Edimax Technology LAN USB Adapter user manual What is WEP?

Page 55

7. What is WEP?

WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .11 standard.

8. What is TKIP?

TKIP is a quick-fix method to quickly overcome the inherent weaknesses in WEP security, especially the reuse of encryption keys. TKIP is involved in the IEEE 802.11i WLAN security standard, and the specification might be officially released by early 2003.

9. What is AES?

AES (Advanced Encryption Standard), a chip-based security, has been developed to ensure the highest degree of security and authenticity for digital information, wherever and however communicated or stored, while making more efficient use of hardware and/or software than previous encryption standards. It is also included in IEEE 802.11i standard. Compare with AES, TKIP is a temporary protocol for replacing WEP security until manufacturers implement AES at the hardware level.

10. Can Wireless products support printer sharing?

Wireless products perform the same function as LAN products. Therefore, Wireless products can work with Netware, Windows 2000, or other LAN operating systems to support printer or file sharing.

11. Would the information be intercepted while transmitting on air?

WLAN features two-fold protection in security. On the hardware side, as with Direct Sequence Spread Spectrum technology, it has the inherent security feature of scrambling. On the software side, WLAN series offer the encryption function (WEP) to enhance security and Access Control. Users can set it up depending upon their needs.

12. What is DSSS? What is FHSS? And what are their differences?

Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that changes frequency in a pattern that is known to both transmitter and receiver. Properly synchronized, the net effect is to maintain a single logical channel. To an unintended receiver, FHSS appears to be short-duration impulse noise. Direct-sequence spread-spectrum (DSSS) generates a redundant bit pattern for each bit to be transmitted. This bit pattern is called a chip (or chipping code). The longer the chip is, the greater the probability that the original data can be recovered. Even if one or more bits in the chip are damaged during transmission, statistical techniques embedded in the radio can recover the original data without-the need for retransmission. To an unintended receiver, DSSS appears as low power wideband noise and is rejected (ignored) by most narrowband receivers.

13. What is Spread Spectrum?

Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communication systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband transmission, but the trade off produces a signal that is, in effect, louder and thus easier to detect, provided that the receiver knows the parameters of the spread-spectrum signal being broadcast. If a receiver is not tuned to the right frequency, a spread –spectrum signal looks like background noise. There are two main alternatives, Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS).

- 54 -

Image 55
Contents 802.11b/g/n Draft Wireless LAN USB Adapter Copyright Catalog Chapter I Product Information Introduction and safety informationSafety Information System Requirements Package ContentsLED Name Light Status Description Familiar with your new wireless network cardNetwork Card Installation Chapter II Driver Installation and ConfigurationPage Optimize for WiFi mode Optimize for performance mode Again, please ignore it and wait Page Here Using Edimax Utility Connect to Wireless Access PointHere are descriptions of every setup item Page Page Page Page Using Windows Zero Configuration Page Page Connection Profile Management Make a profile for an access point or wireless devicePage You can set the parameter for this connection here Here are descriptions of every setup items Page WPA Grayed out Page Using 802.1x Certification Page Using 802.1x CA Server Page Network Statistics View Network Statistics and Link StatusLink Status Page Advanced Settings Here are descriptions of every setup items Page QoS Setting Here are descriptions of every setup items WPS Configuration WPS Setup PBC Push-Button Configuration Page Page WPS Setup PIN Page About Please click ‘OK’ to close configuration utility Chapter III Appendix Hardware SpecificationScenario Solution TroubleshootingAdd the MAC address of your network card to his / her access Glossary What is the Ieee 802.11g standard?What is WEP? What is WMM? FCC and Other Compliance Statements Federal Communication Commission Interference StatementEU Countries Not intended for use

LAN USB Adapter specifications

Edimax Technology is renowned for its innovative solutions in the realm of networking, and the Edimax LAN USB Adapter exemplifies this commitment. This device is designed to enhance connectivity for a wide range of users, from casual consumers to professionals requiring reliable internet access.

One of the main features of the Edimax LAN USB Adapter is its ability to connect a computer or laptop to a wired network quickly and efficiently. This is particularly useful for devices that lack an Ethernet port or are limited in Wi-Fi connectivity. The adapter ensures stable and uninterrupted internet access, which is essential for gaming, streaming, and other high-bandwidth tasks.

In terms of technology, the adapter supports USB 3.0, allowing for faster data transfer rates compared to its predecessors. USB 3.0 connectivity ensures that the device can handle demanding applications without any lag, providing users with the performance they expect. Additionally, the adapter is backward compatible with USB 2.0, making it versatile and compatible with a variety of devices, including older models.

The Edimax LAN USB Adapter is also equipped with advanced network security protocols, ensuring safe and secure connections. It supports 802.1X authentication, which is particularly beneficial for users in corporate environments seeking to protect their data from unauthorized access. This commitment to security helps establish trust in the device, particularly in today's digital age, where cyber threats are increasingly prevalent.

Another characteristic of the Edimax adapter is its plug-and-play functionality, which simplifies the installation process. Users can easily connect the adapter to their device without needing complicated software or drivers. This feature is essential for users who may not be tech-savvy and prefer a hassle-free experience.

Furthermore, the compact and portable design of the Edimax LAN USB Adapter makes it an ideal travel companion. Its lightweight profile allows users to carry it in their laptop bag without adding significant bulk. This convenience is particularly appealing for professionals on the go or individuals who frequently move between locations.

Overall, the Edimax Technology LAN USB Adapter provides a reliable and efficient networking solution packed with features that enhance connectivity while maintaining security. Whether for home use or business applications, this adapter serves as a vital tool for anyone seeking to improve their internet experience. Its combination of speed, security, and user-friendly design makes it a standout choice in the crowded market of networking accessories.