background image

 

15 

Chapter 4 Troubleshooting 

This section provides solutions to problems usually encountered during the installation and operation 
of this Wireless USB Adaptor. Read the description below to solve your problems. 

What is the IEEE 802.11b standard? 

The IEEE 802.11b Wireless LAN standards subcommittee, which is formulating a standard for 
the industry. The objective is to enable wireless LAN hardware from different manufactures to 
communicate. 

What IEEE 802.11 feature are supported? 

The product supports the following IEEE 802.11 functions: 

 

CSMA/CA plus Acknowledge protocol 

 

Multi-Channel Roaming 

 

Automatic Rate Selection 

 

RTS/CTS feature 

 

Fragmentation 

 

Power Management 

What is Ad-hoc? 

An  Ad-hoc  integrated  wireless  LAN  is  a  group  of  computers,  each  with  a  WLAN  adapter, 
connected  as  an  independent  wireless  LAN.  Ad  hoc  wireless  LAN  is  applicable  at  a 
departmental scale for a branch or SOHO operation. 

What is Infrastructure? 

An  integrated  wireless  and  wireless  and  wired  LAN  is  called  an  Infrastructure  configuration. 
Infrastructure  is  applicable  to  enterprise  scale  for  wireless  access  to  central  database,  or 
wireless application for mobile workers. 

What is BSS ID? 

A  specific  Ad  hoc  LAN  is  called  a  Basic  Service  Set  (BSS).  Computers  in  a  BSS  must  be 
configured with the same BSS ID. 

What is WEP? 

WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 or 104 bit shared 
key algorithm, as described in the IEEE 802 .11 standard. 

Can Wireless products support printer sharing? 

Wireless  products  perform  the  same  function as  LAN  products.  Therefore, Wireless products 
can  work  with  Netware,  Windows  NT/2000/XP,  or  other  LAN  operating  systems  to  support 
printer or file sharing. 

Would the information be intercepted while transmitting on air? 

WLAN features two-fold protection in security. On the hardware side, as with Direct Sequence 
Spread  Spectrum  technology,  it  has  the  inherent  security  feature  of  scrambling.  On  the 
software  side,  WLAN  series  offer  the  encryption  function  (WEP)  to  enhance  security  and 
Access Control. Users can set it up depending upon their needs. 

What is DSSS?    What is FHSS?    And what are their differences? 

Frequency-hopping  spread-spectrum  (FHSS)  uses  a  narrowband  carrier  that  changes 
frequency in a pattern that is known to both transmitter and receiver. Properly synchronized, 
the net effect is to maintain a single logical channel. To an unintended receiver, FHSS appears 
to  be  short-duration  impulse  noise.  Direct-sequence  spread-spectrum  (DSSS)  generates  a 
redundant bit pattern for each bit to be transmitted. This bit pattern is called a chip (or chipping 
code). The longer the chip, the greater the probability that the original data can be recovered. 
Even if one or more bits in the chip are damaged during transmission, statistical techniques 
embedded in the radio can recover the original data without-the need for retransmission. To an 
unintended receiver, DSSS appears as low power wideband noise and is rejected (ignored) by 
most narrowband receivers. 

What is Spread Spectrum?

 

Spread  Spectrum  technology  is  a  wideband  radio  frequency  technique  developed  by  the 
military  for  use  in  reliable,  secure,  mission-critical  communication  systems.  It  is  designed  to 
trade  off  bandwidth  efficiency  for  reliability,  integrity,  and  security.  In  other  words,  more 
bandwidth  is  consumed  than  in  the  case  of  narrowband  transmission

,

  but  the  trade  off 

Содержание WL-U351

Страница 1: ...Wireless USB Adapter WL U351 User s Manual...

Страница 2: ...imits for a Class B digital device pursuant to Part 15 of FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment...

Страница 3: ...Equipment As of April 8 2000 Safety This equipment is designed with the utmost care for the safety of those who install and use it However special attention must be paid to the dangers of electric sho...

Страница 4: ...mum System Requirements 4 1 6 SAFETY PRECAUTION 4 CHAPTER 2 INSTALLATION PROCEDURE 5 2 1 Hardware and Driver Installation 5 2 2 Utility Installation 7 CHAPTER 3 CONFIGURATION UTILITY 10 3 1 Wireless C...

Страница 5: ...robust interference resistant solution in a multi user environment l Support 64 128 bit WEP key l Working range up to 300 feet indoor and 800 feet outdoor l Support Ad Hoc Infrastructure mode l Roamin...

Страница 6: ...position is recommended Proper Access Point positioning combined with a clear radio signal will greatly enhance performance Ad Hoc An Ad Hoc wireless LAN is a group of computers each equipped with one...

Страница 7: ...nection The wireless security network installs quickly and provides the flexibility to reconfigure easily 1 3 Specification Product 11Mbps Wireless USB Adapter Models WL U351 Attach Interface USB V1 1...

Страница 8: ...5 Minimum System Requirements Before installation please check the following requirements with your equipment Pentium Based above IBM compatible PC system with an USB support CD ROM drive One Availabl...

Страница 9: ...E 2000 Note If you ever install any Wireless USB Adapter before please uninstall the old driver and utility first A Insert WL U351 to your computer system will automatically detect the adapter and sho...

Страница 10: ...6 C The Hardware Installation box will appear click Continue Anyway to start driver installation D Click Finish to complete the driver installation...

Страница 11: ...tility The following installation operates under Window XP Procedures will be the same for Windows 98SE ME 2000 Note If you want to use this utility in windows XP system the system built in utility mu...

Страница 12: ...the Setup exe program under the Utility folder The following InstallShield Wizard box will show up to guide you how to install properly then click Next C The Choose Destination Location screen will s...

Страница 13: ...U351 from Programs Click Configuration Utility option F The Configuration Utility icon will be shown on system tray if not that mean the installation is fail Please uninstall the driver from the syste...

Страница 14: ...the wireless station u Network Adapter Displays the product information u Available Network Displays all the SSID and Signal Strength of wireless stations nearby To search the available wireless stati...

Страница 15: ...nnel SSID Tx Rate and Network Type You can click Change button for modifying these values Channel Shows the number of the radio channel used for the networking Only Access Points and Ad Hoc nodes crea...

Страница 16: ...ad profile setting Load the setting values from the file entered in the Profile Name The new settings will be activated immediately u Write Current Setting to profile Write the current setting values...

Страница 17: ...ne of the keys 1 4 as the encryption key u Key Value The keys are used to encrypt data transmitted in the wireless network Fill the text box by following the rules below 64 bit Input 10 digit Hex valu...

Страница 18: ...ct a setting within a range of 256 to 2305 bytes Minor change is recommended u RTS CTS Threshold Minimum packet size required for an RTS CTS Request to Send Clear to Send For packets smaller than this...

Страница 19: ...work with Netware Windows NT 2000 XP or other LAN operating systems to support printer or file sharing Would the information be intercepted while transmitting on air WLAN features two fold protection...

Страница 20: ...receiver knows the parameters of the spread spectrum signal being broadcast If a receiver is not tuned to the right frequency a spread spectrum signal looks like background noise There are two main al...

Отзывы: