница 25: ...be used It passes through the exchange of authentication messages allowing the authentication software stored in a server to interact with its counterpart in the client TLS Transport Layer Security is...

Страница 26: ...a check in this to enable the certificate use Certificate issuer Select the Certification Authority from the drop down list Allow intermediate certificates During tunnel creation the client must veri...

Страница 27: ...the client is using infrastructure mode Authentication Displays the authentication type Encryption Displays the encryption type Network Type Displays the network type infrastructure or ad hoc IP Addr...

Страница 28: ...al for all points in the network and is case sensitive Channel Displays the channel number of the Access Point Encryption Displays the encryption on the Access Point this includes WEP TKIP AES or None...

Страница 29: ...protection Select On to send a frame without protection and Off to send it with protection Enable Tx BURST Click the check box will enhance the throughput Enable TCP Window Size Enhance the throughpu...

Страница 30: ...f service QoS features to IEEE 802 11 networks WMM prioritizes traffic according to 4 AC Access Categories however it does not provide guaranteed throughput It is suitable for simple applications that...

Страница 31: ...ew PIN Code Config Mode The HNW300CI role playing as an Enrollee or an external Registrar Detail Information about Security and Key in the credential Connect Command to connect to the selected network...

Страница 32: ...bout tab displays information about the device such as the network driver version and date configuration utility version and date and the NIC Network Interface Card firmware version and date 3 11 Radi...

Страница 33: ...completely uninstall the PCI Card Adapter and its utility and repeat the installation procedure again Follow the steps below in order to uninstall the client utility Click on Start Hamlet HNW300CI Un...

Страница 34: ...ocols developed by Apple for their computer systems AppleTalk Address Resolution Protocol AARP Used to map the MAC addresses of Apple computers to their AppleTalk network addresses so that conversions...

Страница 35: ...at allows you to access resources on the web and provides them to you graphically C Cable modem A device that allows you to connect a computer up to a coaxial cable and receive Internet access from yo...

Страница 36: ...trum DSSS Modulation technique used by 802 11b wireless devices DMZ Demilitarized Zone A computer that logically sits in a no mans land between the LAN and the WAN The DMZ computer trades some of the...

Страница 37: ...e Transfer Protocol Easiest way to transfer files between computers on the Internet Full duplex Sending and Receiving data at the same time G Gain The amount an amplifier boosts the wireless signal Ga...

Страница 38: ...browser created and provided by Microsoft Internet Protocol The method of transferring data from one computer to another on the Internet Internet Protocol Security IPsec provides security at the packe...

Страница 39: ...port for a connection to a crossover cable MIB Management Information Base is a set of objects that can be managed by using SNMP Modem A device that Modulates digital signals from a computer to an an...

Страница 40: ...ire routing table at a regular interval which is how RIP functions P Password A sequence of characters that is used to authenticate requests to resources on a network Personal Area Network The interco...

Страница 41: ...l the routers on a network RJ 11 The most commonly used connection method for telephones RJ 45 The most commonly used connection method for Ethernet RS 232C The interface for serial communication betw...

Страница 42: ...rotocol for transmitting streams of printer data TCP IP Transmission Control Protocol Internet Protocol TFTP Trivial File Transfer Protocol is a utility used for transferring files that is simpler to...

Страница 43: ...Wired Equivalent Privacy is security for wireless networks that is supposed to be comparable to that of a wired network Wide Area Network The larger network that your LAN is connected to which may be...

Страница 44: ...4 QAM 16 QAM QPSK BPSK 802 11b DSSS DBPSK DQPSK CCK Operating Channels 11 for North America 14 for Japan 13 for Europe Receive Sensitivity Typical 2 412 2 472G IEEE802 11b 1Rx 91dBm 1Mbps 87dBm 11Mbps...

Страница 45: ...ng measures Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the rec...

Отзывы: