background image

21 

 

wired LAN is called an Infrastructure configuration. Infrastructure is applicable to enterprise 
scale for wireless access to central database, or wireless  

11. ISM Band 

The FCC and their counterparts outside of the U.S. have set aside bandwidth for unlicensed 
use in the so-called ISM (Industrial, Scientific and Medical) band. Spectrum in the vicinity of 
2.4 GHz, in particular, is being made available (Industrial, Scientific and Medical) band. 
Spectrum in the vicinity of 2.4 GHz, in particular, is being made available of users around the 
globe. 

12. Local Area Network (LAN) 

A LAN is a group of computers, each equipped with the appropriate network adapter card 
connected by cable/air, that share applications, data, and peripherals. All connections are 
made via cable or wireless media, but a LAN does not use telephone services. It typically 
spans a single building or campus. 

13. Network 

A network is a system of computers that is connected. Data, files, and messages can be 
transmitted over this network. Networks may be local or wide area networks. 

14. Protocol 

A protocol is a standardized set of rules that specify how a conversation is to take place, 
including the format, timing, sequencing and/ or error checking. 

15. SSID 

A Network ID unique to a network. Only clients and Access Points that share the same SSID 
are able to communicate with each other. This string is case-sensitive. 

16. Static IP Addressing 

A method of assigning IP addresses to clients on the network. In networks with Static IP 
address, the network administrator manually assigns an IP address to each computer. Once a 
Static IP address is assigned, a computer uses the same IP address every time it reboots and 
logs on to the network, unless it is manually changed. 

17. Temporal Key Integrity Protocol (TKIP) 

The Temporal Key Integrity Protocol, pronounced tee-kip, is part of the IEEE 802.11i 
encryption standard for wireless LANs. TKIP is the next generation of WEP, the Wired 
Equivalency Protocol, which is used to secure 802.11 wireless LANs. TKIP provides per-
packet key mixing, a message integrity check and a re-keying mechanism, thus fixing the 
flaws of WEP. 

18. Transmission Control Protocol / Internet Protocol (TCP/IP) 

TCP/IP is the protocol suite developed by the Advanced Research Projects Agency (ARPA). It 
is widely used in corporate Internet works, because of its superior design for WANs. TCP 
governs how packet is sequenced for transmission the network. The term “TCP/IP” is often 
used generically to refer to the entire suite of related protocols. 

19. Transmit / Receive 

The wireless throughput in Bytes per second averaged over two seconds. 

Содержание LP-8097

Страница 1: ...1 802 11ac Wireless USB 3 0 Dongle USER MANUAL 1 0 2013...

Страница 2: ...guration 6 3 1 Utility Icon 6 3 2 Client Mode 6 3 2 1 Wireless Device Control 6 3 2 2 General Setting 7 3 2 3 Profile Setting 8 3 2 4 Available Network Setting 9 3 2 5 Status 11 3 2 6 Statistics Page...

Страница 3: ...32 64 Win7 32 64 Win 8 32 64 PCs must have a device driver installed It allows you to communicate with WLAN Dongle BEFORE YOU START 1 Contents confirmation Wireless LAN USB Dongle Driver CD CONNECTING...

Страница 4: ...was operated under Windows 7 Procedures are similar for Windows XP vista Step 1 Insert the installation CD into your CD ROM Step 2 Welcome Installation dialog prompt shown Click Next to continue Clic...

Страница 5: ...5 Step 3 Click Finish to complete installation...

Страница 6: ...ity Icon Client mode utility running but no WLAN Adapter plugged Client mode utility running and WLAN Adapter scan available network Client mode utility running and WLAN Adapter cannot scan any AP 3 2...

Страница 7: ...y are also displayed The bar graph displays the quality and strength of the link between the node and its Access Point Link Quality is a measurement of receiving and transmitting performances over the...

Страница 8: ...8 3 2 3 Profile Setting In profile tab you can Add Remove Edit Duplicate and Set Default to manipulate profile content manually Strongly recommend to use profile after you do Available Network...

Страница 9: ...hat radio can reaches Select proper SSID BSSID you want to connect Click Refresh button to force and rescan available networks currently Select one of SSIDs and click Add to Profile to create profile...

Страница 10: ...10 In this page you can edit your profile name configure wireless security like WEP WPA WPA2 802 1x etc After finishing setup click OK button to save configuration...

Страница 11: ...3 2 5 Status In this page it shows all wireless networking and device driver version of 2 4GHz in detail In this page it shows all wireless networking and device driver version of 802 11n 5GHz in deta...

Страница 12: ...12 In this page it shows all wireless networking and device driver version of 802 11ac 5GHz in detail...

Страница 13: ...13 3 2 6 Statistics Page The Tx Rx status of current wireless connection is shown A statistic analysis of packet transition is listed...

Страница 14: ...14 3 2 7 Wi Fi Protected Setup There is an easy and secure setup solution for Wi Fi network You can choose PIN Code or Push Button method to connect to an AP...

Страница 15: ...t ID of a station It is a unique value assigned by AP 5 MAC address It is the six two digit numbers that assemble the MAC address of respected joined station 6 Life Time It is the timer that counts do...

Страница 16: ...n to prevent unauthorized login WPA PSK TKIP WPA2 PSK TKIP The most advanced authentication and data encryption that provide the best security protection d ASCII PASSPHRASE ASCII You should provide ei...

Страница 17: ...n that this AP sends out in unit of TU 1024 micro seconds 2 DTIM Period The DTIM Period field is the number of Beacon intervals between successive DTIMs 3 Preamble Mode Long higher quality but with lo...

Страница 18: ...18 4 3 Statistics Page The Tx Rx status of current wireless connection is shown A statistic analysis of packet transition is listed...

Страница 19: ...con tray Remedy Make sure that you have installed the Utility from the attached CD Symptom The PC Card is linking but can t share files with others Remedy Make sure the file and printer sharing functi...

Страница 20: ...uency spectrum The other method is frequency hopping Direct sequence spreads the data over one frequency range channel while frequency hopping jumps from one narrow frequency band to another many time...

Страница 21: ...cking 15 SSID A Network ID unique to a network Only clients and Access Points that share the same SSID are able to communicate with each other This string is case sensitive 16 Static IP Addressing A m...

Страница 22: ...um technology It offers limited bandwidth usually under 11Mbps and users share the bandwidth with other devices in the spectrum however users can operate a spread spectrum device without licensing fro...

Страница 23: ...eacon and learn whether there are buffered frames at the access point 28 Preamble Type There are two preamble types defined in IEEE 802 11 specification A long preamble basically gives the decoder mor...

Отзывы: