![Rosewill RNX-AC1900UB Скачать руководство пользователя страница 28](http://html1.mh-extra.com/html/rosewill/rnx-ac1900ub/rnx-ac1900ub_user-manual_1487838028.webp)
28
AC1900 Dual Band Wi-Fi USB Adapter
User Manual
RNX-AC1900UB
•
Frequency Hopping Spread Spectrum
(FHSS) - FHSS continuously changes
(hops) the carrier frequency of a conventional carrier several times per second
according to a pseudo-random set of channels. Because a fixed frequency is not
used, and only the transmitter and receiver know the hop patterns, interception
of FHSS, is extremely difficult.
•
Infrastructure Network
- An infrastructure network is a group of computers or
other devices, each with a Wireless Adapter, connected as an 802.11 wireless
LAN. In infrastructure mode, the wireless devices communicate with each other
and to a wired network by first going through an access point. An infrastructure
wireless network connected to a wired network is referred to as a basic service
set (BSS). A set of two or more BSS in a single network is referred to as an
extended service set (ESS). Infrastructure mode is useful at a corporation scale,
or when it is necessary to connect the wired and wireless networks.
•
Service Set Identification
(SSID) - A thirty-two character (maximum)
alphanumeric key identifying a wireless local area network. For the wireless
devices in a network to communicate with each other, all devices must be
configured with the same SSID. This is typically the configuration parameter for
a wireless PC card. It corresponds to the ESSID in the wireless access point and
to the wireless network name.
•
Wired Equivalent Privacy
(WEP) - A data privacy mechanism based on a 64 or
128-bit or 152-bit shared key algorithm, as described in the IEEE 802.11
standard. To gain access to a WEP network, you must know the key. The key is
a string of characters that you create. When using WEP, you must determine the
evel of encryption. The type of encryption determines the key length. 128-bit
encryption requires a longer key than 64-bit encryption. Keys are defined by
entering in a string in hexadecimal (HEX) using characters 0-9, A-F or American
Standard Code for Information Interchange (ASCII) alphanumeric characters
format. ASCII format is provided so you can enter a string that is easier to
remember. The ASCII string is converted to HEX for use over the network. Four
keys can be defined so that you can change keys easily.