Planet WL-U357 [5/35] Chapter 1 introduction
![Planet WL-U357 [5/35] Chapter 1 introduction](/views2/1071288/page5/bg5.png)
Chapter 1 Introduction
Complying with the IEEE 802.11g standard, WL-U357 provides simple, reliable, high-speed wireless
connectivity for both desktop and laptop users. By combining two, state-of-the-art technologies—USB 2.0
and Super G— WL-U357 provides up to 108Mbps data rate in 2.4GHz unlicensed ISM band. Thus
makes WL-U357 more suitable for multimedia applications which required more bandwidth
Support of 64, 128 and 152-bit WEP encryption plus WPA (Wi-Fi Protected Access) high-level encryption
prevents your wireless communications from unauthorized access and ensures secure data transfer. The
WL-U357 is also backward compatible with 802.11b Access Points. Easy installation and Hot-plugging
offers full mobility and high availability, making the device a perfect choice for users who are getting tired
of running cables or in constant need of wireless access.
1.1 Features
2.4GHz ISM band, unlicensed operation
Wireless connectivity without the hassles and cost of running cables
IEEE 802.11b/g standard compliant
USB 2.0 A-type standard connector, compatible with USB 1.1
Super G mode provides up to 108Mbps data rate
Utilization of Direct Sequence Spread Spectrum plus OFDM modulation to provide robust,
interference-resistant solution in a multi-user environment
Support of 64/128/152-bit WEP encryption and WPA (Wi-Fi Protected Access) high-level
encryption
Support of Ad-Hoc / Infrastructure mode
Support of most popular operating systems including Windows 98SE/ME/2000/XP/Server
2003
Plug-and -Play installation
1.2 Application
Infrastructure
The major difference between Infrastructure network and Ad-hoc wireless network is that the former
requires an Access point. For old buildings, open areas, or frequently changing environments, just install
the WL-U357 on your desktop or laptop, and thus you can get connected to the wired Ethernet through a
wireless Access Point. SOHO users can then access the Internet and share all kinds of data with the
other wired or wireless clients within the coverage of wireless signals. For enterprise users, the
installation of multiple Access Points to enlarge the coverage of wireless signals can provide wireless
users with seamless network access.
The Infrastructure mode is appropriate for enterprise-scale wireless access to a central database or
provides various wireless applications for mobile users.
Infrastructure mode also supports roaming capabilities for mobile users. More than one BSS can be
configured as an Extended Service Set (ESS). The continuous wireless network connectivity allows
users to roam freely within an ESS. All wireless clients using WL-U357 or other IEEE 802.11b compliant
wireless adapters within one ESS must be configured with the same ESS ID and to use the same radio
1
Содержание
- Copyright 2
- Fcc caution 2
- Federal communication commission interference statement 2
- Federal communication commission fcc radiation exposure statement 3
- Revision 3
- Safety 3
- Table of contents 4
- Application 5
- Chapter 1 introduction 5
- Features 5
- Infrastructure 5
- Ad hoc 6
- General application 6
- Specification 7
- Installation considerations 8
- Minimum system requirements 8
- Package contents 8
- Chapter 2 installation procedure 9
- Configuration utility driver installation 9
- Chapter 3 configuration utility 15
- Current status 15
- Authentication 16
- Data encryption displays the encryption type the adapter is using 16
- Displays the wireless network name 16
- Network name 16
- Server based 16
- Shows whether server based authentication is used 16
- Menu bar 18
- Add a profile 19
- General tab 19
- Profile management 19
- Security tab 20
- Activate the profile 21
- Choose eap tls from the drop down menu 21
- Choose eap ttls from the drop down menu 21
- Click the configure button 21
- Name are filled in automatically from the certificate information click ok 21
- On the security tab choose the wpa radio button 21
- Onto it check with the it manager 21
- Or on the security tab choose the 802 x radio button 21
- Select the appropriate certificate authority from the list the server domain name and the login 21
- To use eap ttls security the machine must already have the eap ttls certificates downloaded 21
- Using eap ttls security 21
- Advanced tab 28
- Modify a profile 29
- Remove a profile 29
- Export a profile 30
- Import a profile 30
- Scan for available networks 30
- Switch profiles 30
- Auto profile selection management 31
- Diagnostics 32
- Chapter 4 troubleshooting 34
Похожие устройства
- Samsung NP-305U1A-A05RU Инструкция по эксплуатации
- Ariston C34S M57 Инструкция по эксплуатации
- Planet WNAP-1120 Инструкция по эксплуатации
- Samsung NP300E5A-S0S Инструкция по эксплуатации
- Planet WNAP-1120PE Инструкция по эксплуатации
- Ariston CG64SG37 Инструкция по эксплуатации
- Toshiba Satellite C850-B6W Инструкция по эксплуатации
- Ariston C34SG37 Инструкция по эксплуатации
- Planet WNL-9320 Инструкция по эксплуатации
- Toshiba Satellite C660-A5K Инструкция по эксплуатации
- Ariston CE6V M37 Инструкция по эксплуатации
- Planet WNL-9330 Инструкция по эксплуатации
- Lenovo Idea Pad G570A 59329791 Инструкция по эксплуатации
- Ariston CP65SG1 Инструкция по эксплуатации
- Planet WNL-9500 Инструкция по эксплуатации
- HP Pavilion g6-2000er Инструкция по эксплуатации
- Ariston CM5 GS16 Инструкция по эксплуатации
- Planet WNL-U553 Инструкция по эксплуатации
- Samsung NP-300U1A-A0BRU Инструкция по эксплуатации
- Ariston CP98SEA Инструкция по эксплуатации