background image

 

5. Troubleshooting 

This section provides solutions to problems usually encountered during the 
installation and operation of the USB adapter. Read the description below to 
diffuse your doubts. 
 

What is the IEEE 802.11g standard?   
         

802.11g is the latest IEEE standard for high-speed WLAN communications 
that provides up to 54Mbps data rate in the 2.4GHZ band. It has become the 
mainstream technology of current WLAN networks. It uses OFDM 
modulation to reach higher data transmission rate and backward compatible 
with 802.11b 

What is the IEEE 802.11b standard? 

The IEEE 802.11b WLAN standard subcommittee, which formulates a 
standard for the industry. The objective is to enable WLAN hardware from 
different manufacturers to interoperate. 

What features does the IEEE 802.11 standard provide? 

The product supports the following IEEE 802.11 functions: 

 

CSMA/CA plus Acknowledge protocol 

 

Multi-Channel Roaming 

 

Automatic Rate Selection 

 

RTS/CTS feature 

 

Fragmentation 

 

Power Management 

What is Ad-hoc? 

An Ad-hoc mode is a wireless network type in which a group of computers 
equipped with wireless adapters are connected as an independent wireless 
LAN without any access point. All computers operating in this mode must be 
configured to share the same radio channel and SSID. 

What is Infrastructure? 

The difference between Infrastructure network and Ad-hoc network is that 
the former requires an Access point. The Infrastructure mode is appropriate 
for enterprise-scale wireless access to a central database or provides various 
wireless applications for mobile users. 

What is BSS ID? 

An Infrastructure network is called a Basic Service Set (BSS). All the 
wireless stations in a BSS must share the same BSS ID. 

What is TKIP? 

It is another encryption method to overcome the inherent weaknesses of 
WEP, a next generation of WEP. It adopts new algorithm (Michael) to 
generate 128/192-bit encryption keys and provides per-packet key mixing, a 
message integrity check and a re-keying mechanism. 

What is AES? 

         

AES (Advanced Encryption Standard) is a chip-based encryption method of 

26 

Содержание WL-U357v2

Страница 1: ...54 108Mbps Super G Wireless LAN USB Adapter WL U357v2 User s Manual Version 1 0...

Страница 2: ...s equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there...

Страница 3: ...uipment EU Countries Not Intended for Use The ETSI version of this device is intended for home and office use in Austria Belgium Denmark Finland France with Frequency channel restrictions Germany Gree...

Страница 4: ...Minimum System Requirements 5 1 6 Installation Considerations 5 2 Installation Procedure 6 2 1 Utility Driver Installation 6 2 2 Hardware Installation 10 3 Configuration 12 3 1 Link Information 12 3...

Страница 5: ...z Wireless connectivity without the hassles and cost of running cables z IEEE 802 11b g standard compliant z USB 2 0 A type standard connector compatible with USB 1 1 z Super G mode provides up to 108...

Страница 6: ...ame radio channel Before adopting an ESS with roaming capability choosing an available radio channel with less interference is highly recommended Proper Access Point positioning combined with a clear...

Страница 7: ...s and rearrange the workplace 4 Temporary network access Events exhibitions construction sites or some important occasions that require temporary network access 5 Access to database for mobile workers...

Страница 8: ...dBm 36Mbps 16QAM 74dBm 24Mbps 16QAM 78dBm 18Mbps QPSK 82dBm 12Mbps QPSK 84dBm 9Mbps BPSK 86dBm 6Mbps BPSK 88dBm Typically PER 10 packet size 1024 and 25 C 5 C Working Mode Infrastructure Ad Hoc Power...

Страница 9: ...form 3 90 feet Properly position your Access Points Residential Gateways and computers so that the number of walls or ceilings residing between Access Points and clients is minimized z Building mater...

Страница 10: ...8SE ME 2000 Note 1 If you had ever installed the other Wireless Cards before please uninstall the existed drivers and utilities first Note 2 Please install the configuration utility before insert WL U...

Страница 11: ...e Destination Folder that you want to install the utility Or keep the default setting and click Next to continue 5 You can change the Program Folder name as you wish or use the default name to continu...

Страница 12: ...6 Installation will start copy driver and utility to your OS 7 When this dialog box appear please click Continue Anyway 8...

Страница 13: ...8 Please click Finish to complete the installation 9 Please click Finish to restart your PC 9...

Страница 14: ...ill prompt you there is a High Speed device connect to non High Speed USB hub Please don t worry about this and keep installing 3 After properly connect the WL U357 to your PC Windows will detect WL U...

Страница 15: ...select Continue Anyway to continue 5 After the driver installation complete appears Please click Finish 11...

Страница 16: ...ed for wireless communication Encryption Shows the current encryption mode used for wireless network Tx Rate Shows the current data rate used for transmitting Channel Shows the current channel for com...

Страница 17: ...ireless network Wireless Mode There are two types available for selection Infrastructure To establish wireless communication with LAN and other wireless clients through the use the Access Points Ad Ho...

Страница 18: ...the mandatory supported Long Preamble and header which interoperates with the 1 Mbit s and 2 Mbit s DSSS specification as described in IEEE Std 802 11 and an optional Short Preamble and header as desc...

Страница 19: ...encryption feature If one of the three options is selected it is required to configure the following settings from the next dropping list If WPA WPA2 is selected configuration is enabled Please click...

Страница 20: ...e Default Key select one of the 4 keys to use Network Key choose the encryption way either in HEX or ASCII formats and enter the password in the blank space Key Length select 64 or 128 bits as the len...

Страница 21: ...t scanning for available network again Profile You can create and manage the created profiles for Home offices or public areas By double clicking on one of the created profile the setting will adapt t...

Страница 22: ...ormation about the 108Mbps Wireless Network USB Dongle utility which includes the version numbers for Driver Firmware and Utility When there is new version of software available for upgrade you will b...

Страница 23: ...19...

Страница 24: ...gorithms Essentially it is a null authentication algorithm Any station that requests authentication with this algorithm may become authenticated if 802 11 Authentication Type at the recipient station...

Страница 25: ...packet length and if the number of situations is small CSMA CD Carrier Sense Multiple Access Collision Detection which is a LAN access method used in Ethernet When a device wants to gain access to th...

Страница 26: ...BSSs in an ESS ESSID The unique identifier that identifies the ESS In infrastructure association the stations use the same ESSID as AP s to get connected Ethernet A popular local area data communicat...

Страница 27: ...e U S have set aside bandwidth for unlicensed use in the ISM Industrial Scientific and Medical band Spectrum in the vicinity of 2 4GHz in particular is being made available worldwide MAC Address Media...

Страница 28: ...the transmitting station to the receiving station requesting permission to transmit RTS Threshold Transmitters contending for the medium may not be aware of each other RTS CTS mechanism can solve this...

Страница 29: ...cheme used to protect wireless data communication To enable the icon will prevent other stations without the same WEP key from linking with the AP Wireless Bridge One of the additional AP operating mo...

Страница 30: ...TS CTS feature Fragmentation Power Management What is Ad hoc An Ad hoc mode is a wireless network type in which a group of computers equipped with wireless adapters are connected as an independent wir...

Страница 31: ...r more bits in the chip are damaged during transmission statistical techniques embedded in the radio can recover the original data without the need for retransmission To an unintended receiver DSSS ap...

Отзывы: