background image

 

- 54 -

7.  What is WEP? 

WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key algorithm, as 
described in the IEEE 802 .11 standard. 
 

8.  What is TKIP? 

TKIP is a quick-fix method to quickly overcome the inherent weaknesses in WEP security, especially the 
reuse of encryption keys. TKIP is involved in the IEEE 802.11i WLAN security standard, and the 
specification might be officially released by early 2003. 
 

9. What 

is 

AES? 

AES (Advanced Encryption Standard), a chip-based security, has been developed to ensure the highest 
degree of security and authenticity for digital information, wherever and however communicated or 
stored, while making more efficient use of hardware and/or software than previous encryption standards. 
It is also included in IEEE 802.11i standard. Compare with AES, TKIP is a temporary protocol for 
replacing WEP security until manufacturers implement AES at the hardware level. 
 

10.    Can Wireless products support printer sharing?   

Wireless products perform the same function as LAN products. Therefore, Wireless products can work 
with Netware, Windows 2000, or other LAN operating systems to support printer or file sharing. 

 

11.    Would the information be intercepted while transmitting on air? 

WLAN features two-fold protection in security. On the hardware side, as with Direct Sequence Spread 
Spectrum technology, it has the inherent security feature of scrambling. On the software side, WLAN 
series offer the encryption function (WEP) to enhance security and Access Control. Users can set it up 
depending upon their needs. 
 

12.    What is DSSS? What is FHSS? And what are their differences? 

Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that changes frequency in a 
pattern that is known to both transmitter and receiver. Properly synchronized, the net effect is to 
maintain a single logical channel. To an unintended receiver, FHSS appears to be short-duration 
impulse noise. Direct-sequence spread-spectrum (DSSS) generates a redundant bit pattern for each bit 
to be transmitted. This bit pattern is called a chip (or chipping code). The longer the chip is, the greater 
the probability that the original data can be recovered. Even if one or more bits in the chip are damaged 
during transmission, statistical techniques embedded in the radio can recover the original data 
without-the need for retransmission. To an unintended receiver, DSSS appears as low power wideband 
noise and is rejected (ignored) by most narrowband receivers. 
 

13.    What is Spread Spectrum? 

Spread Spectrum technology is a wideband radio frequency technique developed by the military for use 
in reliable, secure, mission-critical communication systems. It is designed to trade off bandwidth 
efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in the 
case of narrowband transmission, but the trade off produces a signal that is, in effect, louder and thus 
easier to detect, provided that the receiver knows the parameters of the spread-spectrum signal being 
broadcast. If a receiver is not tuned to the right frequency, a spread –spectrum signal looks like 
background noise. There are two main alternatives, Direct Sequence Spread Spectrum (DSSS) and 
Frequency Hopping Spread Spectrum (FHSS). 

www.4GSource.net

Summary of Contents for nMAX

Page 1: ...802 11b g n Draft 2 0 Wireless LAN USB Adapter User Manual Version 1 0 April 2007 www 4GSource net...

Page 2: ...to the contents hereof and specifically disclaims any warranties merchantability or fitness for any particular purpose Any software described in this manual is sold or licensed as is Should the progra...

Page 3: ...Configuration 19 2 3 Connection Profile Management 22 2 3 1 Make a profile for an access point or wireless device 22 2 3 2 Using 802 1x Certification 30 2 3 3 Using 802 1x CA Server 32 2 4 View Networ...

Page 4: ...adio channels to enhance data transfer rate and wireless coverage With easy to install USB 2 0 interface a very common expansion port of computers plug this wireless network card into any empty USB po...

Page 5: ...ARD OUT THE REACH OF CHILDREN 4 This network card will become hot when being used for long time This is normal and is not a malfunction DO NOT put the network card on a paper cloth or other flammable...

Page 6: ...st 100MB of available disk space 1 4 Package Contents Before you starting to use this wireless network card please check if there s anything missing in the package and contact your dealer of purchase...

Page 7: ...ard 1 USB Connector 2 Connector Cap To protect USB connector when not in use 3 Link Activity LED LED Name Light Status Description On Linked to a wireless access point Transferring data Link Activity...

Page 8: ...ow the following instructions to install your new wireless network card 1 Insert the USB wireless network card into an empty USB 2 0 port of your computer when computer is switched on Never use force...

Page 9: ...r computer click Cancel 4 Insert device driver CDROM into the CD DVD ROM drive of your computer and execute Setup exe program in Driver folder Please read the end user license agreement and click Yes...

Page 10: ...ere Optimize for WiFi mode or Optimize for performance mode If you want to enhance wireless performance please select Optimize for performance mode However wireless compatibility is not guaranteed in...

Page 11: ...ck Next to continue If you see Found New Hardware message again please ignore it and wait 6 Please click install to run the driver installation process If you see Found New Hardware message again plea...

Page 12: ...11 7 Please wait while the install procedure is running When you see this message please click Finish to complete the driver installation process www 4GSource net...

Page 13: ...tatus of wireless card will be displayed as a popup balloon 9 When you want to configure your wireless connection please right click on this icon and a popup menu will appear You can click Launch Conf...

Page 14: ...Configuration utility will scan for all wireless access points automatically Scan results will be displayed here please check if the wireless access point with the SSID the name of wireless access po...

Page 15: ...rs So you can identify a single access point or wireless device from others by BSSID if they all have the same SSID Signal Shows the signal strength of access point or wireless device Larger number me...

Page 16: ...er or network device AdHoc will be displayed here 3 Click the wireless access point or network device you wish to connect it will be highlighted then click Connect Tips Wireless access point Infrastru...

Page 17: ...SSID you provided here is wrong you ll not be able to connect to this access point If the wireless access point you selected have SSID please skip this step 5 If the wireless access point uses encryp...

Page 18: ...17 www 4GSource net...

Page 19: ...orner of configuration utility congratulations you re successfully connected to the access point or wireless device you selected 7 You can put the mouse cursor over the Edimax configuration utility ic...

Page 20: ...tion WZC You can also use WZC to configure your wireless network parameter 1 Right click Edimax configuration utility icon and select Use Zero Configuration as Configuration utility 2 Click Start butt...

Page 21: ...AN Card then select View Available Wireless Networks 4 All wireless access points in proximity will be displayed here If the access point you want to use is not displayed here please try to move your...

Page 22: ...must match the encryption setting on the access point If the access point you selected does not use encryption you ll not be prompted for security key or passphrase 6 If you can see Connected message...

Page 23: ...o input these parameters every time you want to connect to a specific wireless access point 2 3 1 Make a profile for an access point or wireless device 1 Right click the Edimax configuration utility i...

Page 24: ...23 Or you can add a connected wireless access point or wireless device to a profile by clicking Site Survey tab then click Add to Profile button www 4GSource net...

Page 25: ...24 And you can set the parameter for this connection here www 4GSource net...

Page 26: ...to input it here manually PSM Please select CAM constantly awake mode keep Power Saving the wireless radio activity when not transferring Mode data or PSM Power saving mode switches radio off when no...

Page 27: ...available when the network type is Ad hoc You can select Auto or Long Preamble Please select Auto if you don t know what it is RTS Threshold Check the box and you can set RTS threshold manually here D...

Page 28: ...identity password domain name and select encryption type You can check Show Password box so the password you inputted will be displayed as you type but not replace by asterisk Encryption Select the en...

Page 29: ...assword Check this box and all passphrases or security keys you inputted will be displayed as you type but not replace your input with asterisk Use 802 1x Enable 802 1x wireless authentication Please...

Page 30: ...before its name If the wireless access point is not reachable a red check will be displayed before its name If you want to change the connection parameters of a specific profile just select it and cl...

Page 31: ...hentication type you re using Session You can enable or disable session resumption here Resumption If you don t know if you should enable session resumption or not please ask your 802 1x authenticatio...

Page 32: ...uthentication credential file PAC or al file format you ll be prompted to select a credential file from your computer Protocol You can select the protocol of tunneled authentication here This pulldown...

Page 33: ...enable the use of certificate chain chain Certificate Please select the issuer of certificate from this dropdown menu Issuer Allow Check this box if you wish to allow intermediate certificates interm...

Page 34: ...tch connection will be dropped Domain name Check this box and the wireless configuration utility will check the end of domain must end name If there s anything wrong connection will be dropped in spec...

Page 35: ...functions to get detailed information about the wireless connection you re using 2 4 1 Network Statistics Please follow the following instructions to check network statistics 1 Right click the Edimax...

Page 36: ...se the window 2 4 2 Link Status Please follow the following instructions to check network statistics 1 Right click the Edimax configuration utility icon located at lower right corner of computer deskt...

Page 37: ...al quality of wireless connection Throughput Displays the rate of data transmitting Tx in Kbps and receiving Rx in Kbps Link Quality Displays link quality radio signal quality When the link quality is...

Page 38: ...o increase data transfer performance or change operation mode Please follow the following instructions to set advanced wireless settings 1 Right click the Edimax configuration utility icon located at...

Page 39: ...r or you re too far from wireless access point It s recommended to set this setting to Auto unless you really know the meaning of this setting Tx BURST Check this box to accelerate the data transmit r...

Page 40: ...CCX compatible wireless devices Turn on CCKM Check this box to enable CCKM Cisco Centralized Key Management which enables wireless clients to roam between CCKM enabled access points in very short time...

Page 41: ...d you can define the priority of different kinds of data to give higher priority to applications which require instant responding Therefore you can improve the performance of such network applications...

Page 42: ...isable direct link setup DLS function Setup Enable This function will greatly improve the data transfer rate between WMM enabled wireless devices Please click Apply button on the right of this check b...

Page 43: ...hree simple steps For older wireless access points it s possible to perform a firmware upgrade to become a WPS enabled access point Since they may not have a hardware button to press for WPS setup you...

Page 44: ...Configuration 1 Right click the Edimax configuration utility icon located at lower right corner of computer desktop then click Launch Config Utilities 2 Click WPS Configuration tab and the following s...

Page 45: ...o establish the wireless connection by using WPS you can click Rescan button to search for WPS enabled access points near you to make sure the WPS function of your access point is activated All access...

Page 46: ...re times to try again When an access point is connected you can click Disconnect to disconnect your wireless network card from a connected access point or select another WPS enabled wireless access po...

Page 47: ...se follow the following instructions to establish connection to it 1 Right click the Edimax configuration utility icon located at lower right corner of computer desktop then click Launch Config Utilit...

Page 48: ...ons about how to do this 3 Click PIN button now and wait for few seconds to one minute If a wireless access point with correct PIN code is found you ll be connected to that access point You may have t...

Page 49: ...rtant information about your wireless network card Please follow the following instructions to see these information 1 Right click the Edimax configuration utility icon located at lower right corner o...

Page 50: ...m you ll need these values You can also click WWW EDIMAX COM button to go to the web site of network card driver manufacturer and get more information about your wireless network card Please click OK...

Page 51: ...Mbps 11n 20MHz MCS0 15 32 with Half Guard Interval Support up to 144Mbps 11n 40MHz MCS0 15 32 with Half Guard Interval Support up to 300Mbps Securities WEP 64 128 WPA WPA2 Cisco CCX V1 0 V2 0 V3 0 Com...

Page 52: ...hing happens when I click Launch config utilities 1 Please make sure the wireless network card is inserted into your computer s USB port If the Ralink configuration utility s icon is black the network...

Page 53: ...Protection in Advanced tab 3 Try a lower TX Rate in Advanced tab 4 Disable Tx Burst in Advanced tab 5 Enable WMM in QoS tab if you need to use multimedia telephony related applications 6 Disable WMM P...

Page 54: ...tion mechanism called RTS CTS that governs how 802 11g devices and 802 11b devices interoperate 2 What is the IEEE 802 11b standard The IEEE 802 11b Wireless LAN standard subcommittee which formulates...

Page 55: ...depending upon their needs 12 What is DSSS What is FHSS And what are their differences Frequency hopping spread spectrum FHSS uses a narrowband carrier that changes frequency in a pattern that is kno...

Page 56: ...e uses mechanisms included in the IEEE 802 11e standard and is an enhancement of IEEE 802 11 legacy power save With WMM Power Save the same amount of data can be transmitted in a shorter time while al...

Page 57: ...equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures 1 Reorient or relocate the receiving antenna 2 Increase the separation between...

Page 58: ...TTE Directive repeals and replaces in the directive 98 13 EEC Telecommunications Terminal Equipment and Satellite Earth Station Equipment As of April 8 2000 Safety This equipment is designed with the...

Reviews: