background image

 

13 

 

 

Parameter Description 
Key Length 

You may select the 64-bit or 128-bit to encrypt transmitted data. 
Larger key length will provide higher level of security, but the 
throughput will be lower. 

 

 

Key1 ~ Key4 

The keys are used to encrypt data transmitted in the wireless 
network. Fill the text box by following the rules below. 

• 

64-bit

 – Input 10 digit Hex values (in the “A-F”, “a-f” and “0-9” 

range) as the encryption keys. For example: “0123456aef“. 

 

• 

128-bit

 – Input 26 digit Hex values (in the “A-F”, “a-f” and “0-

9” range) as the encryption keys. For example: 
“01234567890123456789abcdef“. 

 

3.4 Statistics 

In the 

“Statistics”

, you can get the real time information about the packet transmission and 

receiving status. 
 
 

 

Summary of Contents for EW-7106PC

Page 1: ...W Wi ir re el le es ss s L LA AN N C Ca ar rd db bu us s A Ad da ap pt te er r User Manual Version 1 0 Dec 2002...

Page 2: ...arranties merchantability or fitness for any particular purpose Any software described in this manual is sold or licensed as is Should the programs prove defective following their purchase the buyer a...

Page 3: ...an outlet on a circuit different from that to which the receiver is connected 4 Consult the dealer or an experienced radio technician for help FCC Caution This equipment must be installed and operated...

Page 4: ...tention must be paid to the dangers of electric shock and static electricity when working with electrical equipment All guidelines of this and of the computer manufacture must therefore be allowed at...

Page 5: ...ONTENTS 2 2 INSTALLATION PROCEDURE 3 2 1 WINDOWS 98SE ME 2000 3 2 1 1 Install the Driver 3 2 1 2 Install the Utility 3 2 2 WINDOWS XP 4 3 CONFIGURATION UTILITY 7 3 1 CONFIGURATION 7 3 2 LINK STATE 9 3...

Page 6: ...128 bit WEP Data Encryption function for high level of security Support TKIP and AES advanced WLAN Security Supports peer to peer communication among any wireless users no Access Point required Automa...

Page 7: ...Contents Before you begin the installation please check the items of your package The package should include the following items One Wireless Cardbus Adapter One CD Driver Utility User s Manual One Q...

Page 8: ...Insert the adapter into the Cardbus port of your computer the system will automatically find the device and search for its driver 2 Please select the Driver Win2000 folder select the folder based on...

Page 9: ...esktop In the taskbar 2 2 Windows XP The installation process in Windows XP is similar with the process in windows 98SE Me 2000 Please refer to the instructions described in section 2 1 Due to the Win...

Page 10: ...ireless Network Connection Properties screen uncheck the setting Use Windows to configure my wireless network settings Note that if you want to change back to the Windows XP built in utility check the...

Page 11: ...6 Note If you don t disable the XP s Utility you can still see the link status and statistics during communication process from the adapter s utility...

Page 12: ...about the wireless LAN Parameter Description Network Type Infrastructure This operation mode requires the presence of an 802 11 Access Point All communication is done via the Access Point Ad Hoc Sele...

Page 13: ...d to the WLAN network periodly The beacon period is fixed in 100ms Power Save CAM Continuous Access Mode Adapter will always set in active mode Max Enable the adapter in the power saving mode when it...

Page 14: ...o be set Basic Click Apply button to save the above configurations click Undo button to cancel the settings Note The data rate is auto fallback among the range of the used data rate in case obstacles...

Page 15: ...the bar the more radio signal been received by the adapter This indicator helps to find the proper position of the wireless device for quality network operation Signal Quality This bar indicates the...

Page 16: ...a temporary quick fix method defined in IEEE 802 11i standard to quickly overcome the inherent weaknesses in WEP security AES has been developed to ensure the highest degree of security and authentici...

Page 17: ...ave to continue setting the AES Key Length and the encryption keys Auth Algorithm This setting has to be consistent with the wireless devices which the adapter intends to connect Open System No authen...

Page 18: ...ansmitted in the wireless network Fill the text box by following the rules below 64 bit Input 10 digit Hex values in the A F a f and 0 9 range as the encryption keys For example 0123456aef 128 bit Inp...

Page 19: ...independent wireless LAN Ad hoc wireless LAN is applicable at a departmental scale for a branch or SOHO operation 4 What is Infrastructure An integrated wireless and wireless and wired LAN is called a...

Page 20: ...to both transmitter and receiver Properly synchronized the net effect is to maintain a single logical channel To an unintended receiver FHSS appears to be short duration impulse noise Direct sequence...

Reviews: