Rosewill RNX-N180PCE user manual Table of Content

Page 4
Table of Content

Wireless N Adapter RNX-N180PCe

User Manual

Table of Content

 

 

Chapter 1 Overview

5

Package Content

5

1.1

Overview of the Product

5

1.2

Features

6

1.3

System Requirement

6

1.4

LED Status

6

1.5

Product Specification

7

Chapter 2 Installation Guide

8

2.1

Hardware Installation

8

2.2

Software Installation for Windows OS

9

3.1 Connecting with Microsoft Zero Configuration tool (Win XP)

13

3.2 Connecting with Window 7

14

3.3 Connecting with Wireless LAN Utility

15

Chapter 4 Utility Configuration – Win XP’s Station Mode

18

4.1

General

18

4.1.1

Profile

19

4.1.1.1 Add

19

4.1.1.2 Remove

21

4.1.1.3 Edit

21

4.1.1.4 Duplicate

22

4.1.1.5 Set default

23

4.2

Available Network

24

4.3

Status

25

4.4

Statistics

26

4.5

Wi-Fi Protect Setup

27

4.5.1 Method 1 PIN Input Config (PIN)

27

4.5.2 Method 2 Push Button

29

Chapter 5 Configuration – Win XP’s Access Point Mode

31

5.1

General

31

5.2

Advanced

32

5.3

Statistics

33

5.4

ICS

34

FAQ

 

36

Glossary

 

38

4

Image 4
Contents Wireless N Adapter RNX-N180PCe User ManualWireless N Adapter RNX-N180PCe 2400.0-2483.5 MHzCountry RestrictionWireless N Adapter RNX-N180PCe Table of Content Package Content Chapter 1 Overview1.1 Overview of the Product Easy Installation, enhanced Wireless Security1.2 Features 1.3 System Requirement1.4 LED Status LED Indications1.5 Product Specification Transmit PowerStandard InterfaceChapter 2 Installation Guide 2.1 Hardware Installation2.2 Software Installation for Windows OS 5. Click Next 6. Click Install to start installing 7. Follow the InstallShield Wizard steps, and click Finish when done 8. Now your PC or notebook will restart automaticallyWireless N Adapter RNX-N180PCe 3.1 Connecting with Microsoft Zero Configuration tool Win XP Chapter 3 Wireless Connection Guide3.2 Connecting with Window 3.3 Connecting with Wireless LAN Utility 3.3.1 Step 1 Search Available Network 3.3.2 Step 2 Select and Add to ProfileAfter click “Add to Profile”, you will see the next window “Wireless Network Properties” popup with your current wireless signal’s setting. RNX-N180PCe will detect the current setting of your SSID. So after the “Wireless Network Properties” popup, all you need to do is to enter the password of your SSID and click OK to continute Chapter 4 Utility Configuration - Win XP’s Station Mode 4.1 General4.1.1 Profile Network AddressOthers  Create a new Infrastructure mode profile Create a new ad-hoc mode profile 4.1.1.2 Remove 4.1.1.3 Editcreated a profile Modify the profile information according to your demand 4.1.1.4 DuplicateSelect a profile which you want to copy and then click Duplicate 4.1.1.5 Set default Import the new profile name in the popup window blank4.2 Available Network Double-click the network to which you wish to connect4.3 Status 4.4 Statistics 4.5 Wi-Fi Protect Setup 4.5.1 Method 1 PIN Input Config PINWPS config page 2. Click Pin Input ConfigPIN1. Click Push Button ConfigPBC on Wi-Fi Protect Setup page 4.5.2 Method 2 Push Button2. Click Start PBC on the AP-Router WPS config page Remark Chapter 5 Configuration - Win XP’s Access Point Mode 5.1 General5.2 Advanced  Network authentication Profile name  Network name SSID5.3 Statistics  Set defaults Beacon Interval  DTIM period5.4 ICS It display receive and transmit informationWireless N Adapter RNX-N180PCe User ManualPage multiple clients associated to it Glossary Even if one or more bits in the chip are damaged during transmission, statistical techniques embedded in the receiver can recover the original data without the need of retransmission. To an unintended receiver, DSSS appears as low power wideband noise and is rejected ignored by most narrowband receivers. However, to an intended receiver i.e. another wireless LAN endpoint, the DSSS signal is recognized as the only valid signal, and interference is inherently rejected ignored  WEP - Wired Equivalent Privacy - A data privacy mechanism based on a 64-bit or 128-bit or 152-bit shared key algorithm, as described in the IEEE 802.11 standard. To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When using WEP, you must determine the level of encryption. The type of encryption determines the key length. 128-bit encryption requires a longer key than 64-bit encryption. Keys are defined by entering in a string in HEX hexadecimal - using characters 0-9, A-F or ASCII American Standard Code for Information Interchange - alphanumeric characters format. ASCII format is provided so you can enter a string that is easier to remember. The ASCII string is converted to HEX for use over the network. Four keys can be defined so that you can change keys easily