Contents
Wireless N Adapter RNX-N180PCe
User Manual
Country
Wireless N Adapter RNX-N180PCe
2400.0-2483.5 MHz
Restriction
Wireless N Adapter RNX-N180PCe
Table of Content
1.1 Overview of the Product
Package Content
Chapter 1 Overview
Easy Installation, enhanced Wireless Security
1.4 LED Status
1.2 Features
1.3 System Requirement
LED Indications
Standard
1.5 Product Specification
Transmit Power
Interface
Chapter 2 Installation Guide
2.1 Hardware Installation
2.2 Software Installation for Windows OS
5. Click Next 6. Click Install to start installing
7. Follow the InstallShield Wizard steps, and click Finish when done
8. Now your PC or notebook will restart automatically
Wireless N Adapter RNX-N180PCe
3.1 Connecting with Microsoft Zero Configuration tool Win XP
Chapter 3 Wireless Connection Guide
3.2 Connecting with Window
3.3 Connecting with Wireless LAN Utility
3.3.1 Step 1 Search Available Network
3.3.2 Step 2 Select and Add to Profile
After click “Add to Profile”, you will see the next window “Wireless Network Properties” popup with your current wireless signal’s setting. RNX-N180PCe will detect the current setting of your SSID. So after the “Wireless Network Properties” popup, all you need to do is to enter the password of your SSID and click OK to continute
Chapter 4 Utility Configuration - Win XP’s Station Mode
4.1 General
Others
4.1.1 Profile
Network Address
Create a new Infrastructure mode profile
Create a new ad-hoc mode profile
4.1.1.2 Remove
4.1.1.3 Edit
created a profile
Modify the profile information according to your demand
4.1.1.4 Duplicate
Select a profile which you want to copy and then click Duplicate
4.1.1.5 Set default
Import the new profile name in the popup window blank
4.2 Available Network
Double-click the network to which you wish to connect
4.3 Status
4.4 Statistics
4.5 Wi-Fi Protect Setup
4.5.1 Method 1 PIN Input Config PIN
WPS config page
2. Click Pin Input ConfigPIN
1. Click Push Button ConfigPBC on Wi-Fi Protect Setup page
4.5.2 Method 2 Push Button
2. Click Start PBC on the AP-Router WPS config page
Remark
Chapter 5 Configuration - Win XP’s Access Point Mode
5.1 General
Profile name
5.2 Advanced
Network authentication
Network name SSID
Beacon Interval
5.3 Statistics
Set defaults
DTIM period
5.4 ICS
It display receive and transmit information
Wireless N Adapter RNX-N180PCe
User Manual
Page
multiple clients associated to it
Glossary
Even if one or more bits in the chip are damaged during transmission, statistical techniques embedded in the receiver can recover the original data without the need of retransmission. To an unintended receiver, DSSS appears as low power wideband noise and is rejected ignored by most narrowband receivers. However, to an intended receiver i.e. another wireless LAN endpoint, the DSSS signal is recognized as the only valid signal, and interference is inherently rejected ignored
WEP - Wired Equivalent Privacy - A data privacy mechanism based on a 64-bit or 128-bit or 152-bit shared key algorithm, as described in the IEEE 802.11 standard. To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When using WEP, you must determine the level of encryption. The type of encryption determines the key length. 128-bit encryption requires a longer key than 64-bit encryption. Keys are defined by entering in a string in HEX hexadecimal - using characters 0-9, A-F or ASCII American Standard Code for Information Interchange - alphanumeric characters format. ASCII format is provided so you can enter a string that is easier to remember. The ASCII string is converted to HEX for use over the network. Four keys can be defined so that you can change keys easily