background image

 

 

6.  What is BSS ID

 

A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be 

configured with the same BSS ID. 

 

7.  What is WEP

 

WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key 

algorithm, as described in the IEEE 802 .11 standard. 

 

8.  What is TKIP? 

TKIP is a quick-fix method to quickly overcome the inherent weaknesses in WEP security, 

especially the reuse of encryption keys. TKIP is involved in the IEEE 802.11i WLAN security 

standard, and the specification might be officially released by early 2003. 

 

9. What 

is 

AES? 

AES (Advanced Encryption Standard), a chip-based security, has been developed to ensure the 

highest degree of security and authenticity for digital information, wherever and however 

communicated or stored, while making more efficient use of hardware and/or software than 

previous encryption standards. It is also included in IEEE 802.11i standard. Compare with AES, 

TKIP is a temporary protocol for replacing WEP security until manufacturers implement AES at 

the hardware level. 

 

10.  Can Wireless products support printer sharing

   

Wireless products perform the same function as LAN products. Therefore, Wireless products can 

work with Netware, Windows 2000, or other LAN operating systems to support printer or file 

sharing. 

 

11.  Would the information be intercepted while transmitting on air

 

WLAN features two-fold protection in security. On the hardware side, as with Direct Sequence 

Spread Spectrum technology, it has the inherent security feature of scrambling. On the software 

side, WLAN series offer the encryption function (WEP) to enhance security and Access Control. 

Users can set it up depending upon their needs. 

 

12.  What is DSSS

What is FHSS

And what are their differences

 

Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that changes frequency 

in a pattern that is known to both transmitter and receiver. Properly synchronized, the net effect 

is to maintain a single logical channel. To an unintended receiver, FHSS appears to be 

short-duration impulse noise. Direct-sequence spread-spectrum (DSSS) generates a redundant 

bit pattern for each bit to be transmitted. This bit pattern is called a chip (or chipping code). The 

longer the chip is, the greater the probability that the original data can be recovered. Even if one 

or more bits in the chip are damaged during transmission, statistical techniques embedded in the 

radio can recover the original data without-the need for retransmission. To an unintended 

receiver, DSSS appears as low power wideband noise and is rejected (ignored) by most 

narrowband receivers. 

 

 

 

28

 

Содержание WL-U356R

Страница 1: ...802 11g Wireless USB 2 0 Adapter WL U356R User s Manual...

Страница 2: ...turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures 1 Reorient or relocate the receiving antenna 2 Increase the separati...

Страница 3: ...tes Iceland Liechtenstein Norway and Switzerland WEEE regulation To avoid the potential effects on the environment and human health as a result of the presence of hazardous substances in electrical an...

Страница 4: ...6 3 1 Site Survey 6 3 2 Profile 7 3 2 1 Configure the Profile 9 3 2 1 1 Configuration 9 3 2 1 2 Authentication and Security 11 3 2 1 3 802 1x Setting Certification 13 3 2 1 4 802 1x Setting CA Server...

Страница 5: ...ement for some corporate and government users The power consumption of the WL U356R is also very low It provides several levels of power saving modes allowing user customizes the way of saving the pow...

Страница 6: ...e Operating 0 C 55 C Storage 20 C 70 C Operating Humidity Operating 10 to 90 Non Condensing Storage 5 to 95 Non Condensing Certifications FCC CE 1 3 Package Contents Before you begin the installation...

Страница 7: ...nce completed a menu screen will appear 3 Click the Configuration Utility hyperlink in the WL U356R field to initiate the installation procedure Note If the menu screen does not appear click Start at...

Страница 8: ...You can see the installation progress in this screen 8 The system will automatically detect the card and display Found New Hardware Wizard screen Click Install the Software Automatically to continue...

Страница 9: ...9 When the Hardware Installation screen appears click Continue Anyway to proceed 10 Click Finish to complete Found New Hardware Wizard 11 Click Finish to complete PLANET WL U356R Setup 5...

Страница 10: ...n there are some items for you to operate the configuration utility z Lauch PLANET WL U356R Utilities Select Lauch PLANET WL U356R Utilities to open the Configuration Utility tool z Use Zero Configura...

Страница 11: ...n and Network Type If you want to connect to any networks on the list double click the item on the list and the card will automatically connect to the selected network Rescan Button Click Rescan butto...

Страница 12: ...c This sign indicates the activated profile is been connecting This sign indicates the activated profile is not been connecting Add Delete Edit Button Click these buttons to add delete edit the select...

Страница 13: ...may specify a SSID for the WL U356R and then only the device with the same SSID can interconnect to the card If you want to add the network nearby to the profile list pull down the menu all the netwo...

Страница 14: ...is recommended to setting the card to this mode This mode is also the default setting 802 11 G only This card can be compatible with both 802 11g and 802 11b wireless stations If there are only 802 11...

Страница 15: ...etworks that the card intends to connect Open No authentication is needed among the wireless network Shared Only wireless devices using a shared key WEP Key identified are allowed to connecting each o...

Страница 16: ...between authorized devices WPA2 Like WPA WPA2 supports IEEE 802 1x EAP authentication or PSK technology It also includes a new advanced encryption mechanism using the Advanced Encryption Standard AES...

Страница 17: ...3456aef or test1 128 bit Input 26 digit Hex values in the A F a f and 0 9 range or 13 digit ASCII characters including a z and 0 9 as the encryption keys For example 01234567890123456789abcdef or admi...

Страница 18: ...authentication protocols this card has supported are included as follows This setting has to be consistent with the wireless APs or Routers that the card intends to connect PEAP TTLS PEAP and TTLS are...

Страница 19: ...t status Identity Enter the name as the identity for the server Password Enter the password as the identity for the server Use Client Certificate A client certificate is required for TLS and is option...

Страница 20: ...s an issuer as a trusted root authority by placing the issuer s self signed certificate which contains the issuer s public key into the trusted root certification authority certificate store of the ho...

Страница 21: ...Description Status Display the SSID and MAC ID of the network the card is connecting to Extra Info Display the link status Channel Display the number of the radio channel and the frequency used for t...

Страница 22: ...higher percentage shown in the bar the more radio signal been received by the card This indicator helps to find the proper position of the wireless device for quality network operation Noise Level Di...

Страница 23: ...ere are only 802 11b wireless stations in the network you can set the card to this mode 802 11 G only This card can be compatible with both 802 11g and 802 11b wireless stations If there are only 802...

Страница 24: ...B only the maximum data rate is 11Mbps 11b so that there are only Auto 1 2 5 5 11Mbps options you can select Tx BURST Tx Burst enables the card to deliver the better throughput in the same period and...

Страница 25: ...int configured to provide Wireless Domain Services WDS takes the place of the RADIUS server and authenticates the client so quickly that there is no perceptible delay in voice or other time sensitive...

Страница 26: ...ce over Internet Protocol VoIP phones televisions VCRs and MP3 players IEEE 802 11e Quality of Service QoS The Wi Fi Alliance defined WMM as a profile of the IEEE 802 11e extensions for 802 11 network...

Страница 27: ...B Right Click the Wireless Network Connection and select Properties C Click Configure 23...

Страница 28: ...D Select Advanced page enable the WMM Capable 24...

Страница 29: ...escription AdHoc Wireless Mode Select B G mixed or Pure B mode Auto Channel Select Not applicable on WL U356R Auto Reconnect Mode Auto connecting to AP when disconnected B G protection To avoid collis...

Страница 30: ...This MAC address will not write to EEPROM It is only used in run time Network Type Selecting Infrastructure or AdHoc mode Power Saving Mode Selecting different power mode Radio On Off RF switching RT...

Страница 31: ...es the modulation schemes found in 802 11b including CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps B A protection mechanism called RTS CTS that governs how 802 11g devices and 80...

Страница 32: ...h Netware Windows 2000 or other LAN operating systems to support printer or file sharing 11 Would the information be intercepted while transmitting on air WLAN features two fold protection in security...

Страница 33: ...her words more bandwidth is consumed than in the case of narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver knows...

Страница 34: ...30...

Отзывы: