background image

 

14 

 

6.  What is roaming? 

Roaming is the ability of a portable computer user to communicate continuously while moving 

freely throughout an area greater than that covered by a single access point. Before using the 

roaming function, the workstation must make sure that it is the same channel number with the 

access point of dedicated coverage area. 

 

To achieve true seamless connectivity, the wireless LAN must incorporate a number of different 

functions. Each node and access point, for example, must always acknowledge receipt of each 

message. Each node must maintain contact with the wireless network even when not actually 

transmitting data. Achieving these functions simultaneously requires a dynamic RF networking 

technology that links access points and nodes. In such a system, the user’s end node undertakes a 

search for the best possible access to the system. First, it evaluates such factors as signal strength 

and quality, as well as the message load currently being carried by each access point and the 

distance of each access point to the wired backbone. Based on that information, the node next 

selects the right access point and registers its address. Communications between end node and 

host computer can then be transmitted up and down the backbone. As the user moves on, the end 
node’s RF transmitter regularly checks the system to determine whether it is in touch with the 

original access point or whether it should seek a new one. When a node no longer receives 

acknowledgment from its original access point, it undertakes a new search. Upon finding a new 

access point, it then re-registers, and the communication process continues. 

 

 

 

Содержание DNUA-93C2

Страница 1: ...WLAN 802 11 b g n USB Adapter DNUA 93C2 User Manual May 2012...

Страница 2: ...ay be reproduced stored in a retrieval system or transmitted in any form or by any means whether electronic mechanical photocopying recording or otherwise without the prior writing of the publisher Pe...

Страница 3: ...ent off and on the user is encouraged to try to correct the interference by one of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment and r...

Страница 4: ...any other antenna or transmitter IMPORTANT NOTE FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment This equipment sho...

Страница 5: ...The end user has to also be informed that any changes or modifications not expressly approved by the manufacturer could void the user s authority to operate this equipment If the size of the end prod...

Страница 6: ...ion est autoris e aux deux conditions suivantes 1 l appareil ne doit pas produire de brouillage et 2 l utilisateur de l appareil doit accepter tout brouillage radio lectrique subi m me si le brouillag...

Страница 7: ...informed to keep at least 20cm separation with the antenna while this end product is installed and operated The end user has to be informed that the IC radio frequency exposure guidelines for an uncon...

Страница 8: ...2 DRIVER UTILITY INSTALLATION UNINSTALLATION 8 3 CONNECTING TO AN EXISTING NETWORK 8 4 MODIFYING A WIRELESS NETWORK 9 4 1 MODIFYING GENERAL SETTINGS 9 4 2 MODIFYING SECURITY SETTINGS 10 5 SPECIFICATI...

Страница 9: ...sing its network function without installing driver or utility 3 Connecting to an Existing Network 1 Use the remote control that came with your Blueray player to access the network configuration setti...

Страница 10: ...y the settings below for your network Profile Name Identifies the configuration wireless network profile This name must be unique Profile names are not case sensitive Client Name Identifies the client...

Страница 11: ...e options include EAP FAST EAP TLS EAP TTLS EAP SIM PEAP EAP GTC PEAP EAP MSCHAP V2 LEAP WPA WPA2 Passphrase Enables WPA WPA2 Passphrase security Click on the Configure button and fill in the WPA WPA2...

Страница 12: ...ch means no time limit is imposed for finding the domain controller Note The authentication process times out whenever the authentication timer times out or the time for finding the domain controller...

Страница 13: ...GHz Japan 2 400 2 497GHz China 2 400 2 483GHz Channels support 802 11n b g US Canada 11 1 11 Major European country 13 1 13 France 4 10 13 Japan 11b 14 1 13 or 14th 11g 13 1 13 China 13 1 13 Operation...

Страница 14: ...ed receiver FHSS appears to be short duration impulse noise Direct Sequence Spread Spectrum DSSS generates a redundant bit pattern for each bit to be transmitted This bit pattern is called a chip or c...

Страница 15: ...ogy that links access points and nodes In such a system the user s end node undertakes a search for the best possible access to the system First it evaluates such factors as signal strength and qualit...

Отзывы: