background image

22 

 

20. Wi-Fi Alliance 

The Wi-Fi Alliance is a nonprofit international association formed in 1999 to certify 
interoperability of wireless Local Area Network products based on IEEE 802.11 specification. 
The goal of the Wi-Fi Alliance’s members is to enhance the user experience through product 
interoperability. The organization is formerly known as WECA. 

21. Wi-Fi Protected Access (WPA) 

The Wi-Fi Alliance put together WPA as a data encryption method for 802.11 wireless LANs. 
WPA is an industry-supported, pre-standard version of 802.11i utilizing the Temporal Key 
Integrity Protocol (TKIP), which fixes the problems of WEP, including using dynamic keys. 

22. Wide Area Network (WAN) 

A WAN consists of multiple LANs that are tied together via telephone services and / or fiber 
optic cabling. WANs may span a city, a state, a country, or even the world 

23. Wired Equivalent Privacy (WEP) 

Now widely recognized as flawed, WEP was a data encryption method used to protect the 
transmission between 802.11 wireless clients and APs. However, it used the same key among 
all communicating devices. WEP’s problems are well-known, including an insufficient key 
length and no automated method for distributing the keys. WEP can be easily cracked in a 
couple of hours with off-the-shelf tools. 

24. Wireless LAN (WLAN) 

A wireless LAN does not use cable to transmit signals, but rather uses radio or infrared to 
transmit packets through the air. Radio Frequency (RF) and infrared are the commonly used 
types of wireless transmission. Most wireless LANs use spread spectrum technology. It offers 
limited bandwidth, usually under 11Mbps, and users share the bandwidth with other devices 
in the spectrum; however, users can operate a spread spectrum device without licensing from 
the Federal Communications Commission (FCC). 

25. Fragment Threshold 

The proposed protocol uses the frame fragmentation mechanism defined in IEEE 802.11 to 
achieve parallel transmissions. A large data frame is fragmented into several fragments each 
of size equal to fragment threshold. By tuning the fragment threshold value, we can get 
varying fragment sizes. The determination of an efficient fragment threshold is an important 
issue in this scheme. If the fragment threshold is small, the overlap part of the master and 
parallel transmissions is large.  

This means the spatial reuse ratio of parallel transmissions is high. In contrast, with a large 
fragment threshold, the overlap is small and the spatial reuse ratio is low. However high 
fragment threshold leads to low fragment overhead. Hence there is a trade-off between spatial 
re-use and fragment overhead. Fragment threshold is the maximum packet size used for 
fragmentation. Packets larger than the size programmed in this field will be fragmented If you 
find that your corrupted packets or asymmetric packet reception (all send packets, for 
example). You may want to try lowering your fragmentation threshold. This will cause 
packets to be broken into smaller fragments. These small fragments, if corrupted, can be 
resent faster than a larger fragment. Fragmentation increases overhead, so you'll want to keep 
this value as close to the maximum value as possible. 

26. RTS(Request To Send) Threshold 

The RTS threshold is the packet size at which packet transmission is governed by the 

Содержание LP-8097

Страница 1: ...1 802 11ac Wireless USB 3 0 Dongle USER MANUAL 1 0 2013...

Страница 2: ...guration 6 3 1 Utility Icon 6 3 2 Client Mode 6 3 2 1 Wireless Device Control 6 3 2 2 General Setting 7 3 2 3 Profile Setting 8 3 2 4 Available Network Setting 9 3 2 5 Status 11 3 2 6 Statistics Page...

Страница 3: ...32 64 Win7 32 64 Win 8 32 64 PCs must have a device driver installed It allows you to communicate with WLAN Dongle BEFORE YOU START 1 Contents confirmation Wireless LAN USB Dongle Driver CD CONNECTING...

Страница 4: ...was operated under Windows 7 Procedures are similar for Windows XP vista Step 1 Insert the installation CD into your CD ROM Step 2 Welcome Installation dialog prompt shown Click Next to continue Clic...

Страница 5: ...5 Step 3 Click Finish to complete installation...

Страница 6: ...ity Icon Client mode utility running but no WLAN Adapter plugged Client mode utility running and WLAN Adapter scan available network Client mode utility running and WLAN Adapter cannot scan any AP 3 2...

Страница 7: ...y are also displayed The bar graph displays the quality and strength of the link between the node and its Access Point Link Quality is a measurement of receiving and transmitting performances over the...

Страница 8: ...8 3 2 3 Profile Setting In profile tab you can Add Remove Edit Duplicate and Set Default to manipulate profile content manually Strongly recommend to use profile after you do Available Network...

Страница 9: ...hat radio can reaches Select proper SSID BSSID you want to connect Click Refresh button to force and rescan available networks currently Select one of SSIDs and click Add to Profile to create profile...

Страница 10: ...10 In this page you can edit your profile name configure wireless security like WEP WPA WPA2 802 1x etc After finishing setup click OK button to save configuration...

Страница 11: ...3 2 5 Status In this page it shows all wireless networking and device driver version of 2 4GHz in detail In this page it shows all wireless networking and device driver version of 802 11n 5GHz in deta...

Страница 12: ...12 In this page it shows all wireless networking and device driver version of 802 11ac 5GHz in detail...

Страница 13: ...13 3 2 6 Statistics Page The Tx Rx status of current wireless connection is shown A statistic analysis of packet transition is listed...

Страница 14: ...14 3 2 7 Wi Fi Protected Setup There is an easy and secure setup solution for Wi Fi network You can choose PIN Code or Push Button method to connect to an AP...

Страница 15: ...t ID of a station It is a unique value assigned by AP 5 MAC address It is the six two digit numbers that assemble the MAC address of respected joined station 6 Life Time It is the timer that counts do...

Страница 16: ...n to prevent unauthorized login WPA PSK TKIP WPA2 PSK TKIP The most advanced authentication and data encryption that provide the best security protection d ASCII PASSPHRASE ASCII You should provide ei...

Страница 17: ...n that this AP sends out in unit of TU 1024 micro seconds 2 DTIM Period The DTIM Period field is the number of Beacon intervals between successive DTIMs 3 Preamble Mode Long higher quality but with lo...

Страница 18: ...18 4 3 Statistics Page The Tx Rx status of current wireless connection is shown A statistic analysis of packet transition is listed...

Страница 19: ...con tray Remedy Make sure that you have installed the Utility from the attached CD Symptom The PC Card is linking but can t share files with others Remedy Make sure the file and printer sharing functi...

Страница 20: ...uency spectrum The other method is frequency hopping Direct sequence spreads the data over one frequency range channel while frequency hopping jumps from one narrow frequency band to another many time...

Страница 21: ...cking 15 SSID A Network ID unique to a network Only clients and Access Points that share the same SSID are able to communicate with each other This string is case sensitive 16 Static IP Addressing A m...

Страница 22: ...um technology It offers limited bandwidth usually under 11Mbps and users share the bandwidth with other devices in the spectrum however users can operate a spread spectrum device without licensing fro...

Страница 23: ...eacon and learn whether there are buffered frames at the access point 28 Preamble Type There are two preamble types defined in IEEE 802 11 specification A long preamble basically gives the decoder mor...

Отзывы: