background image

20 

   

mechanism, the transmitting station sends out an RTS packet to the receiving 

station, and waits for the receiving station to send back a CTS (Clear to Send) 

packet before sending the actual packet data. This setting is useful for 

networks with many clients. With many clients, and a high network load, there 

will be many more collisions. By lowering the RTS threshold, there may be 

fewer collisions, and performance should improve. Basically, with a faster RTS 

threshold, the system can recover from problems faster. RTS packets 

consume valuable bandwidth, however, so setting this value too low will limit 

performance. 

 

 

Beacon Interval

 

In addition to data frames that carry information from higher layers, 802.11 

includes management and control frames that support data transfer. The 

beacon frame, which is a type of management frame, provides the "heartbeat" 

of a wireless LAN, enabling stations to establish and maintain communications 

in an orderly fashion. Beacon Interval represents the amount of time between 

beacon transmissions. Before a station enters power save mode, the station 

needs the beacon interval to know when to wake up to receive the beacon 

(and learn whether there are buffered frames at the access point). 

 

 

Preamble Type

 

There are two preamble types defined in IEEE 802.11 specification. A long 

preamble basically gives the decoder more time to process the preamble. All 

802.11 devices support a long preamble. The short preamble is designed to 

improve efficiency (for example, for VoIP systems). The difference between the 

two is in the Synchronization field. The long preamble is 128 bits, and theshort 

is 56 bits. 

 

 

WPA2

 

It is the second generation of WPA. WPA2 is based on the final IEEE 802.11i 

amendment to the 802.11 standard. 

 

 

Temporal Key Integrity Protocol (TKIP)

 

The Temporal Key Integrity Protocol, pronounced tee-kip, is part of the IEEE 
802.11i encryption standard for wireless LANs. TKIP is the next generation of 
WEP, the Wired Equivalency Protocol, which is used to secure 802.11 wireless 
LANs. TKIP provides per-packet key mixing, a message integrity check and a 
re-keying mechanism, thus fixing the flaws of WEP. 

Summary of Contents for LM820

Page 1: ...1 0 All rights reserved All trade names are registered trademarks of respective manufacturers listed This manual may not be copied in any media or form without the written consent of original maker L...

Page 2: ...reless LAN Basics 3 3 IP ADDRESS 4 4 Install Driver Utility 5 4 1 Windows XP Vista Win7 5 5 Wireless Network Configuration 7 5 1 Utility Icon 7 5 2 Client Mode Default Setting 7 6 Technical Specificat...

Page 3: ...TV technician for help REGULATION INFORMATION The WLAN 11n USB Client Adapter must be installed and used in strict accordance with the manufacturer s instructions This device complies with the followi...

Page 4: ...void the Grant of Certification this module is limited to OEM installation only and must not be sold to end users end user has no manual instructions to remove or install the device only software or o...

Page 5: ...2009 This equipment is marked with the symbol and can be used throughout the European community Marking by the symbol indicates that usage restrictions apply France 2 4GHz for Metropolitan France In...

Page 6: ...ins of each 22 MHz wide channel are shown in following Table Channel Identifier Frequency MHZ Regulatory Domains Japan ETSI North America Israel France Outdoor Mexico 1 2412 2 2417 3 2422 4 2427 5 243...

Page 7: ...distance of up to 300 meters in free space 150 120 90 60 54 48 36 30 24 22 18 12 11 6 5 5 2 1 Mbps selectable Data Rate 64 128 bit WEP WPA Wi Fi Protected Access WPA2 2 400GHz 2 4835GHz unlicensed ISM...

Page 8: ...ide Driver CD CONNECTING YOUR WLAN 11n USB Client Adapter TO PC Quick Start Guide Connect your WLAN 11n USB Client Adapter to your PC Install driver GETTING TO KNOW WIRELESS LAN ADAPTER LED LED turns...

Page 9: ...to the Internet Ad Hoc Wireless Network Infrastructure Wireless Network The most obvious difference between Infrastructure wireless network and Ad Hoc wireless network is that the PCs in Infrastructur...

Page 10: ...a unique network address There are two methods to assign a network address to a computer on a TCP IP network Static IP addressing Dynamic IP addressing DHCP Client In network with static IP addressing...

Page 11: ...installation program after you insert the disk into your CD drive Step 1 Insert the installation CD into your CD ROM Choose the Setup Language and click Next button Step 2 Installation descriptions s...

Page 12: ...6 Installing configuring WLAN utility Installing Drivers Step 3 Click Finish to complete installation...

Page 13: ...ally 5 1 Utility Icon Client mode utility running but no WLAN Adapter plugged Client mode utility running and WLAN Adapter scan available network Client mode utility running and WLAN Adapter can not s...

Page 14: ...e link between the node and its Access Point Link Quality is a measurement of receiving and transmitting performances over the radio Network Address displays current MAC Address IP Address Subnet and...

Page 15: ...rescan available networks currently Select one of SSIDs and click Add to Profile to create profile that can be configured more wireless parameters In this page you can edit your profile name configure...

Page 16: ...nters to check or evaluate the wireless performance Click Reset button to set counter to zero 5 2 6 Wi Fi Protected Setup An easy and secure setup solution for Wi Fi network you can choose PIN Code or...

Page 17: ...11 Step 2 Select a specific AP Step 3 Enter the PIN code into your AP Step 3 Select AP that you want to configure Step 4 Wait for configuring your wireless AP to be the security setting...

Page 18: ...12 PBC method Step 1 Push the PBC button Step 2 Push the physical button on your AP or visual button on the WPS config page Soft AP Step 1 Click Access Point to change AP mode...

Page 19: ...13 Step 2 Click Config to set AP Step 3 Setting SSID and Securtiy Step 4 Choosing the Ethernet controller and click Apply to bridge your Soft AP...

Page 20: ...14...

Page 21: ...Remedy Make sure that you have installed the Utility from the attached CD Symptom The PC Card is linking but can t share files with others Remedy Make sure the file and printer sharing function is ena...

Page 22: ...P server on the network Direct Sequence Spread Spectrum This is the method the wireless cards use to transmit data over the frequency spectrum The other method is frequency hopping Direct sequence spr...

Page 23: ...cal Area Network LAN A LAN is a group of computers each equipped with the appropriate network adapter card connected by cable air that share applications data and peripherals All connections are made...

Page 24: ...liance The Wi Fi Alliance is a nonprofit international association formed in 1999 to certify interoperability of wireless Local Area Network products based on IEEE 802 11 specification The goal of the...

Page 25: ...is large This means the spatial reuse ratio of parallel transmissions is high In contrast with a large fragment threshold the overlap is small and the spatial reuse ratio is low However high fragment...

Page 26: ...val represents the amount of time between beacon transmissions Before a station enters power save mode the station needs the beacon interval to know when to wake up to receive the beacon and learn whe...

Page 27: ...defined for dial up authentication with Point to Point Protocol in RFC 2284 Beyond encapsulating EAP packets the 802 1x standard also defines EAPOL messages that convey the shared key information cri...

Reviews: