background image

TL-WN353GD 

54M Wireless PCI Adapter User Guide

 

 
 

29

Appendix B: Glossary 

¾

 

802.11b -

 The 802.11b standard specifies a wireless product networking at 11 Mbps using 

direct-sequence spread-spectrum (DSSS) technology and operating in the unlicensed radio 
spectrum at 2.4GHz, and WEP encryption for security. 802.11b networks are also referred to 
as Wi-Fi networks. 

¾

 

802.11g

 

-

 specification for wireless networking at 54 Mbps using direct-sequence 

spread-spectrum (DSSS) technology, using OFDM modulation and operating in the 
unlicensed radio spectrum at 2.4GHz, and backward compatibility with IEEE 802.11b devices, 
and WEP encryption for security. 

¾

 

Ad-hoc Network -

 An ad-hoc network is a group of computers, each with a Wireless PCI 

Adapter, connected as an independent 802.11 wireless LAN. Ad-hoc wireless computers 
operate on a peer-to-peer basis, communicating directly with each other without the use of an 
access point. Ad-hoc mode is also referred to as an Independent Basic Service Set (IBSS) or 
as peer-to-peer mode, and is useful at a departmental scale or SOHO operation.   

¾

 

DSSS 

(

D

irect-

S

equence 

S

pread 

S

pectrum) 

-

 DSSS generates a redundant bit pattern for all 

data transmitted. This bit pattern is called a chip (or chipping code). Even if one or more bits 
in the chip are damaged during transmission, statistical techniques embedded in the receiver 
can recover the original data without the need of retransmission. To an unintended receiver, 
DSSS appears as low power wideband noise and is rejected (ignored) by most narrowband 
receivers. However, to an intended receiver (i.e. another wireless LAN endpoint), the DSSS 
signal is recognized as the only valid signal, and interference is inherently rejected (ignored). 

¾

 

FHSS 

(

F

requency 

H

opping 

S

pread 

S

pectrum) 

-

 FHSS continuously changes (hops) the 

carrier frequency of a conventional carrier several times per second according to a 
pseudo-random set of channels. Because a fixed frequency is not used, and only the 
transmitter and receiver know the hop patterns, interception of FHSS is extremely difficult. 

¾

 

Infrastructure Network -

 An infrastructure network is a group of computers or other devices, 

each with a Wireless PCI Adapter, connected as an 802.11 wireless LAN. In infrastructure 
mode, the wireless devices communicate with each other and to a wired network by first 
going through an access point. An infrastructure wireless network connected to a wired 
network is referred to as a Basic Service Set (BSS). A set of two or more BSS in a single 
network is referred to as an Extended Service Set (ESS). Infrastructure mode is useful at a 
corporation scale, or when it is necessary to connect the wired and wireless networks.   

¾

 

Spread Spectrum -

 Spread Spectrum technology is a wideband radio frequency technique 

developed by the military for use in reliable, secure, mission-critical communications systems. 
It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other 
words, more bandwidth is consumed than in the case of narrowband transmission, but the 
trade off produces a signal that is, in effect, louder and thus easier to detect, provided that the 
receiver knows the parameters of the spread-spectrum signal being broadcast. If a receiver is 
not tuned to the right frequency, a spread-spectrum signal looks like background noise. 
There are two main alternatives, Direct Sequence Spread Spectrum (DSSS) and Frequency 

Summary of Contents for TL-WN353GD

Page 1: ...TL WN353GD 54M Wireless PCI Adapter Rev 1 0 1 1910010046...

Page 2: ...are trademarks or registered trademarks of their respective holders No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation tran...

Page 3: ...ed Consult the dealer or an experienced radio TV technician for help This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause...

Page 4: ...has been ongoing in recent years to allow current relaxed regulation Full implementation planned 2012 Italy If used outside of own premises general authorization is required Luxembourg None General au...

Page 5: ...lation for Windows Vista 6 Chapter 3 Configuration 10 3 1 Set Wizard 10 3 2 General Status 12 3 3 Profile Management 13 3 3 1 Add or Edit a Configuration Profile 14 3 3 2 Remove a configuration profil...

Page 6: ...LINK Wireless Utility and Drivers User Guide Other Helpful Information Note If any of the listed contents are damaged or missing please contact the retailer from whom you purchased the TL WN353GD 54M...

Page 7: ...encryption for high security 1 2 Features Complies with IEEE802 11g IEEE802 11b standards Supports WPA WPA2 data security IEEE802 1x authentication TKIP AES encryption 64 128 152 bit WEP encryption Su...

Page 8: ...esktop PC 2 2 Software Installation 2 2 1 Overview The Adapter s Setup Wizard will guide you through the Installation procedure for Windows XP and Vista The Setup Wizard will install the TP LINK Wirel...

Page 9: ...Adapter User Guide 4 Figure 2 1 Step 2 Click Next in the screen below shown in Figure 2 2 to continue you can click Cancel to end the installation Figure 2 2 Step 3 After that the next screen displays...

Page 10: ...the next screen the files will be copied as the next screen shown shown in Figure 2 4 To end the Installation click Cancel Figure 2 4 Note During the installation the system will warn about Windows L...

Page 11: ...ndows Vista 1 Insert the Resource CD into your CD ROM drive and open the folder with the same name as your product Then double click Setup exe in the proper folder according to your operating system t...

Page 12: ...gure 2 7 2 Click Next in the screen below shown in Figure 2 12 to continue you can click Cancel to end the installation Figure 2 8 3 After that the files will be copied as the next screen shown shown...

Page 13: ...r User Guide 8 Figure 2 9 Note During the installation the system will warn about Windows Security testing please click Install this driver software anyway to continue the installation Figure 2 10 4 C...

Page 14: ...TL WN353GD 54M Wireless PCI Adapter User Guide 9 Figure 2 11...

Page 15: ...ellow there is poor signal strength and the RSSI is between 5dB and 10dB If the icon is green there is good signal strength and the RSSI is between 10dB and 20dB If the icon is green there is excellen...

Page 16: ...Click Refresh button to update the wireless network show in Figure 3 2 Then select the wireless network and click Next Figure 3 2 Step 3 After that select the network authentication and data encryptio...

Page 17: ...rompts Unsecured network click OK to continue 3 2 General Status Choose the tab General as shown in Figure 3 4 the left filed displays the type of the adapter the right field displays the status about...

Page 18: ...ss from the AP Show Tray Icon Select the option to display the icon on the bottom of the desktop Otherwise you can see the two icons Disable Adapter If you select the option the adapter can t work Rad...

Page 19: ...5 3 3 1 Add or Edit a Configuration Profile Click the button Add or Edit you should select an existed profile first to edit it on the screen above and you can configure the profile as shown in Figure...

Page 20: ...on t select the option the system will search the available channel to connect Wireless network security This configure the security for the adapter Note You should configure the security for the adap...

Page 21: ...ta encryption as WPA 802 1X WPA2 802 1X or WEP 802 1X EAP TYPE Select the EAP type for the 802 1x configuration the options are GTC TLS LEAP TTLS PEAP Tunnel Select the tunnel MD5 GTC TLS and MSCHAP V...

Page 22: ...the Key index 1 and click the OK to save the configuration 2 Shared Key authentication When you select the Shared Key as the authentication the only available data encryption is WEP Note The configur...

Page 23: ...elect the WPA2 PSK as the authentication the available data encryptions are TKIP and AES Please select the one according your need Note The configuration for WPA2 PSK and WPA PSK are similar you can r...

Page 24: ...he configuration for WPA2 802 1x and WPA 802 1x are similar you can refer to WPA 802 1x authentication to configure it 7 WEP 802 1x When you select the WEP 802 1x as the authentication the only availa...

Page 25: ...e and then enter the new name for the configuration profile 3 3 4 Set default configuration profile Follow the steps below to select a configuration profile as default Once the adapter wants to connec...

Page 26: ...st at any time Step 2 Highlight a network name and click Add to Profile to connect to an available network Fill in the Profile name and click OK to create the new configuration profile for that networ...

Page 27: ...lects max mode to let the access point buffer incoming messages for the Wireless PCI Adapter The Adapter will detect the access point if any messages are waiting periodically Wireless Mode Select the...

Page 28: ...54M Wireless PCI Adapter User Guide 23 Figure 3 13 3 7 Statistics Click the tab Statistics as shown in Figure 3 12 to view the traffic statistics about the connection Click the Reset to refresh the i...

Page 29: ...N353GD 54M Wireless PCI Adapter User Guide 24 Figure 3 14 3 8 Wi Fi Protect Setup Click the tab Wi Fi Protect Setup as shown in Figure 3 15 select different way to configure the adapter for Wi Fi netw...

Page 30: ...r and the AP the adapter wants to connect must support the Wi Fi function first Or else the adapter can t connect the AP 3 8 1 PIN Step 1 Select the PIN shown in Figure 3 15 Step 2 Click the Refresh b...

Page 31: ...IN Code displays on the screen shown in Figure 3 17 Now you should enter the pin code into your AP Figure 3 17 Step 4 Finally the adapter will create the profile and connect to the AP automatically an...

Page 32: ...User Guide 27 Figure 3 18 3 8 2 Question Answer Method Step 1 Click PBC as shown in Figure 3 15 Figure 3 19 Step 2 Push the physical button on the AP Step 3 Finally the adapter will create the profile...

Page 33: ...5 5 2 1Mbps Auto Rate Sensing Modulation 1M DBPSK 2M DQPSK 5 5M 11M CCK 6M 9M 12M 18M 24M 36M 48M 54M OFDM Media Access Protocol CSMA CA with ACK Transmit Power 15dBm Typical Data Security WPA WPA2 6...

Page 34: ...int the DSSS signal is recognized as the only valid signal and interference is inherently rejected ignored FHSS Frequency Hopping Spread Spectrum FHSS continuously changes hops the carrier frequency o...

Page 35: ...ESSID WEP Wired Equivalent Privacy A data privacy mechanism based on a 64 bit or 128 bit or 152 bit shared key algorithm as described in the IEEE 802 11 standard Wi Fi A trade name for the 802 11b wir...

Reviews: