background image

PW-MN527 

300Mbps Wireless N USB Module 

 

 

17

 

developed by the military for use in reliable, secure, mission-critical communications systems. 

It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other 

words, more bandwidth is consumed than in the case of narrowband transmission, but the 

trade off produces a signal that is, in effect, louder and thus easier to detect, provided that the 

receiver knows the parameters of the spread-spectrum signal being broadcast. If a receiver is 

not  tuned  to  the  right  frequency,  a  spread-spectrum  signal  looks  like  background  noise. 

There are two main alternatives, Direct Sequence Spread Spectrum (DSSS) and Frequency 

Hopping Spread Spectrum (FHSS). 

 

WEP - 

(

W

ired 

E

quivalent 

P

rivacy) 

-

 A data privacy mechanism based on a 64-bit or 128-bit or 

152-bit shared key algorithm, as described in the IEEE 802.11 standard. To gain access to a 

WEP  network,  you  must  know  the  key.  The  key  is  a  string  of  characters  that  you  create. 

When  using  WEP,  you  must  determine  the  level  of  encryption.  The  type  of  encryption 

determines  the key  length.  128-bit  encryption  requires  a  longer  key  than  64-bit  encryption. 

Keys are defined by entering in a string in HEX (hexadecimal - using characters 0-9, A-F) or 

ASCII  (American  Standard  Code  for  Information  Interchange 

–  alphanumeric  characters) 

format. ASCII format is provided so you can enter a string that is easier to remember. The 

ASCII string is converted to HEX for use over the network. Four keys can be defined so that 

you can change keys easily. 

 

Wi-Fi  - 

A  trade  name  for  the  802.11b  wireless  networking standard,  given by  the Wireless 

Ethernet  Compatibility  Alliance  (WECA,  see  http://www.wi-fi.net),  an  industry  standards 

group promoting interoperability among 802.11b devices. 

 

WLAN  -

  (

W

ireless 

L

ocal 

A

rea 

N

etwork)  -  A  group  of  computers  and  associated  devices 

communicate with each other wirelessly, which network serving users are limited in a local 

area. 

 

WPA  - 

(

W

i-Fi 

P

rotected 

A

ccess) 

-

  A  wireless  security  protocol  uses  TKIP  (Temporal  Key 

Integrity Protocol) encryption, which can be used in conjunction with a RADIUS server. 

 

 

 

Summary of Contents for PW-MN527

Page 1: ...PW MN527 300Mbps Wireless N USB Module User Guide Version 1 0 July 31 2012 PROWARE TECHNOLOGIES CO Ltd...

Page 2: ...by any means electronic mechanical magnetic optical chemical manual or otherwise without the prior written permission of PROWARE Technologies CO Ltd is a registered trademark of PROWARE Technologies...

Page 3: ...Revision History Release Date Revision Initials 1 0 2012 7 31 First release...

Page 4: ...f and on the user is encouraged to try to correct the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment and...

Page 5: ...r and obtaining a separate FCC authorization End Product Labeling This transmitter module is authorized only for use in device where the antenna may be installed such that 20 cm may be maintained betw...

Page 6: ...t 8 1 2 Features 8 Chapter 2 Installation Guide 9 2 1 Hardware Installation 9 2 2 Software Installation 9 Chapter 3 Linux Installation Guide For Consumer Electronics 14 3 1 Hardware Installation 14 3...

Page 7: ...PW MN527 300Mbps Wireless N USB Module Note Make sure that the package contains the above items If any of the listed items are damaged or missing please contact with your distributor Conventions The M...

Page 8: ...e intrusion and protect your personal information from being exposed With unmatched wireless performance reception and security protection it is easily to be used in different kinds of wireless embedd...

Page 9: ...h a connecting wire first Then the promoted Found New Hardware Wizard will pop up if the Module is installed correctly 2 2 Software Installation Take PW MN527 300Mbps Wireless N USB Module XP driver f...

Page 10: ...PW MN527 300Mbps Wireless N USB Module 10 4 Select Install from a list or specific location Advanced and then click Next 5 Select Search for the best driver in these locations and then click Browse...

Page 11: ...PW MN527 300Mbps Wireless N USB Module 11 6 Select the file which we decompress at step 1 and then click OK 7 Click Next to start the driver update...

Page 12: ...Wireless N USB Module 12 8 Finally click Finish 9 If you want to check if the driver is installed successfully please click Properties of the card in the Device Manager Click driver label to see the d...

Page 13: ...PW MN527 300Mbps Wireless N USB Module 13...

Page 14: ...use PW MN527 it must provide a corresponding connector for the module After connecting the module to the device the hardware installation is finished 3 2 Software Installation For the Consumer Electro...

Page 15: ...QAM DBPSK DQPSK and CCK Media Access Protocol CSMA CA with ACK Data Security WPA WPA2 64 128 bit WEP TKIP AES Frequency 2 4 2 4835GHz Spread Spectrum Direct Sequence Spread Spectrum DSSS Safety Emissi...

Page 16: ...peer to peer mode and is useful at a departmental scale or SOHO operation DSSS Direct Sequence Spread Spectrum DSSS generates a redundant bit pattern for all data transmitted This bit pattern is calle...

Page 17: ...of characters that you create When using WEP you must determine the level of encryption The type of encryption determines the key length 128 bit encryption requires a longer key than 64 bit encryption...

Reviews: