background image

 

36

 

wireless application for mobile workers. 

6.  What is BSS ID

 

A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be 

configured with the same BSS ID. 

 

7.  What is WEP

 

WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key 

algorithm, as described in the IEEE 802 .11 standard. 

 

8.  What is TKIP? 

TKIP is a quick-fix method to quickly overcome the inherent weaknesses in WEP security, 

especially the reuse of encryption keys. TKIP is involved in the IEEE 802.11i WLAN security 

standard, and the specification might be officially released by early 2003. 

 

9. What 

is 

AES? 

AES (Advanced Encryption Standard), a chip-based security, has been developed to ensure the 

highest degree of security and authenticity for digital information, wherever and however 

communicated or stored, while making more efficient use of hardware and/or software than 

previous encryption standards. It is also included in IEEE 802.11i standard. Compare with AES, 

TKIP is a temporary protocol for replacing WEP security until manufacturers implement AES at 

the hardware level. 

 

10.  Can Wireless products support printer sharing

   

Wireless products perform the same function as LAN products. Therefore, Wireless products can 

work with Netware, Windows 2000, or other LAN operating systems to support printer or file 

sharing. 

 

11.  Would the information be intercepted while transmitting on air

 

WLAN features two-fold protection in security. On the hardware side, as with Direct Sequence 

Spread Spectrum technology, it has the inherent security feature of scrambling. On the software 

side, WLAN series offer the encryption function (WEP) to enhance security and Access Control. 

Users can set it up depending upon their needs. 

 

12.  What is DSSS

What is FHSS

And what are their differences

 

Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that changes frequency 

in a pattern that is known to both transmitter and receiver. Properly synchronized, the net effect 

is to maintain a single logical channel. To an unintended receiver, FHSS appears to be 

short-duration impulse noise. Direct-sequence spread-spectrum (DSSS) generates a redundant 

bit pattern for each bit to be transmitted. This bit pattern is called a chip (or chipping code). The 

longer the chip is, the greater the probability that the original data can be recovered. Even if one 

or more bits in the chip are damaged during transmission, statistical techniques embedded in the 

radio can recover the original data without-the need for retransmission. To an unintended 

receiver, DSSS appears as low power wideband noise and is rejected (ignored) by most 

narrowband receivers. 

 

 

 

Summary of Contents for EW-7316Ug

Page 1: ...W Wi ir re el le es ss s 8 80 02 2 1 11 1b b g g U US SB B A Ad da ap pt te er r User Manual Version 1 0 July 2008...

Page 2: ...respect to the contents hereof and specifically disclaims any warranties merchantability or fitness for any particular purpose Any software described in this manual is sold or licensed as is Should th...

Page 3: ...on between the equipment and receiver 3 Connect the equipment into an outlet on a circuit different from that to which the receiver is connected 4 Consult the dealer or an experienced radio technician...

Page 4: ...ers of electric shock and static electricity when working with electrical equipment All guidelines of this and of the computer manufacture must therefore be allowed at all times to ensure the safe use...

Page 5: ...ireless Configuration Utility 8 5 2 Using Windows Zero Config 12 6 CONFIGURATION UTILITY 16 6 1 Utility Overview 16 6 2 Available Network 18 6 3 General 19 6 4 Profile 20 6 4 1 Configure the Profile 2...

Page 6: ...vides several levels of power saving modes allowing user customizes the way of saving the power from his her portable or handheld devices This adapter is cost effective together with the versatile fea...

Page 7: ...missing in the package and contact your dealer of purchase to claim for missing items One Wireless USB Adapter One USB cable One Quick Installation Guide One CD ROM Including Multi language QIG User...

Page 8: ...ep 1 Please insert the Wireless USB Adapter into an available USB 2 0 port of your computer We recommend you to insert the adapter after the software of driver utility has been installed Step 2 The fo...

Page 9: ...with the product into your CD ROM drive The Windows Vista will popup AutoPlay window Please select Install or run program to execute Autorun exe program The Autorun exe program should be executed aut...

Page 10: ...6 4 Please Click Next to start installing driver and utility 5 Please click install to start the installation...

Page 11: ...7 6 The driver and utility is installing please wait a while 7 When you see this message please click Finish to complete the driver installation process...

Page 12: ...oints will be displayed on Available Network Please select an access point you wish to connect and click Add to Profile If the wireless access point you want to connect does not show here please click...

Page 13: ...9...

Page 14: ...10 4 The utility will automatically add the access point at Wireless Utility Profile...

Page 15: ...11 5 If the wireless access point is successfully connected you ll see a connected icon displayed at the lower left corner of wireless configuration utility window and click Close to exit...

Page 16: ...r lunch wireless configuration Please select Windows Zero Config and click OK to disable the utility of the adapter 2 Please lunch Windows Zero Config by double click the wireless connection icon in t...

Page 17: ...13 3 The Windows Zero Config Panel will pup up Please select the wireless access point which you want to connect and click Connect...

Page 18: ...14 4 If the wireless access point without encryption there is warning window will pup up Please click Connect Anywhere...

Page 19: ...15 5 When you see the Connected shows on the Windows Zero Config window the wireless is successfully connected...

Page 20: ...e icon In the Desktop In the System Tray Right click the icon in the system tray there are some items for you to operate the configuration utility z Open Config Utility Select Open Config Utility to o...

Page 21: ...dapters in your PC from the utility Show Tray Icon To show the icon in the system tray select the item Windows Zero Config To configure the adapter from Windows XP Zero Configuration check the item Ra...

Page 22: ...tion Available Network s This list shows all information of the available wireless networks within the range of your adapter The information includes SSID Channel Encryption Network Authentication Sig...

Page 23: ...mode requires the presence of an 802 11 Access Point All communication is done via the Access Point or Router IBSS Select this mode if you want to connect to another wireless stations in the Wireless...

Page 24: ...ion Available Profile s This list shows the preferred networks for the wireless connection You can add remove edit duplicate the preferred networks or set one of the networks as the default connection...

Page 25: ...omputer to computer ad hoc network wireless access points are not used There are two kinds of network type described as follows Infrastructure This operation mode requires the presence of an 802 11 Ac...

Page 26: ...to network authentication servers In this mode known as Pre Shared Key the user manually enters the starting password in their access point or gateway as well as in each wireless stations in the netw...

Page 27: ...an be ASCII format Alphanumeric values or signs are allowed to be the WEP key It is more recognizable for user Passphrase It is a text string with a maximum of 32 alphanumeric characters for example T...

Page 28: ...or choice for client access point and server products is not a concern When you have set up LEAP authentication you have to enter the user name and password of your computer PEAP TTLS PEAP and TTLS ar...

Page 29: ...er than Max mode Max Enable the adapter in the power saving mode when it is idle Turbo Mode Off Turn off the turbo mode On Turn on the turbo mode Auto The adapter will detect the AP is RTL8186 based A...

Page 30: ...er Save APSD Enable Enable this function to support WMM Power Save Fragment Threshold The value defines the maximum size of packets any packet size larger than the value will be fragmented If you have...

Page 31: ...e and link status If you don t ensure the status of the adapter and the network you are connecting please go to the screen for more details 6 7 Statistics You can get the real time information about t...

Page 32: ...is the unique name identified in a WLAN The ID prevents the unintentional merging of two co located WLANs The default SSID of the AP is Full Computer Name _AP Wireless adapters connect to the AP shoul...

Page 33: ...29 6 8 1 AP Properties Setting Please refer to Section 3 4 1 for the setting of the parameters for AP Note that Ad Hoc mode is not enabled for AP 6 8 2 AP Advanced...

Page 34: ...ations There are three mode including Long Short and Auto High network traffic areas should use the shorter preamble type If Auto mode is selected the AP will auto switch the preamble mode depending o...

Page 35: ...you want to connect to the internet through this SoftAP you will need to make a bridge between our SoftAP and your internet connect Select the internet connection in your SoftAP host machine and pres...

Page 36: ...ild an Ad hoc wireless network For example if you want to connect to a wireless LAN in infrastructure mode A Open the RT Set wizard and choose the Station infrastructure mode B The site survey results...

Page 37: ...Wireless network properties dialog please fill in the security settings for this wireless network you d like to connect to D Please specify the IP settings for this wireless network and click the Fin...

Page 38: ...34 E Now you can connect to the wireless network successfully...

Page 39: ...l speeds The ERP includes the modulation schemes found in 802 11b including CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps B A protection mechanism called RTS CTS that governs how...

Page 40: ...s products can work with Netware Windows 2000 or other LAN operating systems to support printer or file sharing 11 Would the information be intercepted while transmitting on air WLAN features two fold...

Page 41: ...other words more bandwidth is consumed than in the case of narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver kn...

Reviews: