Efficient-networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connect Uživatelský manuál Strana 1

Procházejte online nebo si stáhněte Uživatelský manuál pro Hardware Efficient-networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connect. Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector User Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk

Shrnutí obsahu

Strany 1 - User Manual

880022..1111gg TTuurrbboo WWLLAANN UUSSBB AAddaapptteerr ww// RRPP--SSMMAA CCoonnnneeccttoorr User Manual

Strany 2 - COPYRIGHT

5 C. In Windows XP, there is a “Windows Zero Configuration Tool” for you to setup the wireless adapter. You can choose to configure the adapter thro

Strany 3 - Interference Statement

6 NOTE: In Windows Vista, the following window will appear when you insert network adapter into computer, please ignore it and wait. I

Strany 4

7 3 Configuration Utility The Ralink Configuration Utility is a powerful application that helps you configure the USB adapter and monitor the link s

Strany 5 - CONTENTS

8 Second Way A. Right-click the icon and select “View Available Wireless Networks”. B. Click “Advanced”. C. Uncheck “Use Windows to configure my

Strany 6 - 1 Introduction

9 Note: If “Wireless Zero Configuration” is enabled, you can only configure the advance setting or check the link status and statistics from the conf

Strany 7 - 1.2 Specifications

10 3.2 Profile The “Profiles List” is for you to manage the networks you connect to frequently. You are able to Add/Delete/Edit/Activate a profile.

Strany 8 - • One Quick Guide

11 3.2.1 Configure the Profile 3.2.1.1 Configuration Parameter Description Profile Name Define a recognizable profile name for you to identify

Strany 9 - 2 Installation Procedure

12 Parameter Description Network Type Infrastructure – This operation mode requires the presence of an 802.11 Access Point. All communication is don

Strany 10

13 3.2.1.2 Authentication and Security Parameter Description Authentication Type This setting has to be consistent with the wireless networks

Strany 11

14 Parameter Description WPA-PSK – It is a special mode designed for home and small business users who do not have access to network authentication

Strany 12 - 3 Configuration Utility

COPYRIGHT Copyright ©2005/2006 by this company. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed,

Strany 13

15 Parameter Description AES – AES has been developed to ensure the highest degree of security and authenticity for digital information and it is t

Strany 14 - 3.1 Site Survey

16 The IEEE 802.1X specification describes a protocol that can be used for authenticating both clients and servers on a network. The authenticatio

Strany 15

17 3.2.1.3 802.1x Setting-Certification Parameter Description Authentication Type The EAP authentication protocols this adapter has supported are i

Strany 16

18 3.2.1.4 802.1x Setting-CA Server Parameter Description Use Certificate Chain When the EAP authentication type such as TLS, TTLS or PEAP is sel

Strany 17

19 3.3 Link Status From the “Link Status” option, you can view all the information of the network you are connecting to. Parameter Description Sta

Strany 18

20 Parameter Description Noise Level Display the noise level in the wireless environment. 3.4 Statistics This option enables you to view the stat

Strany 19

21 Parameter Description Wireless Mode 802.11 B/G mix – If you have a mix of 802.11b and 802.11g wireless stations in your network, it is recommende

Strany 20

22 Parameter Description Tx Rate There are several options including Auto/1/2/5.5/11/6/9/12/18/24/36/48/54Mbps for you to select. When the “Auto” is

Strany 21 - Service)

23 Parameter Description LEAP Turn on CCKM During normal operation, LEAP-enabled client devices mutually authenticate with a new access point by per

Strany 22

24 Parameter Description WMM Enable Check on this item and click “Apply” to enable WMM function, and then further you can configure WMM Power Save a

Strany 23

Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital dev

Strany 24

25 3.8 Turbo Mode This adapter supports specific ways to increase the data transfer rate at a time; compress the data and decrease the waiting time t

Strany 25

26 Parameter Description Rescan Click this button to scan for WPS-enabled access point (perform a site survey) Information Select a found WPS-ena

Strany 26

27 3.10 SoftAP This adapter can run as a wireless AP. The relative configurations of the AP including channel, SSID, MAC Address Filtering and so on

Strany 27

28 Parameter Description Wireless Mode Selects the wireless mode supports by the AP. 802.11 B/G Mixed – The AP works in 11b+g mixed mode. 802.11 B

Strany 28 - 3.6 QoS

29 Parameter Description B/G Protection If you have a mix of 802.11b and 802.11g wireless clients in the network, it is recommended to enable the pr

Strany 29

30 Parameter Description Default Click to use with default value. Apply Click to apply the setting change. 3.10.1.1 Auth. Vs. Security This opt

Strany 30 - 3.9 WPS Configuration

31 Parameter Description Encryption Type Not Use - Disable the encryption mode. WEP - Enable the WEP Data Encryption. When the item is selected, yo

Strany 31

32 3.10.2 Access Control The Access Control page enables you to configure the access control policy used within the AP. Parameter Description Acce

Strany 32 - 3.10.1 Config

33 3.10.3 Mac Table The Mac Table page displays the detail information of the wireless adapters connected to the AP. Parameter Description MAC Add

Strany 33

34 3.10.4 Event Log The Event Log page displays all the event time and message. You may clear the table by clicking “Clear”. 3.10.5 Statistics The

Strany 34

Federal Communications Commission (FCC) RF Exposure Requirements SAR compliance has been established in the laptop computer(s) configurations with

Strany 35 - 3.10.1.1 Auth. Vs. Security

35 3.10.6 About The About page displays the basic information about the Utility, including Driver, Utility and EEPROM Version. The MAC Address of the

Strany 36

36 4 Glossary This chapter provides solutions to problems usually encountered during the installation and operation of the adapter. 1. What is th

Strany 37 - 3.10.2 Access Control

37 6. What is BSS ID? A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7. Wh

Strany 38 - 3.10.3 Mac Table

38 13. What is Spread Spectrum? Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, sec

Strany 39 - 3.10.5 Statistics

CONTENTS 1 INTRODUCTION...1 1.1 Features...

Strany 40 - 3.10.6 About

1 1 Introduction Thank you for purchasing the 802.11g Turbo Wireless LAN USB Adapter with Reverse SMA Connector. This USB adapter is designed with a

Strany 41 - 4 Glossary

2 1.1 Features • Works with both IEEE 802.11b and IEEE 802.11g products. • High-speed transfer data rate – up to 54Mbps. • Supports Turbo Mode to

Strany 42

3 1.3 Package Contents Before you begin the installation, please check the items of your package. The package should include the following items: •

Strany 43

4 2 Installation Procedure Before you proceed with the installation, please notice following descriptions. Note1: Please do not connect the network

Komentáře k této Příručce

Žádné komentáře