background image

PW-MN527 

300Mbps Wireless N USB Module 

 

 

16

 

Appendix B: Glossary 

 

802.11b -

 The 802.11b standard specifies a wireless  product networking at 11 Mbps using 

direct-sequence spread-spectrum (DSSS) technology and operating in the unlicensed radio 

spectrum at 2.4GHz, and WEP encryption for security. 802.11b networks are also referred to 

as Wi-Fi networks. 

 

802.11g

 

-

  specification  for  wireless  networking  at  54  Mbps  using  direct-sequence 

spread-spectrum  (DSSS)  technology,  using  OFDM  modulation  and  operating  in  the 

unlicensed radio spectrum at 2.4GHz, and backward compatibility with IEEE 802.11b devices, 

and WEP encryption for security. 

 

802.11n  - 

802.11n  builds  upon  previous  802.11  standards  by  adding  MIMO  (multiple-input 

multiple-output). MIMO uses multiple transmitter and receiver antennas to allow for increased 

data throughput via spatial multiplexing and increased range by exploiting the spatial diversity, 

perhaps through coding schemes like Alamouti coding. The Enhanced Wireless Consortium 

(EWC)

[3]

 was formed to help accelerate the IEEE 802.11n development process and promote 

a  technology  specification  for  interoperability  of  next-generation  wireless  local  area 

networking (WLAN) products. 

 

Ad-hoc Network -

 An ad-hoc network is a group of computers, each with a Wireless Adapter, 

connected as an independent 802.11 wireless LAN. Ad-hoc wireless computers operate on a 

peer-to-peer basis, communicating directly with each other without the use of an access point. 

Ad-hoc  mode  is  also  referred  to  as  an  Independent  Basic  Service  Set  (IBSS)  or  as 

peer-to-peer mode, and is useful at a departmental scale or SOHO operation.   

 

DSSS - 

(

D

irect-

S

equence 

S

pread 

S

pectrum) 

-

 DSSS generates a redundant bit pattern for all 

data transmitted. This bit pattern is called a chip (or chipping code). Even if one or more bits 

in the chip are damaged during transmission, statistical techniques embedded in the receiver 

can recover the original data without the need of retransmission. To an unintended receiver, 

DSSS appears as low power wideband noise and is rejected (ignored) by most narrowband 

receivers. However, to an intended receiver (i.e. another wireless LAN endpoint), the DSSS 

signal is recognized as the only valid signal, and interference is inherently rejected (ignored). 

 

FHSS  - 

(

F

requency 

H

opping 

S

pread 

S

pectrum) 

-

  FHSS  continuously  changes  (hops)  the 

carrier  frequency  of  a  conventional  carrier  several  times  per  second  according  to  a 

pseudo-random  set  of  channels.  Because  a  fixed  frequency  is  not  used,  and  only  the 

transmitter and receiver know the hop patterns, interception of FHSS is extremely difficult. 

 

Infrastructure Network -

 An infrastructure network is a group of computers or other devices, 

each with a Wireless Adapter, connected as an 802.11 wireless LAN. In infrastructure mode, 

the  wireless  devices  communicate  with  each  other  and  to  a  wired  network  by  first  going 

through an access point. An infrastructure wireless network connected to a wired network is 

referred to as a Basic Service Set (BSS). A set of two or more BSS in a single network is 

referred to as an Extended Service Set (ESS). Infrastructure mode is useful at a corporation 

scale, or when it is necessary to connect the wired and wireless networks.   

 

Spread Spectrum -

 Spread Spectrum technology is a wideband radio frequency technique 

Summary of Contents for PW-MN527

Page 1: ...PW MN527 300Mbps Wireless N USB Module User Guide Version 1 0 July 31 2012 PROWARE TECHNOLOGIES CO Ltd...

Page 2: ...by any means electronic mechanical magnetic optical chemical manual or otherwise without the prior written permission of PROWARE Technologies CO Ltd is a registered trademark of PROWARE Technologies...

Page 3: ...Revision History Release Date Revision Initials 1 0 2012 7 31 First release...

Page 4: ...f and on the user is encouraged to try to correct the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment and...

Page 5: ...r and obtaining a separate FCC authorization End Product Labeling This transmitter module is authorized only for use in device where the antenna may be installed such that 20 cm may be maintained betw...

Page 6: ...t 8 1 2 Features 8 Chapter 2 Installation Guide 9 2 1 Hardware Installation 9 2 2 Software Installation 9 Chapter 3 Linux Installation Guide For Consumer Electronics 14 3 1 Hardware Installation 14 3...

Page 7: ...PW MN527 300Mbps Wireless N USB Module Note Make sure that the package contains the above items If any of the listed items are damaged or missing please contact with your distributor Conventions The M...

Page 8: ...e intrusion and protect your personal information from being exposed With unmatched wireless performance reception and security protection it is easily to be used in different kinds of wireless embedd...

Page 9: ...h a connecting wire first Then the promoted Found New Hardware Wizard will pop up if the Module is installed correctly 2 2 Software Installation Take PW MN527 300Mbps Wireless N USB Module XP driver f...

Page 10: ...PW MN527 300Mbps Wireless N USB Module 10 4 Select Install from a list or specific location Advanced and then click Next 5 Select Search for the best driver in these locations and then click Browse...

Page 11: ...PW MN527 300Mbps Wireless N USB Module 11 6 Select the file which we decompress at step 1 and then click OK 7 Click Next to start the driver update...

Page 12: ...Wireless N USB Module 12 8 Finally click Finish 9 If you want to check if the driver is installed successfully please click Properties of the card in the Device Manager Click driver label to see the d...

Page 13: ...PW MN527 300Mbps Wireless N USB Module 13...

Page 14: ...use PW MN527 it must provide a corresponding connector for the module After connecting the module to the device the hardware installation is finished 3 2 Software Installation For the Consumer Electro...

Page 15: ...QAM DBPSK DQPSK and CCK Media Access Protocol CSMA CA with ACK Data Security WPA WPA2 64 128 bit WEP TKIP AES Frequency 2 4 2 4835GHz Spread Spectrum Direct Sequence Spread Spectrum DSSS Safety Emissi...

Page 16: ...peer to peer mode and is useful at a departmental scale or SOHO operation DSSS Direct Sequence Spread Spectrum DSSS generates a redundant bit pattern for all data transmitted This bit pattern is calle...

Page 17: ...of characters that you create When using WEP you must determine the level of encryption The type of encryption determines the key length 128 bit encryption requires a longer key than 64 bit encryption...

Reviews: