Kozumi K-300MWUN Скачать руководство пользователя страница 27

 
 

   

RTS packets consume valuable bandwidth, however, so setting this value too low will limit 

performance. 

27. Beacon Interval 

In addition to data frames that carry information from higher layers, 802.11 includes management and 

control frames that support data transfer. The beacon frame, which is a type of management frame, 

provides the "heartbeat" of a wireless LAN, enabling stations to establish and maintain 

communications in an orderly fashion. Beacon Interval represents the amount of time between 

beacon transmissions. Before a station enters power save mode, the station needs the beacon 

interval to know when to wake up to receive the beacon (and learn whether there are buffered frames 

at the access point). 

28. Preamble Type 

There are two preamble types defined in IEEE 802.11 specification. A long preamble basically gives 

the decoder more time to process the preamble. All 802.11 devices support a long preamble. The 

short preamble is designed to improve efficiency (for example, for VoIP systems). The difference 

between the two is in the Synchronization field. The long preamble is 128 bits, and the short is 56 bits. 

29. WPA2 

It is the second generation of WPA. WPA2 is based on the final IEEE 802.11i amendment to the 

802.11 standard. 

30. Temporal Key Integrity Protocol (TKIP) 

The Temporal Key Integrity Protocol, pronounced tee-kip, is part of the IEEE 802.11i encryption 

standard for wireless LANs. TKIP is the next generation of WEP, the Wired Equivalency Protocol, 

which is used to secure 802.11 wireless LANs. TKIP provides per-packet key mixing, a message 

integrity check and a re-keying mechanism, thus fixing the flaws of WEP. 

31. 802.1x Authentication 

802.1x is a framework for authenticated MAC-level access control, defines Extensible Authentication 

Protocol (EAP) over LANs (WAPOL). The standard encapsulates and leverages much of EAP, which 

was defined for dial-up authentication with Point-to-Point Protocol in RFC 2284.   

Beyond encapsulating EAP packets, the 802.1x standard also defines EAPOL messages that convey 

the shared key information critical for wireless security. 

32. Advanced Encryption Standard (AES) 

Security issues are a major concern for wireless LANs, AES is the U.S. government’s next-generation 

cryptography algorithm, which will replace DES and 3DES. 

 

Содержание K-300MWUN

Страница 1: ...HIGH POWER WIRELESS N MINI USB ADAPTER K 300MWUN USER S MANUAL...

Страница 2: ...in7 Operating distance of up to 300 meters in free space 300 270 240 180 120 90 60 54 48 36 30 24 22 18 12 11 6 5 5 2 1 Mbps selectable Data Rate 64 128 bit WEP WPA Wi Fi Protected Access WPA2 WPS 2 4...

Страница 3: ...ce CD 2 dBi Antenna CONNECTING YOUR WLAN ADAPTER TO PC 2 Connect your WLAN adaptor to your PC And Install driver GETTING TO KNOW WIRELESS LAN ADAPTER 3 LEDs LED turns on when WLAN link to WLAN adaptor...

Страница 4: ...t connect to the Internet Ad Hoc Wireless Network Infrastructure Wireless Network The most obvious difference between Infrastructure wireless network and Ad Hoc wireless network is that the PCs in Inf...

Страница 5: ...nique network address There are two methods to assign a network address to a computer on a TCP IP network Static IP addressing Dynamic IP addressing DHCP Client In network with static IP addressing th...

Страница 6: ...e Windows XP 2K Step 1 Insert the installation CD into your CD ROM Installation program will prompt language setup Choose the Setup Language you would like to use and click Next button Step 2 Welcome...

Страница 7: ...Step3 Click Install...

Страница 8: ......

Страница 9: ...Step4 Click Finish to complete installation...

Страница 10: ...Windows Vista Step 1 Insert the installation CD into your CD ROM Installation program will prompt language setup Choose the Setup Language you would like to use and click Next button...

Страница 11: ...Step 2 Welcome Installation dialog prompt shown Click Next to continue Click Cancel to close installation Installing and configuring wlan utility...

Страница 12: ...Step3 Click Install Step4 Click Finish to complete installation...

Страница 13: ......

Страница 14: ...g and WLAN Adapter scan available network Client mode utility running and WLAN Adapter can not scan any AP Client Mode Default Setting Wireless Device Control Show Tray Icon Show icon or not show icon...

Страница 15: ...ddress displays current MAC Address IP Address Subnet and Gateway Click Renew IP button to refresh IP address leased from wireless AP PROFILE SETTING In profile tab you can Add Remove Edit Duplicate a...

Страница 16: ...all available networks that radio can reaches Select proper SSID BSSID you want to connect Click Refresh button to force and rescan available networks currently Select one of SSIDs and click Add to Pr...

Страница 17: ...In this page you can edit your profile name configure wireless security like WEP WPA WPA2 802 1x etc After finishing setup click OK button to save configuration...

Страница 18: ...Status Status page tab shows all wireless networking and device driver version in details...

Страница 19: ...Statistics Statistics page tab will show real time TX RX relative counters to check or evaluate the wireless performance Click Reset button to set counter to zero...

Страница 20: ...Wi Fi Protected Setup An easy and secure setup solution for Wi Fi network you can choose PIN Code or Push Button method to connect to an AP...

Страница 21: ......

Страница 22: ...36 48 54 60 90Mbps IEEE 802 11n Maximum of 300Mbps Operation Mode Ad hoc Infrastructure Transmitter Power 25 1 dBm 11b 20 1 dBm 11g 19 1 dBm 11n Receive Sensitivity Operating at 11Mbps 80 dBm 8 FER 5...

Страница 23: ...n tray Remedy Make sure that you have installed the Utility from the attached CD Symptom The PC Card is linking but can t share files with others Remedy Make sure the file and printer sharing function...

Страница 24: ...from one narrow frequency band to another many times per second 7 ESSID An Infrastructure configuration could also support roaming capability for mobile workers More than one BSS can be configured as...

Страница 25: ...r uses the same IP address every time it reboots and logs on to the network unless it is manually changed 17 Temporal Key Integrity Protocol TKIP The Temporal Key Integrity Protocol pronounced tee kip...

Страница 26: ...l the overlap part of the master and parallel transmissions is large This means the spatial reuse ratio of parallel transmissions is high In contrast with a large fragment threshold the overlap is sma...

Страница 27: ...in the Synchronization field The long preamble is 128 bits and the short is 56 bits 29 WPA2 It is the second generation of WPA WPA2 is based on the final IEEE 802 11i amendment to the 802 11 standard...

Отзывы: