background image

PW-MN421 

  Wireless Lite-N USB Module 

 

 

10

Appendix B: Glossary 

¾

 

802.11b -

 The 802.11b standard specifies a wireless product networking at 11 Mbps using 

direct-sequence spread-spectrum (DSSS) technology and operating in the unlicensed radio 

spectrum at 2.4GHz, and WEP encryption for security. 802.11b networks are also referred to 

as Wi-Fi networks. 

¾

 

802.11g

 

-

 specification for wireless networking at 54 Mbps using direct-sequence 

spread-spectrum (DSSS) technology, using OFDM modulation and operating in the 

unlicensed radio spectrum at 2.4GHz, and backward compatibility with IEEE 802.11b devices, 

and WEP encryption for security. 

¾

 

802.11n - 

802.11n builds upon previous 802.11 standards by adding MIMO (multiple-input 

multiple-output). MIMO uses multiple transmitter and receiver antennas to allow for increased 

data throughput via spatial multiplexing and increased range by exploiting the spatial diversity, 

perhaps through coding schemes like Alamouti coding. The Enhanced Wireless Consortium 

(EWC)

[3]

 was formed to help accelerate the IEEE 802.11n development process and promote 

a technology specification for interoperability of next-generation wireless local area 

networking (WLAN) products. 

¾

 

Ad-hoc Network -

 An ad-hoc network is a group of computers, each with a Wireless Adapter, 

connected as an independent 802.11 wireless LAN. Ad-hoc wireless computers operate on a 

peer-to-peer basis, communicating directly with each other without the use of an access point. 

Ad-hoc mode is also referred to as an Independent Basic Service Set (IBSS) or as 

peer-to-peer mode, and is useful at a departmental scale or SOHO operation.   

¾

 

DSSS - 

(

D

irect-

S

equence 

S

pread 

S

pectrum) 

-

 DSSS generates a redundant bit pattern for all 

data transmitted. This bit pattern is called a chip (or chipping code). Even if one or more bits 

in the chip are damaged during transmission, statistical techniques embedded in the receiver 

can recover the original data without the need of retransmission. To an unintended receiver, 

DSSS appears as low power wideband noise and is rejected (ignored) by most narrowband 

receivers. However, to an intended receiver (i.e. another wireless LAN endpoint), the DSSS 

signal is recognized as the only valid signal, and interference is inherently rejected (ignored). 

¾

 

FHSS - 

(

F

requency 

H

opping 

S

pread 

S

pectrum) 

-

 FHSS continuously changes (hops) the 

carrier frequency of a conventional carrier several times per second according to a 

pseudo-random set of channels. Because a fixed frequency is not used, and only the 

transmitter and receiver know the hop patterns, interception of FHSS is extremely difficult. 

¾

 

Infrastructure Network -

 An infrastructure network is a group of computers or other devices, 

each with a Wireless Adapter, connected as an 802.11 wireless LAN. In infrastructure mode, 

the wireless devices communicate with each other and to a wired network by first going 

through an access point. An infrastructure wireless network connected to a wired network is 

referred to as a Basic Service Set (BSS). A set of two or more BSS in a single network is 

referred to as an Extended Service Set (ESS). Infrastructure mode is useful at a corporation 

scale, or when it is necessary to connect the wired and wireless networks.   

¾

 

Spread Spectrum -

 Spread Spectrum technology is a wideband radio frequency technique 

Содержание PW-MN421

Страница 1: ...PW MN421 Wireless Lite N USB Module...

Страница 2: ...re trademarks or registered trademarks of their respective holders No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation transf...

Страница 3: ...an experienced radio TV technician for help This device complies with part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference 2...

Страница 4: ...ongoing in recent years to allow current relaxed regulation Full implementation planned 2012 Italy If used outside of own premises general authorization is required Luxembourg None General authorizati...

Страница 5: ...ontents 1 Chapter 1 Introduction 2 1 1 Overview of the Product 2 1 2 Features 2 Chapter 2 Installation Guide 3 2 1 Hardware Installation 3 2 2 Software Installation 3 Appendix A Specifications 9 Appen...

Страница 6: ...Lite N USB Module Note Make sure that the package contains the above items If any of the listed items are damaged or missing please contact with your distributor Conventions The Module mentioned in th...

Страница 7: ...odule supports WEP WPA and WPA2 encryption to prevent outside intrusion and protect your personal information from being exposed With unmatched wireless performance reception and security protection i...

Страница 8: ...for your system For installation you must be sure to connect this module to your device or system s compatible connector sometimes you should use a connecting wire first Then the promoted Found New Ha...

Страница 9: ...nue Figure 2 2 3 After that you should choose a Setup type It is recommended that you select Install Client Utilities and Driver Select Install Driver Only to install driver only select Make Driver In...

Страница 10: ...n for the software then click Next in the screen below shown in Figure 2 4 Figure 2 4 5 After that select the program folder you should create a new folder name or select one from the Existing Folders...

Страница 11: ...USB Module 6 Figure 2 5 6 Choose configuration tool if you are not sure please leave it default Then click Next to continue Figure 2 6 7 Click OK to continue the Installation Wait a while for the setu...

Страница 12: ...proceed with the installation during these steps shown in Figure 2 8 Our drivers have been tested thoroughly and are able to work with the operating system Click Continue Anyway to continue the Insta...

Страница 13: ...PW MN421 Wireless Lite N USB Module 8 Figure 2 9...

Страница 14: ...4 QAM DBPSK DQPSK and CCK Media Access Protocol CSMA CA with ACK Data Security WPA WPA2 64 128 152 bit WEP TKIP AES Frequency 2 412 2 472 GHz For CE Area 2 412 2 462 GHz For FCC Area Spread Spectrum D...

Страница 15: ...eer to peer mode and is useful at a departmental scale or SOHO operation DSSS Direct Sequence Spread Spectrum DSSS generates a redundant bit pattern for all data transmitted This bit pattern is called...

Страница 16: ...f characters that you create When using WEP you must determine the level of encryption The type of encryption determines the key length 128 bit encryption requires a longer key than 64 bit encryption...

Отзывы: