background image

Wireless LAN Adaptor   

(11abgn 2x2 USB)   

 

Panasonic 

 

DNUA-P75   

User Manual   

 

 

Copyright Statement 

No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any 

form or by any means, whether electronic, mechanical, photocopying, recording or otherwise 

without the prior writing of the publisher. 

Pentium is trademark of Intel.   

All copyright reserved. 

 

Summary of Contents for DNUA-P75

Page 1: ...ment No part of this publication may be reproduced stored in a retrieval system or transmitted in any form or by any means whether electronic mechanical photocopying recording or otherwise without the prior writing of the publisher Pentium is trademark of Intel All copyright reserved ...

Page 2: ...eceiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment This device complies with Part 15 of the FCC Rules Operatio...

Page 3: ...ystems ii the maximum antenna gain permitted for devices in the bands 5250 5350 MHz and 5470 5725 MHz shall comply with the e i r p limit and iii the maximum antenna gain permitted for devices in the band 5725 5825 MHz shall comply with the e i r p limits specified for point to point and non point to point operation as appropriate iv Users should also be advised that high power radars are allocate...

Page 4: ...auser du brouillage et ou des dommages aux dispositifs LAN EL Radiation Exposure Statement This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operated with minimum distance 20cm between the radiator your body Déclaration d exposition aux radiations Cet équipement est conforme aux limites d exposition aux rayonn...

Page 5: ...odulation techniques Harmonized EN covering the essential requirements of article 3 2 of the R TTE Directive EN 301 893 V1 7 1 2012 06 Broadband Radio Access Networks BRAN 5 GHz high performance RLAN Harmonized EN covering the essential requirements of article 3 2 of the R TTE Directive EN 301 489 1 V1 9 2 2011 Electromagnetic compatibility and Radio spectrum Matters ERM ElectroMagnetic Compatibil...

Page 6: ...se de equipo cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999 5 CE Ελληνική Greek ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ name of manufacturer ΔΗΛΩΝΕΙ ΟΤΙ type of equipment ΣΥΜΜΟΡΦΩΝΕΤΑΙ ΠΡΟΣ ΤΙΣ ΟΥΣΙΩΔΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ ΛΟΙΠΕΣ ΣΧΕΤΙΚΕΣ ΔΙΑΤΑΞΕΙΣ ΤΗΣ ΟΔΗΓΙΑΣ 1999 5 ΕΚ Français French Par la présente nom du fabricant déclare que l appareil type d appare...

Page 7: ...nowieniami Dyrektywy 1999 5 EC Português Portuguese Nome do fabricante declara que este tipo de equipamento está conforme com os requisitos essenciais e outras disposições da Directiva 1999 5 CE Slovensko Slovenian Ime proizvajalca izjavlja da je ta tip opreme v skladu z bistvenimi zahtevami in ostalimi relevantnimi določili direktive 1999 5 ES Slovensky Slovak Meno výrobcu týmto vyhlasuje že typ ...

Page 8: ...電機之使用不得影響飛航安全及干擾合法通信 經發現有干擾現象 時 應立即停用 並改善至無干擾時方得繼續使用 前項合法通信 指依電信法規定作業之無線電通信 低功率射頻電機須忍受合法通信或工 業 科學及醫療用電波輻射性電機設備之干擾 無線傳輸設備 UNII 在 5 25 5 35 秭赫頻帶內操作之無線資訊傳輸設備 限於室內使用 4 7 5 無線資訊傳輸設備忍受合法通信之干擾且不得干擾合法通信 如造成干擾 應立即停用 俟無干擾之虞 始得繼續使用 4 7 6 無線資訊傳設備的製造廠商應確保頻率穩定性 如依製造廠商使用手冊上所述正常操作 發射的信號應維持於操作頻帶中 4 7 7 ...

Page 9: ... 2 DRIVER UTILITY INSTALLATION UNINSTALLATION 9 3 CONNECTING TO AN EXISTING NETWORK 9 4 MODIFYING A WIRELESS NETWORK 10 4 1 MODIFYING GENERAL SETTINGS 10 4 2 MODIFYING SECURITY SETTINGS 11 5 SPECIFICATIONS 13 APPENDIX A FAQ ABOUT WLAN 14 ...

Page 10: ... function without installing driver or utility 3 Connecting to an Existing Network 1 Use the remote control that came with your TV to access the network configuration settings page 2 Select the scanning wireless network function The system starts to scan for available network On this list click Refresh to refresh the list at any time 3 Select the network you want to connect to 4 If the chosen netw...

Page 11: ...e settings below for your network Profile Name Identifies the configuration wireless network profile This name must be unique Profile names are not case sensitive Client Name Identifies the client machine Use this profile for Access Point mode Configures station to operate in Access Point mode Network Names SSIDs The IEEE 802 11 wireless network name This field has a maximum limit of 32 characters...

Page 12: ...ions include EAP FAST EAP TLS EAP TTLS EAP SIM PEAP EAP GTC PEAP EAP MSCHAP V2 LEAP WPA WPA2 Passphrase Enables WPA WPA2 Passphrase security Click on the Configure button and fill in the WPA WPA2 Passphrase 802 1x Enables 802 1x security This option requires IT administration Choosing 802 1x opens the 802 1x EAP type drop down menu The options include EAP FAST EAP TLS EAP TTLS EAP SIM PEAP EAP GTC...

Page 13: ...ich means no time limit is imposed for finding the domain controller Note The authentication process times out whenever the authentication timer times out or the time for finding the domain controller is reached Group Policy Delay Specify how much time elapses before the Windows logon process starts group policy Group policy is a Windows feature used by administrators to specify configuration opti...

Page 14: ... US Canada Taiwan 11 1 11 Major European country 13 1 13 France 4 10 13 Japan 11b 14 1 13 11g 13 1 13 China 13 1 13 802 11na 1 US Canada Taiwan 12 non overlapping channels 36 40 44 48 52 56 60 64 100 104 108 112 116 120 124 128 132 136 140 149 153 157 161 165 2 Europe 19 non overlapping channel 36 40 44 48 52 56 60 64 100 104 108 112 116 120 124 128 132 136 140 3 Japan 19 non overlapping channels ...

Page 15: ...ded receiver FHSS appears to be short duration impulse noise Direct Sequence Spread Spectrum DSSS generates a redundant bit pattern for each bit to be transmitted This bit pattern is called a chip or chipping code The longer the chip the greater the probability that the original data can be recovered Even if one or more bits in the chip are damaged during transmission statistical techniques embedd...

Page 16: ...logy that links access points and nodes In such a system the user s end node undertakes a search for the best possible access to the system First it evaluates such factors as signal strength and quality as well as the message load currently being carried by each access point and the distance of each access point to the wired backbone Based on that information the node next selects the right access...

Reviews: