Download: TL-WN721N 150Mbps Wireless Lite-N USB Adapter
TL-WN721N 150Mbps Wireless Lite-N USB Adapter Rev: 1.0.0 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and product names are trademarks or registered trademarks of their respective holders. No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from TP-LINK TECHNOLOGIES CO., LTD. Copyright © 2009 TP-LINK TECHNOLOGIES CO., LTD. All rights reserved. http://www.tp-link.com FC...
Author: Cariely Shared: 7/30/19
Downloads: 147 Views: 341
TL-WN721N150Mbps Wireless Lite-N USB Adapter Rev: 1.0.0,
COPYRIGHT & TRADEMARKSSpecifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and product names are trademarks or registered trademarks of their respective holders. No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from TP-LINK TECHNOLOGIES CO., LTD. Copyright © 2009 TP-LINK TECHNOLOGIES CO., LTD. All rights reserved. http://www.tp-link.com,
FCC STATEMENTThis equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: • Reorient or relocate the receiving antenna. • Increase the separation between the equipment and receiver. • Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. • Consult the dealer or an experienced radio/ TV technician for help. This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: 1) This device may not cause harmful interference. 2) This device must accept any interference received, including interference that may cause undesired operation. Any changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment.
FCC RF Radiation Exposure Statement:This device has been tested for compliance with FCC RF Exposure (SAR) limits in the typical laptop computer configuration and this device can be used in desktop or laptop computers. This device cannot be used with handheld PDAs (personal digital assistants). This device and its antenna must not be co-located or operated in conjunction with any other antenna or transmitter. SAR measurements are based on a 5mm spacing from the body and that compliance is achieved at that distance.,
CE Mark WarningThis is a class B product. In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures.
National restrictionsThis device is intended for home and office use in all EU countries (and other countries following the EU directive 1999/5/EC) without any limitation except for the countries mentioned below: Country Restriction Reason/remark General authorization required for outdoor use and Bulgaria None public service Outdoor use limited to 10 Military Radiolocation use. Refarming of the 2.4 GHz France mW e.i.r.p. within the band band has been ongoing in recent years to allow current 2454-2483.5 MHz relaxed regulation. Full implementation planned 2012 If used outside of own premises, general authorization is Italy None required General authorization required for network and service Luxembourg None supply(not for spectrum) This subsection does not apply for the geographical area Norway Implemented within a radius of 20 km from the centre of Ny-Ålesund Russian Federation None Only for indoor applications Note: Please don’t use the product outdoors in France., TP-LINK TECHNOLOGIES CO., LTD
DECLARATION OF CONFORMITYFor the following equipment: Product Description: 150Mbps Wireless Lite-N USB Adapter Model No.: TL-WN721N Trademark: TP-LINK We declare under our own responsibility that the above products satisfy all the technical regulations applicable to the product within the scope of Council Directives: Directives 1999/5/EC The above product is in conformity with the following standards or other normative documents: ETSI EN 300 328 V1.7.1: 2006 ETSI EN 301 489-1 V1.8.1:2008 & ETSI EN 301 489-17 V1.3.2:2008 EN60950-1:2006 EN62311:2008 Recommendation 1999/519/EC Person is responsible for marking this declaration: Zhao Jianjun Director of International Business TP-LINK TECHNOLOGIES CO., LTD. South Building, No.5 Keyuan Road, Central Zone, Science & Technology Park, Nanshan, Shenzhen, P. R. China,
CONTENTS Package Contents ... 1 Chapter 1. Introduction ... 21.1 Overview of the product... 2 1.2 Features ... 2 1.3 LED Status ... 3
Chapter 2. Installation Guide ... 42.1 Hardware Installation... 4 2.2 Software Installation ... 4 2.2.1 Overview ... 4 2.2.2 Software Installation for Windows XP... 4
Chapter 3. Configuration for Windows XP... 103.1 Current Status ... 10 3.2 Profile Management ... 12 3.2.1 Add or Modify a Configuration Profile... 12 3.2.2 Remove a profile ... 16 3.2.3 Switch another Profile ... 17 3.2.4 Export a Profile... 17 3.2.5 Import a Profile ... 17 3.2.6 Scan Available Networks... 18 3.2.7 Auto Profile Selection Management ... 18 3.3 Diagnostics... 20 3.3.1 Check Driver Information... 20 3.3.2 Check Receive and Transmit Statistical Information ... 21
Chapter 4. QSS configuration... 224.1 PBC (Push Button Configuration) method ... 23 4.2 PIN method ... 26, 4.2.1 Enter a PIN into your AP device ... 26 4.2.2 Enter the PIN from your AP device... 27 Appendix A: Specifications... 29 Appendix B: Glossary... 30,
Package ContentsThe following contents should be found in your box: One TL-WN721N 150Mbps Wireless Lite-N USB Adapter Quick Installation Guide One USB cable One Resource CD for TL-WN721N, including: • TP-LINK Wireless Client Utility (TWCU) and Drivers • User Guide • Other Helpful Information
Note:Make sure that the package contains the above items. If any of the listed items are damaged or missing, please contact with your distributor.
Conventions:The ‘Adapter’ mentioned in this user guide stands for TL-WN721N 150Mbps Wireless Lite-N USB Adapter without any explanations.,
Chapter 1. IntroductionThank you for choosing TL-WN721N 150Mbps Wireless Lite-N USB Adapter. 1.1 Overview of the product The adapter is designed to provide a high-speed and unrivaled wireless performance for your notebook and PC. With a faster wireless connection, you can get a better Internet experience, such as downloading, gaming, video streaming and so on. The TL-WN721N’s auto-sensing capability allows high packet transfer rate of up to 150Mbps for maximum throughput. It has good capability on anti-jamming; it can also interoperate with other wireless (802.11b/g) products. The adapter supports WEP, WPA and WPA2 encryption to prevent outside intrusion and protect your personal information from being exposed. The Quick Setup Wizard guides you step by step through the installation process; the TP-LINK Wireless Client Utility helps you create a wireless connection immediately. With unmatched wireless performance, reception, and security protection, the TL-WN721N is the best choice for easily adding or upgrading wireless connectivity. 1.2 Features IEEE802.11g, IEEE802.11b standards Supports WPA/WPA2 data security, IEEE802.1x authentication, TKIP/AES encryption, WEP encryption Make use of IEEE 802.11n wireless technology to provide a wireless data rate of up to 150Mbps supports automatically adjust to lower speeds due to distance or other operating limitations Provides USB interface Supports Ad-Hoc and Infrastructure modes Good capability on anti-jamming Supports roaming between access points when configured in Infrastructure mode Easy to configure and provides monitoring information Supports Windows 2000, XP, Vista, 1.3 LED Status LED Indications Status Working Status Status Green The adapter is trying to scan a networking Flashing Alternately Activity Green connection. Status Green The adapter is already connected but is not Intermittently Activity Green transmitting or receiving data. Status Green Flashing The adapter is transmitting or receiving data. Activity Green,
Chapter 2. Installation Guide2.1 Hardware Installation There are two ways to install the Adapter: 1. Plug the Adapter directly to the USB port on your computer. 2. Connect the Adapter and your computer through the USB cable attached in package. The promoted Found New Hardware Wizard screen will pop up when the adapter is installed correctly. 2.2 Software Installation 2.2.1 Overview The Adapter’s Setup Wizard will guide you through the Installation procedure for Windows XP. The Setup Wizard will install the TP-LINK Wireless Client Utility (TWCU) and drivers. When you install the hardware prior to before installing the software, the system will prompt “Found New Hardware Wizard”, click Cancel, and run the Setup Wizard program on the CD-ROM. The Setup steps for Windows 2000 and XP are similar with each other. This user guide takes Windows XP for example. 2.2.2 Software Installation for Windows XP 1. Insert the Resource CD into your CD-ROM drive, and the Figure 2-1 will appear. To continue, select the TL-WN721N.There will be a menu including: Install Driver & Utility, Install QSS and User Guide. Figure 2-1, 2. Click Install Driver & Utility to load the following screen. Figure 2-2 3. Soon, Figure 2-3 will display after a moment. Click Next to continue. Figure 2-3 4. After that, you should choose a Setup type. It is recommended that you select Install Client Utilities and Driver. Select Install Driver Only to install driver only, select Make Driver Installation Diskette(s) to make the diskette(s) as the installation driver (shown in Figure 2-4). Click Next to continue., Figure 2-4 5. Click Browse to change the destination location for the software, then click Next in the screen below (shown in Figure 2-5). Figure 2-5 6. After that, select the program folder, you should create a new folder name or select one from the Existing Folders list. It is recommended that you keep the default setting. Click Next to continue the installation., Figure 2-6 7. Choose configuration tool, if you are not sure, please leave it default. Then click Next to continue. Figure 2-7 8. Click OK to continue the Installation. Wait a while for the setup as shown in Figure 2-8., Figure 2-8
Note:For Windows XP, the Setup Wizard will notify you of how to proceed with the installation during these steps (shown in Figure 2-9). Our drivers have been tested thoroughly, and are able to work with the operating system. Click Continue Anyway to continue the Installation. Figure 2-9 9. After all the steps above, you will see the screen below, click Finish to reboot the system., Figure 2-10,
Chapter 3. Configuration for Windows XPTP-LINK TL-WN721N can be configured by TP-LINK Wireless Client Utility (TWCU) in Windows XP & 2000. This chapter describes how to configure your Adapter for wireless connectivity on your Wireless Local Area Network (WLAN) and use the data security encryption features. The configuration of the adapter in Windows XP is similar with that of Windows 2000. This User Guide takes Windows XP for example. After Installing the Adapter, the Adapter’s tray icon will appear in your system tray. It appears at the bottom of the screen, and shows the signal strength using color and the received signal strength indication (RSSI). If the icon is gray, there is no connection. If the icon is red, there is poor signal strength and the RSSI is less than 5dB. If the icon is yellow, there is poor signal strength and the RSSI is between 5dB and 10dB. If the icon is green, there is good signal strength and the RSSI is between 10dB and 20dB. If the icon is green, there is excellent signal strength and the RSSI is more than 20dB. Double-click the icon and the TWCU will run. You can also run the utility by clicking the Start→ All Programs→TP-LINK→ TP-LINK Wireless Client Utility. The TWCU provides some integrated and easy tools to: Display current status information Edit and add configuration profiles Display current diagnostics information The section below introduces these above capabilities. 3.1 Current Status The Current Status tab contains general information about the program and its operations. The Current Status tab needn’t any configurations., Figure 3-1 The following table describes the items found on the Current Status screen. Profile Name - This shows the name of current selected configuration profile. The configuration of Profile name will be described on the General tab of Profile Management. Link Status - This shows whether the station is associated to the wireless network. Wireless Mode - Here displays the wireless mode. Network Type - The type of network and the station currently connected are shown here. The options include: • Infrastructure (access point) • Ad Hoc
Note:You can configure the network type and wireless mode on the Advanced tab of Profile Management. IP Address - This displays the computer’s IP address. Control Channel - This shows the currently connected channel. Data Encryption - Here displays the encryption type the driver is using. You can configure it on the Security tab of Profile Management. Server Based Authentication - This shows whether the server based authentication is used. Signal Strength - This shows the strength of the signal., Click Advanced on the screen above, you can see advanced information about the program and its operations. 3.2 Profile Management Click the Profile Management tab of the TWCU and the next screen will appear (shown in Figure 3-2). The Profile Management screen provides tools to: Add a new profile Modify a profile Remove a profile Activate a Profile Import a Profile Export a Profile Scan Available Networks Order profiles Figure 3-2 3.2.1 Add or Modify a Configuration Profile To add a new configuration profile, click New on the Profile Management tab. To modify a configuration profile, select the configuration profile from the Profile list and click Modify. Then you will see the Management dialog box (shown in Figure 3-3). 1. Edit the General tab Profile Name - Please enter the Profile name which identifies the configuration profile. This name must be unique. Note that the profile names are not case-sensitive. Client Name - Please enter the Profile name which identifies the client machine., Network Names (SSIDs) - Please enter the IEEE 802.11 wireless network name. This field has a maximum limit of 32 characters. Figure 3-3 2. Edit the Security tab Select the Security tab in the screen above, and then you can edit the fields to configure the profile. To define the security mode, select the radio button of the desired security mode as follows. Figure 3-4, WPA/WPA2: Wi-Fi Protected Access WPA/WPA2 Passphrase: Wi-Fi Protected Access Passphrase 802.1x: Enables 802.1x security. Pre-Shared Key (Static WEP): Enables the use of shared keys that are defined on both the access point and the station. To define shared encryption keys, choose the Shared Key radio button and click Configure to fill in the Define Shared Keys window (shown in Figure 3-5). None: No security (not recommended).
Note:If the access point which the Adapter is associated has WEP set and the client has WEP enabled, make sure that Allow Association to Mixed Cells is checked on the Security tab to allow association. To complete WEP encryption configuration, you must select the 802.11 Authentication Mode as appropriate on the Advanced tab of this Profile Management dialog. To configure the Encryption Keys under the Pre-Shared keys (Static WEP) Security mode: Figure 3-5
Note:Select different Security Options, the configurations are different; you can select the appropriate security option and configure the exact key as your need. 3. Edit the Advanced tab This screen below allows you to make advanced configuration for the profile., Figure 3-6 Power Save Mode - Please select the power save mode in the drop-down list. • Maximum - Selects maximum mode to let the access point buffer incoming messages for the Adapter. The Adapter will detect the access point if any messages are waiting periodically. • Normal - Normal mode uses maximum when retrieving a large number of packets, then switches back to power save mode after retrieving the packets. • Off - Turns power saving off, thus powering up the Wireless USB Adapter continuously for a short message response time. Network Type: There are basically two modes of networking: • Infrastructure - All wireless clients will connect to an access point or wireless router. • Ad-Hoc - Directly connecting to another computer, for peer-to-peer communication, using wireless network adapters on each computer, such as two or more TL-WN721N wireless adapters.
Note:1) An Infrastructure network contains an Access Point or wireless router. All the wireless devices or clients will connect to the wireless router or access point. 2) An Ad-Hoc network contains only clients, such as laptops with wireless desktop adapters. All the adapters must be in Ad-Hoc mode to communicate. Wireless Mode: Specifies 2.4 GHz 150 Mbps, 2.4 GHz 54 Mbps or 2.4 GHz 11 Mbps operation in an access point network. The Wireless adapter must match the wireless mode, of the access point with which it associates. Wireless Mode when Starting an Ad Hoc Network: Specifies 2.4 GHz 54/11 Mbps to start an Ad Hoc network if no matching network name is found after scanning all available modes. This mode also allows the selection of the channel that the Wireless Adapter uses. The channels available depend on the regulatory domain. If the adapter finds no other ad hoc adapters, the channel that the adapter starts the ad hoc network with will be selected automatically. The Adapter must match the wireless mode and channel of the clients it associates. 802.11 Authentication Mode: Select which mode the Adapter uses to authenticate to an access point: • Auto - Automatic causes the adapter to attempt authentication using shared, but switches it to open authentication if shared fails. • Open - Open System enables an adapter to attempt authentication regardless of its WEP settings. It will only associate with the access point if the WEP keys on both the adapter and the access point match. • Shared - Shared-key only allows the adapter to associate with access points that have the same WEP key. For infrastructure (access point) networks, click Preferred APs… to specify four access points at most to the client adapter that attempts to be associated to the access points. The four access points have different priorities; the frontal has the higher priority. Figure 3-7 3.2.2 Remove a profile 1. Go to the Profile Management tab (shown in Figure 3-2). 2. Select the profile name in the Profiles List. 3. Click Remove.,
Note:The profile being used can’t be removed. 3.2.3 Switch another Profile 1. Go to the Profile Management screen (shown in Figure 3-2). 2. Select the profile name required in the Profiles List. 3. Click Activate. 3.2.4 Export a Profile 1. From the Profile Management screen (shown in Figure 3-2), highlight the profile to export. 2. Click Export…, the Export Profile window will then appear below. 3. Browse the directory to export the profile to. 4. Click Save. The profile should then be exported to the specified location. Figure 3-8 3.2.5 Import a Profile 1. From the Profile Management screen (shown in Figure 3-2), click Import…. Then the Import Profile will appear below. 2. Browse to the directory where the profile is located. 3. Highlight the profile name. 4. Click Open, the imported profile will then appear in the Profiles List., Figure 3-9 3.2.6 Scan Available Networks 1. Click Scan on the Profile Management screen (shown in Figure 3-2), the Available Infrastructure and Ad Hoc Networks window will appear below. 2. Click Refresh to refresh the list at any time. 3. Highlight a network name and click Activate to connect to an available network. If no configuration profile exists for that network, the Profile Management window will open the General tab screen. Fill in the Profile name and click OK to create the configuration profile for that network. Figure 3-10 3.2.7 Auto Profile Selection Management The auto selection feature allows the adapter to automatically select a profile from the list of profiles and use it to connect to the network. To add a new profile into the Auto Selected Profiles list, please follow these steps., 1. On the Profile Management screen (shown in Figure 3-2), click Order Profiles…. 2. The Auto Profiles Selection management window will appear (shown in Figure 3-11) with a list of all created profiles in the Available Profiles. Figure 3-11 3. Highlight the profiles to add to auto profile selection, and click Add. The profile will appear in the Auto Selected Profiles box. 4. Highlight a profile in the Auto Selected Profiles box. 5. Click Move Up or Move Down as appropriate.
Note:The first profile in the Auto Selected Profiles box has highest priority, while the last profile has the lowest priority. 6. Click OK. 7. Check the Auto Select Profiles checkbox on the Profile Management tab (shown in Figure 3-2).
Note:When auto profile selection is enabled by checking Auto Select Profiles on the Profile Management tab, the client adapter will scan for an available network. The profile with the highest priority and the same SSID as one of the found networks will be used to connect to the network. If the connection fails, the client adapter will try the next highest priority profile that matches the SSID until an available network is found., 3.3 Diagnostics The Diagnostics tab of the TP-LINK Wireless Client Utility (TWCU) provides buttons used to retrieve receiving and transmitting statistics. The Diagnostics tab does not require any configuration. The Diagnostics tab lists the following receiving and transmitting diagnostics for frames received or transmitted by the wireless network adapter: Multicast frames transmitted and received Broadcast frames transmitted and received Unicast frames transmitted and received Total bytes transmitted and received Figure 3-12 3.3.1 Check Driver Information Click the Adapter Information button in the screen above, you will see the adapter information, including general information about the wireless network adapter and the Network Driver Interface Specification (NDIS) driver. Access the adapter information from the Diagnostics tab. Card Name - The name of the wireless network adapter. MAC Address - The MAC address of the wireless network adapter. Driver - The driver name and path of the wireless network adapter driver. Driver Version - The version of the wireless network adapter driver. Driver Date - The creation date of the wireless network adapter driver., Client Name - The name of the client computer. 3.3.2 Check Receive and Transmit Statistical Information The Advanced Statistics show receiving and transmitting statistical information about the following receiving and transmitting diagnostics for frames received by or transmitted to the wireless network adapter. Figure 3-13,
Chapter 4. QSS configurationQSS (Quick Secure Setup) function allows you to add a new wireless device to an existing network quickly. If the wireless card supports Wi-Fi Protected Setup (WPS), you can establish a wireless connection between wireless card and router using either Push Button Configuration (PBC) method or PIN method. First, the QSS software should be installed. Insert the Resource CD into your CD-ROM drive, and the Figure 4-2 will appear. To continue, select the TL-WN721N.There will be a menu including: Install Driver & Utility, Install QSS and User Guide. Figure 4-1 Next, select Install QSS to load the following screen., Figure 4-2 Then, please follow the clue of the Operation System to complete the QSS installation. After that, QSS function can be enabled. Here we will introduce two ways to configure the QSS (For the configuration of QSS, here takes the Wireless Router of our company for example). 4.1 PBC (Push Button Configuration) method 1. Firstly, press the QSS button of the router. There are two ways: 1) Press the QSS button directly on the front panel of the Router shown in Figure 4-3. Figure 4-3 2) Open the Router’s Web-based Utility and click QSS link on the left of the main menu. Then Figure 4-4 will appear. Click Add device, then you can see Figure 4-5. Select Press the button of the new device in two minutes and click Connect., Figure 4-4 Figure 4-5 2. Secondly, press the QSS button of the adapter. There are two ways: 1) Press and hold the QSS button of the adapter directly for 2 or 3 seconds. Figure 4-6 2) Double click the icon on the desktop to open the QSS Utility and then you can see the welcome screen shown as Figure 4-7. Click Next to continue. Then select Push the button on my access point in the next screen shown in Figure 4-8 and click Next., Figure 4-7 Figure 4-8 3. Then wait a minute until Figure 4-9 appears. Click Finish to complete the QSS configuration., Figure 4-9 4.2 PIN method There are two ways to configure the QSS by PIN method: 1) Enter a PIN into your AP device. 2) Enter the PIN from your AP device. Following are the detailed configuration procedure of each way. 4.2.1 Enter a PIN into your AP device 1. Double click the icon on the desktop to open the QSS Utility and then you can see the welcome screen shown as Figure 4-7 Click Next to continue. Figure 4-10 will appear. Select the second option, and you will see the PIN value of the adapter which is randomly generated. Click Next., Figure 4-10 2. Open the Router’s Web-based Utility and click QSS link on the left of the main menu. Then Figure 4-4 will appear. Click Add device, then you can see Figure 4-10 Select Enter the new device’s PIN and enter the PIN value of the adapter shown in Figure 4-10, click Connect. Figure 4-10 3. When Figure 4-9 appears, the QSS configuration is complete. 4.2.2 Enter the PIN from your AP device 1. Open the QSS Utility and you will see Figure 4-7 . Click Next to continue. Then Figure 4-11will appear. Select the third option and enter the PIN value which is labeled on the bottom of the Router. Click Next., Figure 4-11 2. When Figure 4-9 appears, the QSS configuration is complete.
Note:If you generate a new PIN code for your Router, please enter the new one instead.,
Appendix A: SpecificationsNormal Interface USB 2.0 Interface Standards IEEE802.11g; IEEE802.11b; Operating System Windows 2000/ Windows XP/ Windows Vista 11b：1/2/5.5/11Mbps Radio Data Rate 11g：6/9/12/18/24/36/48/54Mbps 11b:CCK,QPSK,BPSK; Modulation 11g:OFDM; Media Access Protocol CSMA/CA with ACK Data Security WPA/WPA2; 64/128-bit WEP; TKIP/AES Frequency 2.4 ~ 2.4835GHz Spread Spectrum Direct Sequence Spread Spectrum (DSSS) Safety & Emissions FCC, CE Environmental and Physical Operating Temp. 0℃~40℃ (32℉~104℉) Storage Temp. -40℃– 70℃ (-40℉~158℉) Working Humidity 10% - 90% RH, Non-condensing Storage Humidity 5% - 90% RH, Non-condensing,
Appendix B: Glossary802.11b - The 802.11b standard specifies a wireless product networking at 11 Mbps using direct-sequence spread-spectrum (DSSS) technology and operating in the unlicensed radio spectrum at 2.4GHz, and WEP encryption for security. 802.11b networks are also referred to as Wi-Fi networks. 802.11g - specification for wireless networking at 54 Mbps using direct-sequence spread-spectrum (DSSS) technology, using OFDM modulation and operating in the unlicensed radio spectrum at 2.4GHz, and backward compatibility with IEEE 802.11b devices, and WEP encryption for security. Ad-hoc Network - An ad-hoc network is a group of computers, each with a Wireless Adapter, connected as an independent 802.11 wireless LAN. Ad-hoc wireless computers operate on a peer-to-peer basis, communicating directly with each other without the use of an access point. Ad-hoc mode is also referred to as an Independent Basic Service Set (IBSS) or as peer-to-peer mode, and is useful at a departmental scale or SOHO operation. DSSS - (Direct-Sequence Spread Spectrum) - DSSS generates a redundant bit pattern for all data transmitted. This bit pattern is called a chip (or chipping code). Even if one or more bits in the chip are damaged during transmission, statistical techniques embedded in the receiver can recover the original data without the need of retransmission. To an unintended receiver, DSSS appears as low power wideband noise and is rejected (ignored) by most narrowband receivers. However, to an intended receiver (i.e. another wireless LAN endpoint), the DSSS signal is recognized as the only valid signal, and interference is inherently rejected (ignored). FHSS - (Frequency Hopping Spread Spectrum) - FHSS continuously changes (hops) the carrier frequency of a conventional carrier several times per second according to a pseudo-random set of channels. Because a fixed frequency is not used, and only the transmitter and receiver know the hop patterns, interception of FHSS is extremely difficult. Infrastructure Network - An infrastructure network is a group of computers or other devices, each with a Wireless Adapter, connected as an 802.11 wireless LAN. In infrastructure mode, the wireless devices communicate with each other and to a wired network by first going through an access point. An infrastructure wireless network connected to a wired network is referred to as a Basic Service Set (BSS). A set of two or more BSS in a single network is referred to as an Extended Service Set (ESS). Infrastructure mode is useful at a corporation scale, or when it is necessary to connect the wired and wireless networks. Spread Spectrum - Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communications systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband transmission, but the trade off produces a signal that is, in effect, louder and thus easier to detect, provided that the receiver knows the parameters of the spread-spectrum signal being broadcast. If a receiver is not tuned to the right frequency, a spread-spectrum signal looks like background noise. There are two main alternatives, Direct Sequence Spread Spectrum (DSSS) and Frequency, Hopping Spread Spectrum (FHSS). SSID - A Service Set Identification is a thirty-two character (maximum) alphanumeric key identifying a wireless local area network. For the wireless devices in a network to communicate with each other, all devices must be configured with the same SSID. This is typically the configuration parameter for a wireless PC card. It corresponds to the ESSID in the wireless Access Point and to the wireless network name. See also Wireless Network Name and ESSID. WEP - (Wired Equivalent Privacy) - A data privacy mechanism based on a 64-bit or 128-bit or 152-bit shared key algorithm, as described in the IEEE 802.11 standard. To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When using WEP, you must determine the level of encryption. The type of encryption determines the key length. 128-bit encryption requires a longer key than 64-bit encryption. Keys are defined by entering in a string in HEX (hexadecimal - using characters 0-9, A-F) or ASCII (American Standard Code for Information Interchange – alphanumeric characters) format. ASCII format is provided so you can enter a string that is easier to remember. The ASCII string is converted to HEX for use over the network. Four keys can be defined so that you can change keys easily. Wi-Fi - A trade name for the 802.11b wireless networking standard, given by the Wireless Ethernet Compatibility Alliance (WECA, see http://www.wi-fi.net), an industry standards group promoting interoperability among 802.11b devices. WLAN - (Wireless Local Area Network) - A group of computers and associated devices communicate with each other wirelessly, which network serving users are limited in a local area. WPA - (Wi-Fi Protected Access) - A wireless security protocol use TKIP (Temporal Key Integrity Protocol) encryption, which can be used in conjunction with a RADIUS server.]
Modern LiteraryTheory and Ancient Texts An Introduction Thomas A. Schmitz Modern LiteraryTheory and Ancient Texts Modern LiteraryTheory and Ancient Texts An Introduction Thomas A. Schmitz © 2002 byWissenschaftliche Buchgesellschaft, Darmstadt Translation © 2007 byThomas A. Schmitz BLACKWELL PUBLISHI
2007 Year End Chart “Hot 100 Songs” Issue Date: 2007 (http://www.billboard.biz/bbbiz/charts/yearendcharts/chart_display.jsp?f=Hot+100+Songs&g=Year-end+Singles)
2007 Year End Chart “Hot 100 Songs” Issue Date: 2007 (http://www.billboard.biz/bbbiz/charts/yearendcharts/chart_display.jsp?f=Hot+100+Songs&g=Year-end+Singles) # Title Artist Labels 1 IRREPLACEABLE Beyonce Columbia 2 UMBRELLA Rihanna Featuring Jay-Z SRP/Def Jam/IDJMG 3 THE SWEET ESCAPE Gwen Stefani
Setup Instructions for eHome Infrared Receiver for PC’s running under Microsoft® Windows XP Media Center Edition
Setup Instructions for eHome Infrared Receiver for PC’s running under Microsoft® Windows XP Media Center Edition These instructions work for Microsoft Windows XP Media Center Edition 2005 or higher releases only. Setup one: Please do the following updates before installing the remote control receive
TORADORA LIGHT NOVEL README This is a single-man effort with the goal of easy viewing and portability. All translations are done by the Baka-Tsuki Translation Group. I DID NOT TRANSLATE ANY PART OF THIS NOVEL No tangible profit shall be made from this release. Anyone who paid to receive this have be
Lead-in 1 Discuss. r Whatc any ous eei n thep hotos? z Whicho f thep tacews ouldy oum ostl iket o exptoreW? hy? 2 Listena nda nswerth eseq uest ions. r Whatg avet hes peaketrh ei deat o travel? z Whyd ids heg ot o Spa in? 3 Howd ids hef eelw hens hef i rstg ott o GuatemalaW?h v? 4 Howd ids hef eell
TORADORA LIGHT NOVEL README This is a single-man effort with the goal of easy viewing and portability. All translations are done by the Baka-Tsuki Translation Group. I DID NOT TRANSLATE ANY PART OF THIS NOVEL No tangible profit shall be made from this release. Anyone who paid to receive this have be
Mark Foley LESs SON1 .1j (pa-5) LE550N4. 1 @2a-29) R€adingT:h eF i ;E.rsr rreromeron Reading-i:h :l : - : : : . : !or i Writing:r oies -.ss.ges Grarnmal,r':s : ' , . : -_. : : l Grammacr-: r . i : . : . iagsWritinsk:e e :- .: : - , Pronunciat io: :n-.:r ai ioni nq uest iotna gs LESSO4N. 2 03o-31) LE
Corolla Verso LHD Toyota Parking Aid 800 Installation instructions Model year: 2004 Vehicle code: **R1**-G****W Part number: PZ464-00425-00 PZ464-00421-** PZ464-00420-55 Weight: Main Kit 1 1.9 kg Sensor Kit 0.3 kg Installation time: 3.25 hours Manual reference number: AIM 000 309-0 Revision Record R
Section 1 TOYOTA CULTURE Toyota Toyota, from its beginning to the present, has followed its original goal of continuous improvements. Learning Objectives: 1. Upun completing Toyota Culture, you will be able to: • Recognize how Toyota’s history contributes to its current success. • Identify the funct
Tracklist - GDC #GameAudio Bundle - www.sonniss.com Alexander Kopeikin - Moscow Ambience: http://www.sonniss.com/sound-effects/moscow-alexander-kopeikin/ ambience detail, renewal works in old tenant building, changing floor tiles, ORTF stereo.wav crowd, concert hall lobby, stand-up party, people tal
Information ACDEFG Trademarks Trademarks OT_Essentials3 Amelia, Arnold Boecklin, Linotype Ergo, Linotype Gothic, Omnia, Tips and Linotype Typo American are trademarks of Linotype GmbH and may be registered in certain jurisdictions. Linotype, Linotype Library, PMN Caecilia, Industria and Insignia are
Manual Disclaimer The information in this document is subject to change without notice and does not represent a commitment on the part of Native Instruments GmbH. The software described by this docu- ment is subject to a License Agreement and may not be copied to other media. No part of this publica
Compilation realized by the redaction team of the musical webzine Trip-Hop.net Compilation réalisée par la rédaction du webzine musical Trip-Hop.net The year 2013 was rich not only for discovering new artists but also for listening new albums from famous and well-known musicians. In order to share t
Tube 2 User Guide From Visual IT www.visualit.co.uk Overview Tube 2 is an application that assists you to use the metro, subway or underground transport system in many cities throughout the world. Tube 2 allows the user to view and scroll around a map, locate any station, plan a journey by selecting
TEAMSPEAK 3 SERVERQUERY MANUAL (2013‐09‐20) COPYRIGHT ©2009‐2013 TEAMSPEAK SYSTEMS GMBH CONTENT Content _1 Introduction _4 How to Establish a ServerQuery Connection_4Command Syntax _4 Summary of Command Syntax_4Examples of Command Syntax_4Escaping_5 Whitelisting and Blacklisting _6 How to Use the Wh
QUICK TROUBLESHOOTING FAQ - Just to let you know... - Kyodai Mahjongg was created and tested on a lot of different configurations, using Windows 95, 98, Me, 2000 and XP. We didn't experience any problem, and when we did, the bugs were fixed quickly. I believe KMJ to be safe to use. If you ever have
U.S. Army Marksmanship Unit Pistol Marksmanship Training Guide Here is the coveted Pistol Marksmanship Training Guide published by the Army Marksmanship
U.S. Army Marksmanship Unit Pistol Marksmanship Training Guide Here is the coveted Pistol Marksmanship Training Guide published by the Army Marksmanship Unit at Fort Benning, Georgia. It is an excellent source of information for the competitive pistol shooter. Because it is a U.S. government publica
D.2.i (Database Talk) [Writing Clean and Safe UDFs in Delphi] Writing clean and safe UDFs in Delphi Gregory H. Deatz Introduction This article makes some assumptions about the reader's knowledge of Delphi. The reader should understand Delphi well enough to know how to create a DLL-We will demonstrat
Ubuntu Installation Guide Ubuntu Installation Guide Copyright © 2004 – 2015 the Debian Installer team Copyright © 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2015 Canonical Ltd. This document contains installation instructions for the Ubuntu 16.04 system (codename “‘Xenial Xerus’”), for the 64-bit PC
Ubuntu Installation Guide Ubuntu Installation Guide Copyright © 2004 – 2015 the Debian Installer team Copyright © 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2015 Canonical Ltd. This document contains installation instructions for the Ubuntu 16.04 system (codename “‘Xenial Xerus’”), for the 32-bit PC
Ultra Focus installation in Cubase SX (Mac OS X) Ultra Focus is provided on a Double-sided DVD («flipper») The first side figures the install files, and the first «.DAT» file (native UVI Format Soundbank) when the second one includes the second «.DAT» file. You need to copy first the «Ultra Focus fo
I found this text on the web, it is quite long but please read all of it. Only you can decide for yourself if you want to believe or not. (Original text) *************************************************************** THE FOLLOWING .DOC IS A CONGLOMERATION OF VARIOUS TEXT FILES, SOME CLASSIFIED TOP
U.C.C. - ARTICLE 9 - SECURED TRANSACTIONS (1998 revision with 2001 and 2003 amendments) Copyright 1998, 2001, 2003 by The American Law Institute and the National Conference of Commissioners on Uniform State Laws; reproduced, published and distributed with the permission of the Permanent Editorial Bo
.: THE LOST VALE Sheri Graner Character List Version 1.0 (~ 05/17/94 Character List for the Lost Vale Because of the scarcity of water, the infertility of the land and the difficulty of finding food, people are too busy trying to survive to engage in other means of vocation. Ezrekal - SHERI Group On
BD205 Ultimate Power – Unlock the Power of Hive! Disclaimer 3 Introduction 4 Installation 5 Features 6 Tips for use Patch List 7 Biome Digital 10
Приложение Использование UNIX как контроллера домена Задача данного приложения — дать слушателю практическое понимание специфики реализации домена средствами UNIX (Linux/FreeBSD). Настройка стенда Выведите WinXP из домена corpX.un и перегрузите виртуальную машину. На контроллере домена (Windows 2003
Файловые сервисы UNIX для пользователей Windows Установка FreeBSD [gate:~]# pkg_add r samba3 [gate:~]# cat /etc/rc.conf … nmbd_enable="YES" smbd_enable="YES" winbindd_enable="NO" … [gate:~]# rehash [gate:~]# cd /usr/local/etc/ Ubuntu root@gate:~# aptget install samba root@gate:~# cd /etc/samba/ Пу
Two Stops Then USA for Roger Waters Tour 2012 Apr 22 2012 Roger Waters It seems like an eternity since Roger Waters performed The Wall Live Concert on his 2012 tour! The band, tour crew and Roger have been having a nice rest since performing on 1st April 2012 at Estádio do Morumbi in Sao Paulo, Braz
Justice at Nuremberg Leo Alexander and the Nazi Doctors’ Trial Ulf Schmidt St Antony’s Series General Editor: Richard Clogg (1999–), Fellow of St Antony’s College, Oxford Recent titles include: Ulf Schmidt JUSTICE AT NUREMBERG Leo Alexander and the Nazi Doctors’ Trial Steve Tsang (editor) PEACE AND
AUTODESK SOFTWARE LICENCE AGREEMENT UNITED KINGDOM IMPORTANT, PLEASE READ THIS FIRST. THIS IS A LICENCE AGREEMENT.
AUTODESK SOFTWARE LICENCE AGREEMENT UNITED KINGDOM IMPORTANT, PLEASE READ THIS FIRST. THIS IS A LICENCE AGREEMENT. AUTODESK IS WILLING TO LICENSE THE ACCOMPANYING SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENCE AGREEMENT AND ANY SUPPLEMENTARY OR UNI