U-Media WST-375L Скачать руководство пользователя страница 1

         

U-MEDIA Communications, Inc. 

                                            Proprietary and Confidential

 

 

 

 

 

 

2.4GHz Wireless 802.11n Bridge

 

 

 

Model: WST-375L 

 

User’s Guide 

 

Version Date 

Description 

01 

11/07/2008 

Draft rev. 01 

 

 

 

 

 

 

 

 

 

 
 
 
 
 
 
 
 
 
 

Содержание WST-375L

Страница 1: ...U MEDIA Communications Inc Proprietary and Confidential 1 2 4GHz Wireless 802 11n Bridge Model WST 375L User s Guide Version Date Description 01 11 07 2008 Draft rev 01...

Страница 2: ...uipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help FCC Caut...

Страница 3: ...g comply with the R TTE Directive 1999 5 EC the EMC Directive 89 336 EEC and the Low Voltage Directive 73 23 EEC issued by the Commission of the European Community Compliance with these directives imp...

Страница 4: ...1 LED Indications 8 3 2 Rear Panel 9 3 3 Top View 9 3 4 Bottom View 9 3 3 Installation Considerations 10 3 4 Getting Start 11 4 Using the Configuration Menu 12 4 1 Network 13 4 1 1 LAN Setting 13 4 2...

Страница 5: ...U MEDIA Communications Inc Proprietary and Confidential 5 C 26 D 27 E 28 F 28 G 29 H 30 I 30 J 32 K 32 L 32 M 33 N 33 O 34 P 35 Q 36 R 36 S 37 T 38 U 39 V 39 W 40 X 41 Y 41 Z 41 41 1 41...

Страница 6: ...DRAFT Bridge CD ROM User s Guide Multi Language Quick Installation Guide CAT 5 Ethernet Cable Power Adapter 12V 0 5A Using a power supply with a different voltage than the one included with your produ...

Страница 7: ...11n and 11b g devices but you will not lose the ability to communicate when you incorporate the 11n standard into your 11b g network You may choose to slowly change your network by gradually replacin...

Страница 8: ...U MEDIA Communications Inc Proprietary and Confidential 8 3 Hardware Overview 3 1 LED Indications...

Страница 9: ...U MEDIA Communications Inc Proprietary and Confidential 9 3 2 Rear Panel 3 3 Top View 3 4 Bottom View...

Страница 10: ...g can reduce your wireless product s range from 3 90 feet 1 30 meters Position your devices so that the number of walls or ceilings is minimized 2 Be aware of the direct line between network devices A...

Страница 11: ...or DSL subscriber line into your home or office 2 Consult with your Cable or DSL provider for proper installation of the modem 3 Connect the Cable or DSL modem to the WRT 390L Wireless Broadband Route...

Страница 12: ...opening the Web browser and typing in the IP Address of the WST 375L The WST 375L s default IP Address is http 192 168 10 101 Open the Web browser Type in the IP Address of the Bridge http 192 168 10...

Страница 13: ...ase you must also configure the following fields IP Address The IP address of the AP on the local area network Assign any unused IP address in the range of IP addresses available for the LAN For examp...

Страница 14: ...connection to a specific wireless network Use this option to make custom profiles and store new profile for later use Configure the setting to connect to a wireless network selection option for networ...

Страница 15: ...te Survey tool to search for wireless networks in the WST 375L area Click on the Scan button to search for wireless networks to join From this window you can also add your profile to use with theWST 3...

Страница 16: ...U MEDIA Communications Inc Proprietary and Confidential 16 4 3 3 Statistics View the current operating status of the WST 375L see the Transmit and Receive data...

Страница 17: ...U MEDIA Communications Inc Proprietary and Confidential 17 4 3 4 Advance Use this setting to adjust the wireless environment...

Страница 18: ...allows wireless clients such as notebooks or Laptops to save battery life by sending less transmission during idle times Add a check mark to enable this option PS Mode Used for specific application wh...

Страница 19: ...U MEDIA Communications Inc Proprietary and Confidential 19 4 3 6 WPS You can setup security easily by choosing PIN or PBC method to do Wi Fi Protected Setup...

Страница 20: ...U MEDIA Communications Inc Proprietary and Confidential 20 4 3Administrator 4 3 1 Management At this page you can configure administrator account and password...

Страница 21: ...Confidential 21 4 3 2 Upload Firmware By assigning firmware location you can upload firmware at this page Once you have a firmware update on your computer use this option to browse for the file and t...

Страница 22: ...ws you to export and then save the router s configuration to a file on your computer Be sure to save the configuration before performing a firmware upgrade Import Settings Use this option to restore p...

Страница 23: ...roprietary and Confidential 23 lost If you want to save your router configuration settings use the Export Settings option above System Reboot This restarts the router It is useful for restarting when...

Страница 24: ...U MEDIA Communications Inc Proprietary and Confidential 24 4 3 4 Status You can check system information and network configurations on this page...

Страница 25: ...ess Resolution Protocol ARP Used to map MAC addresses to IP addresses so that conversions can be made in both directions Advanced Encryption Standard AES Government encryption standard Alphanumeric Ch...

Страница 26: ...t with older legacy devices to guarantee interoperability Bandwidth The maximum amount of bytes or bits per second that can be transmitted to and from a network device Beacon A data frame by which one...

Страница 27: ...to the site that gave your computer the cookie D Data Information that has been translated into binary so that it can be processed or moved to another device Data Link layer The second layer of the OS...

Страница 28: ...System Translates Domain Names to IP addresses Domain name A name that is associated with an IP address Download To send a request from one computer to another and have the file transmitted back to t...

Страница 29: ...f the local network Firmware Programming that is inserted into a hardware device that tells it how to function Fragmentation Breaking up data into smaller pieces to make it easier to store FTP File Tr...

Страница 30: ...pertext Transfer Protocol is used to transfer files from HTTP servers web servers to HTTP clients web browsers HTTPS HTTP over SSL is used to encrypt and decrypt HTTP transmissions Hub A networking de...

Страница 31: ...sferring data from one computer to another on the Internet Internet Protocol Security IPsec provides security at the packet processing layer of network communication Internet Service Provider An ISP p...

Страница 32: ...plets for web pages K Kbps Kilobits per second Kbyte Kilobyte L LAN Local Area Network Latency The amount of time that it takes a packet to get from the one point to another on a network Also referred...

Страница 33: ...ement Information Base is a set of objects that can be managed by using SNMP Modem A device that Modulates digital signals from a computer to an analog signal in order to transmit the signal over phon...

Страница 34: ...d which part designates the Host Network Interface Card A card installed in a computer or built onto the motherboard that allows the computer to connect to a network Network Layer The third layer of t...

Страница 35: ...hysical layer The first layer of the OSI model Provides the hardware means of transmitting electrical signals on a data carrier Ping A utility program that verifies that a given Internet address exist...

Страница 36: ...ice allows for remote users to dial into a central server and be authenticated in order to access resources on a network Reboot To restart a computer and reload it s operating software or firmware fro...

Страница 37: ...that is generated for every communication session between two computers Session layer The fifth layer of the OSI model which coordinates the connection and communication between applications on both...

Страница 38: ...firewall Subnet mask Determines what portion of an IP address designates the Network and which part designates the Host Syslog System Logger a distributed logging interface for collecting in one plac...

Страница 39: ...discover each other and configure themselves to be a part of the network Upgrade To install a more recent version of a software or firmware product Upload To send a request from one computer to anothe...

Страница 40: ...d for configuring and bootstrapping wireless networking hardware access points and wireless clients including PCs and other devices WDS Wireless Distribution System A system that enables the interconn...

Страница 41: ...dband Internet connection over a wireless connection Wireless LAN Connecting to a Local Area Network over one of the 802 11 wireless standards WISP Wireless Internet Service Provider WLAN Wireless Loc...

Страница 42: ...munications Inc Proprietary and Confidential 42 802 11 A family of specifications for wireless local area networks WLANs developed by a working group of the Institute of Electrical and Electronics Eng...

Отзывы: