background image

HNW300CI  

User 

Manual 

40

 

 

Wireless PCI Card 

Netmask 

Determines what portion of an IP address designates the Network and which part 
designates the Host 

Network Interface Card 

A card installed in a computer or built onto the motherboard that allows the computer to 
connect to a network 

Network Layer 

The third layer of the OSI model which handles the routing of traffic on a network 

Network Time Protocol 

Used to synchronize the time of all the computers in a network 
 

NIC 

Network Interface Card 
 

NTP 

Network Time Protocol 

OFDM 

Orthogonal Frequency-Division Multiplexing is the modulation technique for both 802.11a 
and 802.11g 

OSI 

Open Systems Interconnection is the reference model for how data should travel between 
two devices on a network 

OSPF 

Open Shortest Path First is a routing protocol that is used more than RIP in larger scale 
networks because only changes to the routing table are sent to all the other routers in the 
network as opposed to sending the entire routing table at a regular interval, which is how 
RIP functions 

Password 

A sequence of characters that is used to authenticate requests to resources on a network 

Personal Area Network 

The interconnection of networking devices within a range of 10 meters 

Physical layer 

The first layer of the OSI model. Provides the hardware means of transmitting electrical 
signals on a data carrier 

Ping 

A utility program that verifies that a given Internet address exists and can receive 
messages. The utility sends a control packet to the given address and waits for a response.  

PoE 

Power over Ethernet is the means of transmitting electricity over the unused pairs in a 
category 5 Ethernet cable 

POP3 

Post Office Protocol 3 is used for receiving email 

Port 

A logical channel endpoint in a network. A computer might have only one physical channel 
(its Ethernet channel) but can have multiple ports (logical channels) each identified by a 
number.  

PPP 

Point-to-Point Protocol is used for two computers to communicate with each over a serial 
interface, like a phone line 

PPPoE 

Point-to-Point Protocol over Ethernet is used to connect multiple computers to a remote 
server over Ethernet 
 
 

Summary of Contents for Wireless PCI Card IEEE 802.11n 300Mbps

Page 1: ...Wireless PCI Card IEEE 802 11n 300Mbps USER MANUAL www hamletcom com...

Page 2: ...ass B EN 61000 4 2 1995 A1 1998 A2 2001 EN 61000 4 3 2006 A1 2008 CE Mark Warning This is a Class B product In a domestic environment this product may cause radio interference in which case the user m...

Page 3: ...K 12 2 6 SITE SURVEY 13 2 7 STATISTICS 14 2 8 WPS 14 2 9 ABOUT 15 2 10 UNINSTALL THE DRIVERS CLIENT UTILITY 15 3 PCI CARD ADAPTER FOR WINDOWS 2000 XP 16 3 1 BEFORE YOU BEGIN 16 3 2 INSTALLING THE DRIV...

Page 4: ...plements the latest 11n 2 0 technology which extremely improves wireless signal for your computer than existing wireless 802 11g technology It supports the 1T2R architecture with fully forward compati...

Page 5: ...Network conditions and environmental factors lower actual throughput rate All specifications are subject to change without notice 1 2 Package Contents Open the package carefully and make sure that no...

Page 6: ...nd before installing the drivers 2 2 Installing the Drivers Follow the steps below in order to install the PCI CARD drivers Insert the CD ROM that was provided to you in this package The setup should...

Page 7: ...rt the PCI Card into the PCI slot Windows will then detect and install the new hardware An Hamlet icon will then appear in the system tray Right click on the icon and then click on Launch Config Utili...

Page 8: ...tings A profile can be configured as Infrastructure or Ad hoc mode The configuration settings for each mode are described below 2 3 1 Infrastructure Mode The infrastructure mode requires the use of an...

Page 9: ...rs equipped with the PC Cards that form a wireless network whenever they are within range of one another In ad hoc mode each client is peer to peer would only have access to the resources of the other...

Page 10: ...racter string into the field For 64 bit enter 5 alphanumeric or 10 hexadecimal characters For 128 bit enter 13 alphanumeric or 26 hexadecimal characters Click on the Apply button to save the changes S...

Page 11: ...e computer matches that of the Access Point This approach offers the simplicity of the WEP key but uses stronger TKIP encryption EAP Extensible Authentication Protocol is an extension to the PPP proto...

Page 12: ...and the percent of output power Current Channel The operating frequency channel that the client is using infrastructure mode Link Speed The current rate at which the client is transmitting and receivi...

Page 13: ...receiving signal strength from the Access Point Channel Displays the channel number of the Access Point Encryption Displays the encryption on the Access Point this includes WEP TKIP AES or None Authe...

Page 14: ...after retry received with CRC error duplicate frames received etc 2 8 WPS Click on the WPS Configuration tab WPS is used for WiFi Protected Setup By pressing this button the security settings of the d...

Page 15: ...lation is unsuccessful for any reason the best way to solve the problem may be to completely uninstall the PCI CARD and its utility and repeat the installation procedure again Follow the steps below i...

Page 16: ...vided to you in this package The setup should run automatically If the setup does not run automatically then you must manually select the setup exe file from the CD ROM drive Once the setup begins you...

Page 17: ...ome office caf etc When adding a profile you are required to enter a profile name and SSID as well as configure the power saving mode network type RTS fragmentation threshold and encryption authentica...

Page 18: ...k is always connected to the power supply o PSM Power Saving Mode Select this option if your notebook uses its battery power This option minimizes the battery usage while the network is idle Network T...

Page 19: ...the network or select one from the drop down list The SSID is a unique name shared among all points in your wireless network The SSID must be identical for all points in the network and is case sensi...

Page 20: ...adio using one of the Keys from a panel When you use WEP to communicate with the other wireless clients all the wireless devices in this network must have the same encryption key or pass phrase The fo...

Page 21: ...y checking feature which makes sure that keys haven t been tampered with EAP Extensible Authentication Protocol is an extension to the PPP protocol that enables a variety of authentication protocols t...

Page 22: ...Authentication Protocol is an extension to the PPP protocol that enables a variety of authentication protocols to be used It passes through the exchange of authentication messages allowing the authen...

Page 23: ...s used by others sessions Dynamic key delivery eliminates one big vulnerability static encryption keys that are shared by all stations in the WLAN EAP Extensible Authentication Protocol is an extensio...

Page 24: ...TLS Smartcard provides for certificate based and mutual authentication of the client and the network It relies on client side and server side certificates to perform authentication and can be used to...

Page 25: ...be used It passes through the exchange of authentication messages allowing the authentication software stored in a server to interact with its counterpart in the client TLS Transport Layer Security is...

Page 26: ...a check in this to enable the certificate use Certificate issuer Select the Certification Authority from the drop down list Allow intermediate certificates During tunnel creation the client must veri...

Page 27: ...the client is using infrastructure mode Authentication Displays the authentication type Encryption Displays the encryption type Network Type Displays the network type infrastructure or ad hoc IP Addr...

Page 28: ...al for all points in the network and is case sensitive Channel Displays the channel number of the Access Point Encryption Displays the encryption on the Access Point this includes WEP TKIP AES or None...

Page 29: ...protection Select On to send a frame without protection and Off to send it with protection Enable Tx BURST Click the check box will enhance the throughput Enable TCP Window Size Enhance the throughpu...

Page 30: ...f service QoS features to IEEE 802 11 networks WMM prioritizes traffic according to 4 AC Access Categories however it does not provide guaranteed throughput It is suitable for simple applications that...

Page 31: ...ew PIN Code Config Mode The HNW300CI role playing as an Enrollee or an external Registrar Detail Information about Security and Key in the credential Connect Command to connect to the selected network...

Page 32: ...bout tab displays information about the device such as the network driver version and date configuration utility version and date and the NIC Network Interface Card firmware version and date 3 11 Radi...

Page 33: ...completely uninstall the PCI Card Adapter and its utility and repeat the installation procedure again Follow the steps below in order to uninstall the client utility Click on Start Hamlet HNW300CI Un...

Page 34: ...ocols developed by Apple for their computer systems AppleTalk Address Resolution Protocol AARP Used to map the MAC addresses of Apple computers to their AppleTalk network addresses so that conversions...

Page 35: ...at allows you to access resources on the web and provides them to you graphically C Cable modem A device that allows you to connect a computer up to a coaxial cable and receive Internet access from yo...

Page 36: ...trum DSSS Modulation technique used by 802 11b wireless devices DMZ Demilitarized Zone A computer that logically sits in a no mans land between the LAN and the WAN The DMZ computer trades some of the...

Page 37: ...e Transfer Protocol Easiest way to transfer files between computers on the Internet Full duplex Sending and Receiving data at the same time G Gain The amount an amplifier boosts the wireless signal Ga...

Page 38: ...browser created and provided by Microsoft Internet Protocol The method of transferring data from one computer to another on the Internet Internet Protocol Security IPsec provides security at the packe...

Page 39: ...port for a connection to a crossover cable MIB Management Information Base is a set of objects that can be managed by using SNMP Modem A device that Modulates digital signals from a computer to an an...

Page 40: ...ire routing table at a regular interval which is how RIP functions P Password A sequence of characters that is used to authenticate requests to resources on a network Personal Area Network The interco...

Page 41: ...l the routers on a network RJ 11 The most commonly used connection method for telephones RJ 45 The most commonly used connection method for Ethernet RS 232C The interface for serial communication betw...

Page 42: ...rotocol for transmitting streams of printer data TCP IP Transmission Control Protocol Internet Protocol TFTP Trivial File Transfer Protocol is a utility used for transferring files that is simpler to...

Page 43: ...Wired Equivalent Privacy is security for wireless networks that is supposed to be comparable to that of a wired network Wide Area Network The larger network that your LAN is connected to which may be...

Page 44: ...4 QAM 16 QAM QPSK BPSK 802 11b DSSS DBPSK DQPSK CCK Operating Channels 11 for North America 14 for Japan 13 for Europe Receive Sensitivity Typical 2 412 2 472G IEEE802 11b 1Rx 91dBm 1Mbps 87dBm 11Mbps...

Page 45: ...ng measures Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the rec...

Reviews: