background image

 

Bit:

 A binary digit, which is either -0 or -1 for value, is the smallest unit for data. 

Bridge: 

An internetworking function that incorporates the lowest 2 layers of the 

OSI network protocol model. 

Browser:

 An application program that enables one to read the content and 

interact in the World Wide Web or Intranet. 

BSS: 

BSS stands for “Basic Service Set”. It is an Access Point and all the LAN 

PCs that associated with it. 

Channel: 

The bandwidth which wireless Radio operates is divided into several 

segments, which we call them “Channels”. AP and the client stations that it 
associated work in one of the channels. 

CSMA/CA: 

In local area networking, this is the CSMA technique that combines 

slotted time -division multiplexing with carrier sense multiple access/collision 
detection (CSMA/CD) to avoid having collisions occur a second time. This works 
best if the time allocated is short compared to packet length and if the number of 
situations is small. 

CSMA/CD:

 Carrier Sense Multiple Access/Collision Detection, which is a LAN 

access method used in Ethernet. When a device wants to gain access to the 
network, it checks to see if the network is quiet (senses the carrier). If it is not, it 
waits a random amount of time before retrying. If the network is quiet and two 
devices access the line at exactly the same time, their signals collide. When the 
collision is detected, they both back off and wait a random amount of time before 
retrying. 

DHCP:

 Dynamic Host Configuration Protocol, which is a protocol that lets 

network administrators manage and allocate Internet Protocol (IP) addresses in 
a network.    Every computer has to have an IP address in order to communicate 
with each other in a TCP/IP based infrastructure network. Without DHCP, each 
computer must be entered in manually the IP address. DHCP enables the 
network administrators to assign the IP from a central location and each 
computer receives an IP address upon plugged with the Ethernet cable 
everywhere on the network. 

 

 

 

21 

Содержание WL-U357v2

Страница 1: ...54 108Mbps Super G Wireless LAN USB Adapter WL U357v2 User s Manual Version 1 0...

Страница 2: ...s equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there...

Страница 3: ...uipment EU Countries Not Intended for Use The ETSI version of this device is intended for home and office use in Austria Belgium Denmark Finland France with Frequency channel restrictions Germany Gree...

Страница 4: ...Minimum System Requirements 5 1 6 Installation Considerations 5 2 Installation Procedure 6 2 1 Utility Driver Installation 6 2 2 Hardware Installation 10 3 Configuration 12 3 1 Link Information 12 3...

Страница 5: ...z Wireless connectivity without the hassles and cost of running cables z IEEE 802 11b g standard compliant z USB 2 0 A type standard connector compatible with USB 1 1 z Super G mode provides up to 108...

Страница 6: ...ame radio channel Before adopting an ESS with roaming capability choosing an available radio channel with less interference is highly recommended Proper Access Point positioning combined with a clear...

Страница 7: ...s and rearrange the workplace 4 Temporary network access Events exhibitions construction sites or some important occasions that require temporary network access 5 Access to database for mobile workers...

Страница 8: ...dBm 36Mbps 16QAM 74dBm 24Mbps 16QAM 78dBm 18Mbps QPSK 82dBm 12Mbps QPSK 84dBm 9Mbps BPSK 86dBm 6Mbps BPSK 88dBm Typically PER 10 packet size 1024 and 25 C 5 C Working Mode Infrastructure Ad Hoc Power...

Страница 9: ...form 3 90 feet Properly position your Access Points Residential Gateways and computers so that the number of walls or ceilings residing between Access Points and clients is minimized z Building mater...

Страница 10: ...8SE ME 2000 Note 1 If you had ever installed the other Wireless Cards before please uninstall the existed drivers and utilities first Note 2 Please install the configuration utility before insert WL U...

Страница 11: ...e Destination Folder that you want to install the utility Or keep the default setting and click Next to continue 5 You can change the Program Folder name as you wish or use the default name to continu...

Страница 12: ...6 Installation will start copy driver and utility to your OS 7 When this dialog box appear please click Continue Anyway 8...

Страница 13: ...8 Please click Finish to complete the installation 9 Please click Finish to restart your PC 9...

Страница 14: ...ill prompt you there is a High Speed device connect to non High Speed USB hub Please don t worry about this and keep installing 3 After properly connect the WL U357 to your PC Windows will detect WL U...

Страница 15: ...select Continue Anyway to continue 5 After the driver installation complete appears Please click Finish 11...

Страница 16: ...ed for wireless communication Encryption Shows the current encryption mode used for wireless network Tx Rate Shows the current data rate used for transmitting Channel Shows the current channel for com...

Страница 17: ...ireless network Wireless Mode There are two types available for selection Infrastructure To establish wireless communication with LAN and other wireless clients through the use the Access Points Ad Ho...

Страница 18: ...the mandatory supported Long Preamble and header which interoperates with the 1 Mbit s and 2 Mbit s DSSS specification as described in IEEE Std 802 11 and an optional Short Preamble and header as desc...

Страница 19: ...encryption feature If one of the three options is selected it is required to configure the following settings from the next dropping list If WPA WPA2 is selected configuration is enabled Please click...

Страница 20: ...e Default Key select one of the 4 keys to use Network Key choose the encryption way either in HEX or ASCII formats and enter the password in the blank space Key Length select 64 or 128 bits as the len...

Страница 21: ...t scanning for available network again Profile You can create and manage the created profiles for Home offices or public areas By double clicking on one of the created profile the setting will adapt t...

Страница 22: ...ormation about the 108Mbps Wireless Network USB Dongle utility which includes the version numbers for Driver Firmware and Utility When there is new version of software available for upgrade you will b...

Страница 23: ...19...

Страница 24: ...gorithms Essentially it is a null authentication algorithm Any station that requests authentication with this algorithm may become authenticated if 802 11 Authentication Type at the recipient station...

Страница 25: ...packet length and if the number of situations is small CSMA CD Carrier Sense Multiple Access Collision Detection which is a LAN access method used in Ethernet When a device wants to gain access to th...

Страница 26: ...BSSs in an ESS ESSID The unique identifier that identifies the ESS In infrastructure association the stations use the same ESSID as AP s to get connected Ethernet A popular local area data communicat...

Страница 27: ...e U S have set aside bandwidth for unlicensed use in the ISM Industrial Scientific and Medical band Spectrum in the vicinity of 2 4GHz in particular is being made available worldwide MAC Address Media...

Страница 28: ...the transmitting station to the receiving station requesting permission to transmit RTS Threshold Transmitters contending for the medium may not be aware of each other RTS CTS mechanism can solve this...

Страница 29: ...cheme used to protect wireless data communication To enable the icon will prevent other stations without the same WEP key from linking with the AP Wireless Bridge One of the additional AP operating mo...

Страница 30: ...TS CTS feature Fragmentation Power Management What is Ad hoc An Ad hoc mode is a wireless network type in which a group of computers equipped with wireless adapters are connected as an independent wir...

Страница 31: ...r more bits in the chip are damaged during transmission statistical techniques embedded in the radio can recover the original data without the need for retransmission To an unintended receiver DSSS ap...

Отзывы: