background image

 

12

 

Parameter Description 

Network Type 

Infrastructure

 – This operation mode requires the presence of an 

802.11 Access Point. All communication is done via the Access 

Point or Router.   

 

Ad-Hoc

 – Select this mode if you want to connect to another 

wireless stations in the Wireless LAN network without through an 

Access Point or Router. 

 

 

TX Power 

If you want to lower the transmit power of the adapter for saving the 

power of the system, you can select the lower percentages from the 

list. The lower power will cause the lower signal strength and the 

coverage range. 

 

 

Preamble 

The preamble defines the length of the CRC block for 

communication among wireless devices. This option is only active 

in the Ad Hoc network. 

 

There are two modes including Auto and Long Preamble. If 

“Auto“ mode is selected, the adapter will auto switch the preamble 

mode depending on the wireless devices the adapter is connecting 

to. 

 

 

RTS Threshold 

Minimum packet size required for an RTS (Request To Send). For 

packets smaller than this threshold, an RTS is not sent and the 

packet is transmitted directly to the wireless network. Select a 

setting within a range of 0 to 2347 bytes. Minor change is 

recommended. 

 

 

Fragment Threshold 

The value defines the maximum size of packets; any packet size 

larger than the value will be fragmented. If you have decreased this 

value and experience high packet error rates, you can increase it 

again, but it will likely decrease overall network performance. Select

a setting within a range of 256 to 2346 bytes. Minor change is 

recommended. 

 

 

Channel 

This setting is only available for Ad Hoc mode. Select the number of 

the radio channel used for the networking. The channel setting 

should be the same with the network you are connecting to. 

 
 
 
 
 
 
 

Summary of Contents for EW-7618Ug

Page 1: ...8 80 02 2 1 11 1g g U US SB B X XR R T TM M W Wi ir re el le es ss s L LA AN N U US SB B A Ad da ap pt te er r User Manual Version 1 1 Jun 2006...

Page 2: ...arranties merchantability or fitness for any particular purpose Any software described in this manual is sold or licensed as is Should the programs prove defective following their purchase the buyer a...

Page 3: ...tween the equipment and receiver 3 Connect the equipment into an outlet on a circuit different from that to which the receiver is connected 4 Consult the dealer or an experienced radio technician for...

Page 4: ...of those who install and use it However special attention must be paid to the dangers of electric shock and static electricity when working with electrical equipment All guidelines of this and of the...

Page 5: ...1 1 Configuration 11 3 2 1 2 Authentication and Security 13 3 2 1 3 802 1x Setting Certification 17 3 2 1 4 802 1x Setting CA Server 18 3 3 Link Status 19 3 4 Statistics 20 3 5 Advance 20 3 6 QoS 23 3...

Page 6: ...e the wireless network will be more effective For WLAN security issues this adapter supports 64 128 bit WEP data encryption that protects your wireless network from eavesdropping It also supports WPA...

Page 7: ...a wireless AP Automatic fallback increases data security and reliability Supports the most popular operating system Windows 98SE Me 2000 XP 2003 Server Supports USB 2 0 1 1 interface 1 2 Specificatio...

Page 8: ...eck the items of your package The package should include the following items One USB XR TM Adapter One USB to Mini USB Extension Cable One CD Driver Utility User s Manual One Quick Guide If any of the...

Page 9: ...the CD Note2 The following installation was operated under Windows XP Procedures are similar for Windows 98SE Me 2000 2003 Server Note3 If you have installed the Turbo Wireless LAN USB Adapter driver...

Page 10: ...Tool or the Ralink Configuration Tool for the adapter It is recommended to choose the Ralink Configuration Tool for the adapter Click Next to continue D If you need the adapter to operate with better...

Page 11: ...he software of the adapter Please follow the instructions of the program to plug in the adapter into the USB port of your computer And the system will automatically detect the adapter F Please click F...

Page 12: ...reless device which has better signal strength and no wireless security setting The Ralink Configuration Utility appears as an icon on the system tray of Windows while the adapter is running You can o...

Page 13: ...8 Second Way A Right click the icon and select View Available Wireless Networks B Click Advanced C Uncheck Use Windows to configure my wireless network settings to enable the utility for the adapter...

Page 14: ...connection to another networks or add one of the networks to your own profile list Parameter Description Available Networks This list shows all available wireless networks within range of your adapter...

Page 15: ...elative settings of the profiles including Profile Name SSID Channel etc This sign indicates the activated profile is been connecting This sign indicates the activated profile is not been connecting A...

Page 16: ...may specify a SSID for the adapter and then only the device with the same SSID can interconnect to the adapter If you want to add the network nearby to the profile list pull down the menu all the netw...

Page 17: ...uto mode is selected the adapter will auto switch the preamble mode depending on the wireless devices the adapter is connecting to RTS Threshold Minimum packet size required for an RTS Request To Send...

Page 18: ...d be selected for use only when limited vendor choice for client access point and server products is not a concern When you have set up LEAP authentication you have to enter the user name and password...

Page 19: ...d small business The difference between WPA PSK and WPA2 PSK is that WPA2 PSK provides data encryption via the AES In contrast WPA PSK uses Temporal Key Integrity Protocol TKIP WPA NONE WPA NONE is de...

Page 20: ...e wireless stations in the network WEP Key Key1 Key4 The WEP keys are used to encrypt data transmitted in the wireless network There are two types of key length 64 bit and 128 bit Select the default e...

Page 21: ...on on the LAN it sends an EAP Request for the user s identity to the device EAP or the Extensible Authentication Protocol is an authentication protocol that runs before network layer protocols transmi...

Page 22: ...validating the server s certificate the client presents a client certificate to the server for validation Session Resumption There are Disabled Reauthentication Roaming SameSsid and Always selections...

Page 23: ...ty by placing the issuer s self signed certificate which contains the issuer s public key into the trusted root certification authority certificate store of the host computer Intermediate or subordina...

Page 24: ...n and reception rate of the network The maximum transmission rate is 54Mbps Throughput Kbps Display the speed of data transmitted and received Link Quality This bar indicates the quality of the link T...

Page 25: ...This option enables you to view the statistic information of the connection including transmit statistics and receive statistics You may reset the counters by clicking Reset Counter 3 5 Advance This o...

Page 26: ...setting Only G This adapter can be compatible with both 802 11g and 802 11b wireless stations If there are only 802 11g wireless stations in the network you can set the adapter to this mode Select You...

Page 27: ...before it gets an acknowledgment back from the receiver that it has gotten some of it When the Router or AP the adapter is connecting to have set up the TCP Window you can enable the parameter to mee...

Page 28: ...authenticates the client so quickly that there is no perceptible delay in voice or other time sensitive applications Enable Radio Measurement When this parameter is enabled the Cisco AP can run the ra...

Page 29: ...Link Direct Link Setup MAC Address Specify the MAC Address of the client adapter you want to direct link to and click Apply to add into DLS Status table Timeout Value Specify the timeout value for the...

Page 30: ...with the proprietary Turbo Mode feature the Turbo Mode will be enabled automatically without any configuration 3 9 SoftAP This adapter can run as a wireless AP The relative configurations of the AP in...

Page 31: ...eless adapters connected to the AP should set up the same channel SSID The SSID up to 32 printable ASCII characters is the unique name identified in a WLAN The ID prevents the unintentional merging of...

Page 32: ...ts sync field Short Preamble 56 bits sync field Beacon ms Here defines the time between two beacons the default value is 100ms TX Power If you want to lower the transmit power of the AP for saving the...

Page 33: ...mode designed for home and small business users who do not have access to network authentication servers In this mode known as Pre Shared Key the user manually enters the starting password in their a...

Page 34: ...bers This same key must be used on all of the wireless stations in the network Group Rekey Interval This function is available when using WPA PSK and WPA2 PSK encryption algorithm The key will change...

Page 35: ...nect to the AP Reject All The wireless adapters with the MAC Address listed in Access List will be rejected to connect to the AP MAC Address MAC Address is a unique identification for hardware devices...

Page 36: ...e wireless adapters connected to the AP Parameter Description MAC Address The MAC Address of the wireless adapters connected to the AP AID The Association ID of current connection Power Saving Mode Th...

Page 37: ...event time and message You may clear the table by clicking Clear 3 9 5 Statistics The Statistics page displays the statistic information of the AP including transmit statistics and receive statistics...

Page 38: ...33 3 9 6 About The About page displays the basic information about the Utility including Driver Utility and EEPROM Version The MAC Address of the adapter is displayed in the screen as well...

Page 39: ...RP includes the modulation schemes found in 802 11b including CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps B A protection mechanism called RTS CTS that governs how 802 11g devic...

Page 40: ...with Netware Windows 2000 or other LAN operating systems to support printer or file sharing 11 Would the information be intercepted while transmitting on air WLAN features two fold protection in secur...

Page 41: ...f the IEEE 802 11e WLAN QoS draft standard WMM adds prioritized capabilities to Wi Fi networks and optimizes their performance when multiple concurring applications each with different latency and thr...

Reviews: