background image

18 

   

uses the same IP address every time it reboots and logs on to the 

network, unless it is manually changed. 

Temporal Key Integrity Protocol (TKIP)

 

The Temporal Key Integrity Protocol, pronounced tee-kip, is part of the 

IEEE 802.11i encryption standard for wireless LANs. TKIP is the next 

generation of WEP, the Wired Equivalency Protocol, which is used to 

secure 802.11 wireless LANs. TKIP provides per-packet key mixing, a 

message integrity check and a re-keying mechanism, thus fixing the 

flaws of WEP. 

Transmission Control Protocol / Internet Protocol (TCP/IP)

 

TCP/IP is the protocol suite developed by the Advanced Research 

Projects Agency (ARPA). It is widely used in corporate Internet works, 

because of its superior design for WANs. TCP governs how packet is 

sequenced for transmission the network. The term 

“TCP/IP” is often 

used generically to refer to the entire suite of related protocols. 

Transmit / Receive

 

The wireless throughput in Bytes per second averaged over two seconds. 

Wi-Fi Alliance

 

The Wi-Fi Alliance is a nonprofit international association formed in 1999 

to certify interoperability of wireless Local Area Network products based 

on IEEE 802.11 specification. The goal of the Wi-Fi Allia

nce’s members is 

to enhance the user experience through product interoperability. The 

organization is formerly known as WECA. 

Wi-Fi Protected Access (WPA)

 

The Wi-Fi Alliance put together WPA as a data encryption method for 

802.11 wireless LANs. WPA is an industry-supported, pre-standard version 

of 802.11i utilizing the Temporal Key Integrity Protocol (TKIP), 

which fixes the problems of WEP, including using dynamic keys. 

Wide Area Network (WAN)

 

A WAN consists of multiple LANs that are tied together via telephone 

services and / or fiber optic cabling. WANs may span a city, a state, a 

country, or even the world. 

Wired Equivalent Privacy (WEP)

 

Now widely recognized as flawed, WEP was a data encryption method 

used to protect the transmission between 802.11 wireless clients and 

APs. However, it used the same key among all communicating devices. 
WEP’s problems are well-known, including an insufficient key length and 

no automated method for distributing the keys. WEP can be easily 

Summary of Contents for LM820

Page 1: ...1 0 All rights reserved All trade names are registered trademarks of respective manufacturers listed This manual may not be copied in any media or form without the written consent of original maker L...

Page 2: ...reless LAN Basics 3 3 IP ADDRESS 4 4 Install Driver Utility 5 4 1 Windows XP Vista Win7 5 5 Wireless Network Configuration 7 5 1 Utility Icon 7 5 2 Client Mode Default Setting 7 6 Technical Specificat...

Page 3: ...TV technician for help REGULATION INFORMATION The WLAN 11n USB Client Adapter must be installed and used in strict accordance with the manufacturer s instructions This device complies with the followi...

Page 4: ...void the Grant of Certification this module is limited to OEM installation only and must not be sold to end users end user has no manual instructions to remove or install the device only software or o...

Page 5: ...2009 This equipment is marked with the symbol and can be used throughout the European community Marking by the symbol indicates that usage restrictions apply France 2 4GHz for Metropolitan France In...

Page 6: ...ins of each 22 MHz wide channel are shown in following Table Channel Identifier Frequency MHZ Regulatory Domains Japan ETSI North America Israel France Outdoor Mexico 1 2412 2 2417 3 2422 4 2427 5 243...

Page 7: ...distance of up to 300 meters in free space 150 120 90 60 54 48 36 30 24 22 18 12 11 6 5 5 2 1 Mbps selectable Data Rate 64 128 bit WEP WPA Wi Fi Protected Access WPA2 2 400GHz 2 4835GHz unlicensed ISM...

Page 8: ...ide Driver CD CONNECTING YOUR WLAN 11n USB Client Adapter TO PC Quick Start Guide Connect your WLAN 11n USB Client Adapter to your PC Install driver GETTING TO KNOW WIRELESS LAN ADAPTER LED LED turns...

Page 9: ...to the Internet Ad Hoc Wireless Network Infrastructure Wireless Network The most obvious difference between Infrastructure wireless network and Ad Hoc wireless network is that the PCs in Infrastructur...

Page 10: ...a unique network address There are two methods to assign a network address to a computer on a TCP IP network Static IP addressing Dynamic IP addressing DHCP Client In network with static IP addressing...

Page 11: ...installation program after you insert the disk into your CD drive Step 1 Insert the installation CD into your CD ROM Choose the Setup Language and click Next button Step 2 Installation descriptions s...

Page 12: ...6 Installing configuring WLAN utility Installing Drivers Step 3 Click Finish to complete installation...

Page 13: ...ally 5 1 Utility Icon Client mode utility running but no WLAN Adapter plugged Client mode utility running and WLAN Adapter scan available network Client mode utility running and WLAN Adapter can not s...

Page 14: ...e link between the node and its Access Point Link Quality is a measurement of receiving and transmitting performances over the radio Network Address displays current MAC Address IP Address Subnet and...

Page 15: ...rescan available networks currently Select one of SSIDs and click Add to Profile to create profile that can be configured more wireless parameters In this page you can edit your profile name configure...

Page 16: ...nters to check or evaluate the wireless performance Click Reset button to set counter to zero 5 2 6 Wi Fi Protected Setup An easy and secure setup solution for Wi Fi network you can choose PIN Code or...

Page 17: ...11 Step 2 Select a specific AP Step 3 Enter the PIN code into your AP Step 3 Select AP that you want to configure Step 4 Wait for configuring your wireless AP to be the security setting...

Page 18: ...12 PBC method Step 1 Push the PBC button Step 2 Push the physical button on your AP or visual button on the WPS config page Soft AP Step 1 Click Access Point to change AP mode...

Page 19: ...13 Step 2 Click Config to set AP Step 3 Setting SSID and Securtiy Step 4 Choosing the Ethernet controller and click Apply to bridge your Soft AP...

Page 20: ...14...

Page 21: ...Remedy Make sure that you have installed the Utility from the attached CD Symptom The PC Card is linking but can t share files with others Remedy Make sure the file and printer sharing function is ena...

Page 22: ...P server on the network Direct Sequence Spread Spectrum This is the method the wireless cards use to transmit data over the frequency spectrum The other method is frequency hopping Direct sequence spr...

Page 23: ...cal Area Network LAN A LAN is a group of computers each equipped with the appropriate network adapter card connected by cable air that share applications data and peripherals All connections are made...

Page 24: ...liance The Wi Fi Alliance is a nonprofit international association formed in 1999 to certify interoperability of wireless Local Area Network products based on IEEE 802 11 specification The goal of the...

Page 25: ...is large This means the spatial reuse ratio of parallel transmissions is high In contrast with a large fragment threshold the overlap is small and the spatial reuse ratio is low However high fragment...

Page 26: ...val represents the amount of time between beacon transmissions Before a station enters power save mode the station needs the beacon interval to know when to wake up to receive the beacon and learn whe...

Page 27: ...defined for dial up authentication with Point to Point Protocol in RFC 2284 Beyond encapsulating EAP packets the 802 1x standard also defines EAPOL messages that convey the shared key information cri...

Reviews: