Rosewill RNX-N180PCE user manual

Page 39

Wireless N Adapter RNX-N180PCe

User Manual

 

 

 

Even if one or more bits in the chip are damaged during transmission, statistical techniques embedded in the receiver can recover the original data without the need of retransmission. To an unintended receiver, DSSS appears as low power wideband noise and is rejected (ignored) by most narrowband receivers. However, to an intended receiver (i.e. another wireless LAN endpoint), the DSSS signal is recognized as the only valid signal, and interference is inherently rejected (ignored).

FHSS - (Frequency Hopping Spread Spectrum) - FHSS continuously changes (hops) the carrier frequency of a conventional carrier several times per second according to a pseudo-random set of channels. Because a fixed frequency is not used, and only the transmitter and receiver know the hop patterns, interception of FHSS is extremely difficult.

Infrastructure Network - An infrastructure network is a group of computers or other devices, each with a Wireless Adapter, connected as an 802.11 wireless LAN. In infrastructure mode, the wireless devices communicate with each other and to a wired network by first going through an access point. An infrastructure wireless network connected to a wired network is referred to as a Basic Service Set (BSS). A set of two or more BSS in a single network is referred to as an Extended Service Set (ESS). Infrastructure mode is useful at a corporation scale, or when it is necessary to connect the wired and wireless networks.

SSID - A Service Set Identification is a thirty-two character (maximum) alphanumeric key identifying a wireless local area network. For the wireless devices in a network to communicate with each other, all devices must be configured with the same SSID. This is typically the configuration parameter for a wireless PC card. It corresponds to the ESSID in the wireless Access Point and to the wireless network name. See also Wireless Network Name and ESSID.

39

Image 39
Contents User Manual Wireless N Adapter RNX-N180PCeRestriction Wireless N Adapter RNX-N180PCe2400.0-2483.5 MHz CountryWireless N Adapter RNX-N180PCe Table of Content Easy Installation, enhanced Wireless Security Package ContentChapter 1 Overview 1.1 Overview of the ProductLED Indications 1.2 Features1.3 System Requirement 1.4 LED StatusInterface 1.5 Product SpecificationTransmit Power Standard2.1 Hardware Installation Chapter 2 Installation Guide2.2 Software Installation for Windows OS 5. Click Next 6. Click Install to start installing 8. Now your PC or notebook will restart automatically 7. Follow the InstallShield Wizard steps, and click Finish when doneUser Manual Chapter 3 Wireless Connection Guide 3.1 Connecting with Microsoft Zero Configuration tool Win XP3.2 Connecting with Window 3.3 Connecting with Wireless LAN Utility 3.3.2 Step 2 Select and Add to Profile 3.3.1 Step 1 Search Available NetworkAfter click “Add to Profile”, you will see the next window “Wireless Network Properties” popup with your current wireless signal’s setting. RNX-N180PCe will detect the current setting of your SSID. So after the “Wireless Network Properties” popup, all you need to do is to enter the password of your SSID and click OK to continute 4.1 General Chapter 4 Utility Configuration - Win XP’s Station Mode Create a new Infrastructure mode profile 4.1.1 ProfileNetwork Address Others Create a new ad-hoc mode profile 4.1.1.3 Edit 4.1.1.2 Removecreated a profile 4.1.1.4 Duplicate Modify the profile information according to your demandSelect a profile which you want to copy and then click Duplicate Import the new profile name in the popup window blank 4.1.1.5 Set defaultDouble-click the network to which you wish to connect 4.2 Available Network4.3 Status 4.4 Statistics 4.5.1 Method 1 PIN Input Config PIN 4.5 Wi-Fi Protect Setup2. Click Pin Input ConfigPIN WPS config page4.5.2 Method 2 Push Button 1. Click Push Button ConfigPBC on Wi-Fi Protect Setup page2. Click Start PBC on the AP-Router WPS config page Remark 5.1 General Chapter 5 Configuration - Win XP’s Access Point Mode Network name SSID 5.2 Advanced Network authentication  Profile name DTIM period 5.3 Statistics Set defaults  Beacon IntervalIt display receive and transmit information 5.4 ICSUser Manual Wireless N Adapter RNX-N180PCePage multiple clients associated to it Glossary Even if one or more bits in the chip are damaged during transmission, statistical techniques embedded in the receiver can recover the original data without the need of retransmission. To an unintended receiver, DSSS appears as low power wideband noise and is rejected ignored by most narrowband receivers. However, to an intended receiver i.e. another wireless LAN endpoint, the DSSS signal is recognized as the only valid signal, and interference is inherently rejected ignored  WEP - Wired Equivalent Privacy - A data privacy mechanism based on a 64-bit or 128-bit or 152-bit shared key algorithm, as described in the IEEE 802.11 standard. To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When using WEP, you must determine the level of encryption. The type of encryption determines the key length. 128-bit encryption requires a longer key than 64-bit encryption. Keys are defined by entering in a string in HEX hexadecimal - using characters 0-9, A-F or ASCII American Standard Code for Information Interchange - alphanumeric characters format. ASCII format is provided so you can enter a string that is easier to remember. The ASCII string is converted to HEX for use over the network. Four keys can be defined so that you can change keys easily