Loopcomm LP-9327H Скачать руководство пользователя страница 27

different RTS threshold. RTS/CTS is used when the data packet size exceeds the defined RTS threshold. 

With the CSMA/CA transmission mechanism, the transmitting station sends out an RTS packet to the 

receiving station, and waits for the receiving station to send back a CTS (Clear to Send) packet before 

sending the actual packet data. This setting is useful for networks with many clients. With many clients, and 

a high network load, there will be many more collisions. By lowering the RTS threshold, there may be fewer 

collisions, and performance should improve. Basically, with a faster RTS threshold, the system can recover 

from problems faster. RTS packets consume valuable bandwidth, however, so setting this value too low will 

limit performance. 

27. Beacon Interval

 

In addition to data frames that carry information from higher layers, 802.11 includes management and 

control frames that support data transfer. The beacon frame, which is a type of management frame, provides 

the "heartbeat" of a wireless LAN, enabling stations to establish and maintain communications in an orderly 

fashion. Beacon Interval represents the amount of time between beacon transmissions. Before a station 

enters power save mode, the station needs the beacon interval to know when to wake up to receive the 

beacon (and learn whether there are buffered frames at the access point). 

28. Preamble Type

 

There are two preamble types defined in IEEE 802.11 specification. A long preamble basically gives the 

decoder more time to process the preamble. All 802.11 devices support a long preamble. The short preamble 

is designed to improve efficiency (for example, for VoIP systems). The difference between the two is in the 

Synchronization field. The long preamble is 128 bits, and the short is 56 bits. 

WPA2 

It is the second generation of WPA. WPA2 is based on the final IEEE 802.11i amendment to the 802.11 

standard. 

30. Temporal Key Integrity Protocol (TKIP) 

The Temporal Key Integrity Protocol, pronounced tee-kip, is part of the IEEE 802.11i encryption standard 

for wireless LANs. TKIP is the next generation of WEP, the Wired Equivalency Protocol, which is used to 

secure 802.11 wireless LANs. TKIP provides per-packet key mixing, a message integrity check and a 

re-keying mechanism, thus fixing the flaws of WEP. 

31. 802.1x Authentication 

802.1x is a framework for authenticated MAC-level access control, defines Extensible Authentication 

Protocol (EAP) over LANs (WAPOL). The standard encapsulates and leverages much of EAP, which was 

defined for dial-up authentication with Point-to-Point Protocol in RFC 2284. Beyond encapsulating EAP 

packets, the 802.1x standard also defines EAPOL messages that convey the shared key information critical 

for wireless security. 

Advanced Encryption Standard (AES) 

Security issues are a major concern for wireless LANs, AES is the U.S. government’s next-generation 

cryptography algorithm, which will replace DES and 3DES. 

Содержание LP-9327H

Страница 1: ...Outdoor High Power 802 11b g n Wireless USB Adapter USER MANUAL 2 0 2011...

Страница 2: ...Windows Vista 7 8 4 Wireless Network Configuration 14 4 1 Utility Icon 14 4 2 Client Mode 15 4 2 1 Wireless Device Control 15 4 2 2 General Setting 16 4 2 3 Profile Setting 17 4 2 4 Available Network...

Страница 3: ...ily add more users and new network features depending on your business scale SYSTEM REQUIREMENTS Windows System 2000 XP 32 64 Vista 32 64 7 32 64 PCs must have a device driver installed It allows you...

Страница 4: ...2 Hardware Installation Appearance and Interface Introduction Notes The product shot is for reference only please refer to physical product 1 Wall MountPole Mount 2 WaterProof...

Страница 5: ...3 WaterProof Sliding Door 4 Pass trough Etheme cable from this cable 5 Push these button to remove upper housing 6 Mini USB port...

Страница 6: ...ep1 push buttons in the sides to remove upper housing Step2 Pass through USB cable from the hole insert the cable to Mini USB port Notes USB cable is required Step3 Install the upper housing Make sure...

Страница 7: ...Step4 Complete diagram...

Страница 8: ...flow to the adapter The adapter will reach a high temperature during use 3 1 Windows XP 2K Step 1 Insert the installation CD into your CD ROM Installation program will prompt language setup Choose the...

Страница 9: ...Step 2 Welcome Installation dialog prompt shown Click Next to continue Click Cancel to close installation Installing and configuring WLAN utility Step 3 Click Install...

Страница 10: ...Step 4 Click Finish to complete installation...

Страница 11: ...3 2 Windows Vista 7 Step 1 Insert the installation CD into your CD ROM Installation program will prompt language setup Choose the Setup Language you would like to use and click Next button...

Страница 12: ...Step 2 Welcome Installation dialog prompt shown Click Next to continue Click Cancel to close installation Installing and configuring WLAN utility Step 3 Click Install...

Страница 13: ...Step 4 Click Finish to complete installation...

Страница 14: ...WLAN Adapter into your laptop or desktop an icon should appear in the Windows System Tray automatically 4 1 Utility Icon Client mode utility running but no WLAN Adapter plugged Client mode utility run...

Страница 15: ...4 2 Client Mode 4 2 1 Wireless Device Control Show Tray Icon Show icon or not show icon in systray Radio Off Stop wireless signal Disable Adapter Stop wireless device...

Страница 16: ...ength and link quality are displayed also The bar graph displays the quality and strength of the link between the node and its Access Point Link Quality is a measurement of receiving and transmitting...

Страница 17: ...4 2 3 Profile Setting In profile tab you can Add Remove Edit Duplicate and Set Default to manipulate profile content manually Strongly recommend to use profile after you do Available Network...

Страница 18: ...to connect Click Refresh button to force and rescan available networks currently Select one of SSIDs and click Add to Profile to create profile that can be configured more wireless parameters In this...

Страница 19: ......

Страница 20: ...4 2 5 Status In this page it shows all wireless networking and device driver version in details...

Страница 21: ...4 2 6 Statistics Statistics page tab will show real time TX RX relative counters to check or evaluate the wireless performance Click Reset button to set counter to zero...

Страница 22: ...4 2 7 Wi Fi Protected Setup There is an easy and secure setup solution for Wi Fi network You can choose PIN Code or Push Button method to connect to an AP...

Страница 23: ...n tray Remedy Make sure that you have installed the Utility from the attached CD Symptom The PC Card is linking but can t share files with others Remedy Make sure the file and printer sharing function...

Страница 24: ...ence spreads the data over one frequency range channel while frequency hopping jumps from one narrow frequency band to another many times per second 7 ESSID An Infrastructure configuration could also...

Страница 25: ...case sensitive 16 Static IP Addressing A method of assigning IP addresses to clients on the network In networks with Static IP address the network administrator manually assigns an IP address to each...

Страница 26: ...censing from the Federal Communications Commission FCC 25 Fragment Threshold The proposed protocol uses the frame fragmentation mechanism defined in IEEE 802 11 to achieve parallel transmissions A lar...

Страница 27: ...8 Preamble Type There are two preamble types defined in IEEE 802 11 specification A long preamble basically gives the decoder more time to process the preamble All 802 11 devices support a long preamb...

Страница 28: ...ation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technici...

Отзывы: