background image

TL-WN353G 

54M Wireless PCI Adapter User Guide

 

 
 

14

 

Figure 3-6 

¾

 

Profile Name -

 Please enter the Profile name which identifies the configuration profile. This 

name must be unique. Note that the profile names are not case-sensitive. 

¾

 

Network Name (SSID) -

 Please enter the IEEE 802.11 wireless network name. This field has 

a maximum limit of 32 characters. 

)

 

Note: 

The 

Profile Name

 and 

Network Name

 are necessary for the profile, you must configure it. 

¾

 

Channel - 

If you want to use the specific channel to connect to the wireless network, select 

the option “This is a computer-to-computer (ad-hoc) network; wireless access points are not 

used.” If you don't select the option, the system will search the available channel to connect.

 

¾

 

Wireless network security -

 This configure the security for the adapter.

 

)

 

Note: 

You should configure the security for the adapter according with the wireless network that you 
want to connect. If the wireless network takes some security measure, you should configure the 
same security for the adapter accordingly. If the wireless network doesn’t take security measure, 
you don’t need to configure the security for the adapter. 

 

Network Authentication - 

Select which mode the Wireless PCI Adapter uses to 

authenticate to an access point. These modes are: Open System, Shared key, 
WPA-PSK, WPA2-PSK, WPA 802.1X, WPA2 802.1X, and WEP 802.1X. 

 

Data encryption -

 Select the corresponding data encryption for the authentication. 

These encryptions are: Disabled, WEP, TKIP and AES. 

Содержание TL-WN353G

Страница 1: ...TL WN353G 54M Wireless PCI Adapter Rev 1 0 1 1910010045...

Страница 2: ...are trademarks or registered trademarks of their respective holders No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation tran...

Страница 3: ...ed Consult the dealer or an experienced radio TV technician for help This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause...

Страница 4: ...has been ongoing in recent years to allow current relaxed regulation Full implementation planned 2012 Italy If used outside of own premises general authorization is required Luxembourg None General au...

Страница 5: ...llation for Windows Vista 5 Chapter 3 Configuration 9 3 1 Set Wizard 9 3 2 General Status 11 3 3 Profile Management 12 3 3 1 Add or Edit a Configuration Profile 13 3 3 2 Remove a configuration profile...

Страница 6: ...LINK Wireless Utility and Drivers User Guide Other Helpful Information Note If any of the listed contents are damaged or missing please contact the retailer from whom you purchased the TL WN353G 54M W...

Страница 7: ...EP and WPA encryption for high security 1 2 Features Complies with IEEE802 11g IEEE802 11b standards Supports WPA WPA2 data security IEEE802 1x authentication TKIP AES encryption 64 128 152 bit WEP en...

Страница 8: ...esktop PC 2 2 Software Installation 2 2 1 Overview The Adapter s Setup Wizard will guide you through the Installation procedure for Windows XP and Vista The Setup Wizard will install the TP LINK Wirel...

Страница 9: ...Adapter User Guide 3 Figure 2 1 Step 2 Click Next in the screen below shown in Figure 2 2 to continue you can click Cancel to end the installation Figure 2 2 Step 3 After that the next screen displays...

Страница 10: ...the next screen the files will be copied as the next screen shown shown in Figure 2 4 To end the Installation click Cancel Figure 2 4 Note During the installation the system will warn about Windows Lo...

Страница 11: ...dows Vista 1 Insert the Resource CD into your CD ROM drive and open the folder with the same name as your product Then double click Setup exe in the proper folder according to your operating system to...

Страница 12: ...ure 2 7 2 Click Next in the screen below shown in Figure 2 12 to continue you can click Cancel to end the installation Figure 2 8 3 After that the files will be copied as the next screen shown shown i...

Страница 13: ...User Guide 7 Figure 2 9 Note During the installation the system will warn about Windows Security testing please click Install this driver software anyway to continue the installation Figure 2 10 4 Cl...

Страница 14: ...TL WN353G 54M Wireless PCI Adapter User Guide 8 Figure 2 11...

Страница 15: ...llow there is poor signal strength and the RSSI is between 5dB and 10dB If the icon is green there is good signal strength and the RSSI is between 10dB and 20dB If the icon is green there is excellent...

Страница 16: ...lick Refresh button to update the wireless network show in Figure 3 2 Then select the wireless network and click Next Figure 3 2 Step 3 After that select the network authentication and data encryption...

Страница 17: ...rompts Unsecured network click OK to continue 3 2 General Status Choose the tab General as shown in Figure 3 4 the left filed displays the type of the adapter the right field displays the status about...

Страница 18: ...ss from the AP Show Tray Icon Select the option to display the icon on the bottom of the desktop Otherwise you can see the two icons Disable Adapter If you select the option the adapter can t work Rad...

Страница 19: ...5 3 3 1 Add or Edit a Configuration Profile Click the button Add or Edit you should select an existed profile first to edit it on the screen above and you can configure the profile as shown in Figure...

Страница 20: ...n t select the option the system will search the available channel to connect Wireless network security This configure the security for the adapter Note You should configure the security for the adapt...

Страница 21: ...a encryption as WPA 802 1X WPA2 802 1X or WEP 802 1X EAP TYPE Select the EAP type for the 802 1x configuration the options are GTC TLS LEAP TTLS PEAP Tunnel Select the tunnel MD5 GTC TLS and MSCHAP V2...

Страница 22: ...the Key index 1 and click the OK to save the configuration 2 Shared Key authentication When you select the Shared Key as the authentication the only available data encryption is WEP Note The configur...

Страница 23: ...elect the WPA2 PSK as the authentication the available data encryptions are TKIP and AES Please select the one according your need Note The configuration for WPA2 PSK and WPA PSK are similar you can r...

Страница 24: ...he configuration for WPA2 802 1x and WPA 802 1x are similar you can refer to WPA 802 1x authentication to configure it 7 WEP 802 1x When you select the WEP 802 1x as the authentication the only availa...

Страница 25: ...e and then enter the new name for the configuration profile 3 3 4 Set default configuration profile Follow the steps below to select a configuration profile as default Once the adapter wants to connec...

Страница 26: ...t at any time Step 2 Highlight a network name and click Add to Profile to connect to an available network Fill in the Profile name and click OK to create the new configuration profile for that network...

Страница 27: ...ects max mode to let the access point buffer incoming messages for the Wireless PCI Adapter The Adapter will detect the access point if any messages are waiting periodically Wireless Mode Select the w...

Страница 28: ...54M Wireless PCI Adapter User Guide 22 Figure 3 13 3 7 Statistics Click the tab Statistics as shown in Figure 3 12 to view the traffic statistics about the connection Click the Reset to refresh the in...

Страница 29: ...WN353G 54M Wireless PCI Adapter User Guide 23 Figure 3 14 3 8 Wi Fi Protect Setup Click the tab Wi Fi Protect Setup as shown in Figure 3 15 select different way to configure the adapter for Wi Fi netw...

Страница 30: ...and the AP the adapter wants to connect must support the Wi Fi function first Or else the adapter can t connect the AP 3 8 1 PIN Step 1 Select the PIN shown in Figure 3 15 Step 2 Click the Refresh bu...

Страница 31: ...PIN Code displays on the screen shown in Figure 3 17 Now you should enter the pin code into your AP Figure 3 17 Step 4 Finally the adapter will create the profile and connect to the AP automatically...

Страница 32: ...ser Guide 26 Figure 3 18 3 8 2 Question Answer Method Step 1 Click PBC as shown in Figure 3 15 Figure 3 19 Step 2 Push the physical button on the AP Step 3 Finally the adapter will create the profile...

Страница 33: ...5 5 2 1Mbps Auto Rate Sensing Modulation 1M DBPSK 2M DQPSK 5 5M 11M CCK 6M 9M 12M 18M 24M 36M 48M 54M OFDM Media Access Protocol CSMA CA with ACK Transmit Power 15dBm Typical Data Security WPA WPA2 64...

Страница 34: ...TL WN353G 54M Wireless PCI Adapter User Guide 28...

Страница 35: ...nt the DSSS signal is recognized as the only valid signal and interference is inherently rejected ignored FHSS Frequency Hopping Spread Spectrum FHSS continuously changes hops the carrier frequency of...

Страница 36: ...ESSID WEP Wired Equivalent Privacy A data privacy mechanism based on a 64 bit or 128 bit or 152 bit shared key algorithm as described in the IEEE 802 11 standard Wi Fi A trade name for the 802 11b wir...

Отзывы: