ENCORE ENTRWI-G manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of ENCORE ENTRWI-G, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of ENCORE ENTRWI-G one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of ENCORE ENTRWI-G. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of ENCORE ENTRWI-G should contain:
- informations concerning technical data of ENCORE ENTRWI-G
- name of the manufacturer and a year of construction of the ENCORE ENTRWI-G item
- rules of operation, control and maintenance of the ENCORE ENTRWI-G item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of ENCORE ENTRWI-G alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of ENCORE ENTRWI-G, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the ENCORE service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of ENCORE ENTRWI-G.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the ENCORE ENTRWI-G item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    54Mbp s Wireless LAN Pocket Access Point USER MANUAL[...]

  • Page 2

    Content s 1. Overview .................................................................................................... 1 1.1 Product Feature ................................................................................ 1 1.2 System Requirements ...................................................................... 1 1.3 How to switch within [...]

  • Page 3

    7.1 LAN Setting .................................................................................... 41 7.1.1 LAN & DHCP Server ............................................................ 41 7.1.2 WA N ..................................................................................... 42 7.1.3 Password .......................................[...]

  • Page 4

    1. Overview 1.1 Product Feature ● 3-in-1 function build-in with easily accessible hot-key switch, including Access Point, Access Point Client and Wireless Router. It’s also the smallest networking device in the market. ● Low power consumption <less than 460 mA>, and support USB power adapter which provides the best mobility. ● Complia[...]

  • Page 5

    2. Getting S t art with Access Point 2.1 Know the 54Mbp s W ireless Network Access Point Port s: ● Power Receptor ● Reset Button ● RJ-45 Ethernet Port Cross-over cable is required to connect to computer directly LEDs: ● Power LED: ON when the unit is powered up ● LAN LED: ON indicates LAN connecti on; BLINK indicates LAN activity ● WLAN[...]

  • Page 6

    In order to setup an Infrastructure of a wireless network such as the example shown above, user will need the following: 1. A broadband Internet connection. 2. ADSL or Cable modem provided by ISP as par t of the broadband connection installation. 3. A Router that connects to the AD SL/Cable modem for Internet connection sharing. 4. An Access Point [...]

  • Page 7

    Now, the main menu screen is popup. 2.3.2 Setup with Wizard Setup wizard is provided as the part of the web configur ation utility. User can simply follow the step-by-step process to get Access Point configuration ready to run in 4 easy steps by clicking on the “ Wizard ” button on the function menu. The following screen will appear. Please cli[...]

  • Page 8

    Step 1: Set Password User can change the password and then click “ Next” to continue. Step2: Set WLAN Connection Please type the name of SSID and sele ct the channel. Then, click “ Next ” to continue. 5[...]

  • Page 9

    Step 3: Set Wireless LAN Connection If user doesn’t want to use “default” as the SSID, user can change SSID here. User can also choose different channel to avoid noise coming from other wireless networking devices. Please click “ Next” to continue. Step 4: Set WEP Encryption If user wants to enable WEP, please click “ Enabled ”. Then,[...]

  • Page 10

    Step 5: Restart The Setup wizard is now completed. The new settings will be effective after the Access Point restarted. Please click “ Restart ” to reboot the Access Point. If user does not want to make any changes, please click “ exit ” to quit without any changes. User also can go back to modify the setting by clicking “ Back ”. 7[...]

  • Page 11

    3. Configuration Access Point through WEB Browser 3.1 S t atus This page as below shows the following information. Firmware Version: Shows the current firmware version. LAN: Shows the Mac address, IP address ( default: 192.168.1.1), Subnet Mask, Gateway Address. The curr ent LAN traffic calculated in terms of number of packets sent and received by [...]

  • Page 12

    View Log: Once clicked, the page will change to login page. The login page records every event and the time that it happens. User may clear the entries recor ded in the log by clicking the “ Clear Log ” button, and refresh the screen to show the late st log entries by clicking the “ Refresh ” button. 9[...]

  • Page 13

    3.2 Basic Setting This is the page allow user to change the access point settings. AP Name: The name of the AP, wh ich can be used to identify the Access Point among the all the Access Points in the wireless network. SSID: Service Set Identifier, which is a unique name shared among all clients and nodes in a wireless network. The SSI D must be iden[...]

  • Page 14

    WEP Key: To disable WEP security, click on the “Disable” option. To enable WEP security, there are 2 types to sele ct – 64bits and 128 bits. When it is selected, the key value must be entered in ASCII or HEX format. Note: When WEP security is enabled, all the wireless clients that wish to connect to the Access Point must al so have WEP enable[...]

  • Page 15

    3.3 IP Setting This page allows user to configure the IP and DHCP settings of the Access Point. The default IP address of this access point is 192.168.1.1 with the subnet mask of 255.255.255.0. User can type in other values for IP Address, Subnet Mask and Gateway and click “ Apply ” button for the changes to be effective. User can also set the [...]

  • Page 16

    DHCP Server: It is not recommended to enable t he DHCP Server if user has a DHCP server running in LAN network because it probably will cause possible the conflict of IP assignment. Enable the DHCP server function by selecting the option “ On ”, and enter the IP range. IP range : When user set the IP range that Client can get t he IP in the ran[...]

  • Page 17

    RTS Threshold: To set the size of RTS/CTS packet size. Default is 2432 bytes. Fragmentation Threshold : To set the number of bytes used for the fragmentation boundary for directed messages. Default is 2436 bytes. DTIM Interval: This value indicates the interval of the Delivery Traffic Indication Message (DTIM). A DTIM field is a c ountdown field in[...]

  • Page 18

    3.5 Security This page is where user c onfigures the security fe atures supported by this Access Point. Password: Allow user to change the new login password. Here are the necessary steps: 1. Enter the new password in the “ AP Password New : ” field. 2. Enter the new password again in the “ Confirm ” field. 3. Click “ Apply ” 15[...]

  • Page 19

    MAC Filter: MAC Filter function controls the MAC of the network devices that are listed in this table for access author ization or denial. When MAC Filter is enabled, by selecting the “ Enabled ” radio box, select one of two choices: ● Only deny PCs with MAC listed below to access device ● Only allow PCs with MAC listed below to access devi[...]

  • Page 20

    Backup Settings: Click on “ Backup ” button, which will ope n a FileSave Dialog box, where user gets to save all the curr ent settings and configurations to a file. Restore Settings: Click on the “ Brow se ” button to open a FileOpen Dialog box, where user gets to select the file, which saves previous settings and configurations. Upon selec[...]

  • Page 21

    4. Getting S t art with W ireless Ethernet Adapter 4.1 Know the Wireless Ethernet Adapter Port s: ● Power Receptor ● Reset Button ● RJ-45 Ethernet Port Cross-over cable is required to connect to computer directly LEDs: ● Power LED: ON when the unit is powered up ● LAN LED: ON indicates LAN connecti on; BLINK indicates LAN activity ● WLA[...]

  • Page 22

    Ad-Hoc Mode: 4.2.1 Access the Setting Menu User could start to access the confi guration menu anytime by opening a web browser window by typing the IP address of this access point. The default IP is 192.168.1.50 . The below window will popup. Please enter the user name and password. Both of the default is “admin”. 19[...]

  • Page 23

    Now, the main menu screen is popup. 20[...]

  • Page 24

    4.2.2 Setup with Wizard Setup wizard is provided as the part of the web configur ation utility. User can simply follow the step-by-step process to get Access Point configuration ready to run in 4 easy steps by clicking on the “ Wizard ” button on the function menu. The following screen will appear. Please click “ Next ” to continue. Step 1:[...]

  • Page 25

    Step2: Set WLAN Connection Please type the name of SSID and select the channel. Click “ Next ” to continue. Step 3: Set Wireless LAN Connection IF user doesn’t want to use “default” as the SSID, user can change SSID here. Also user can choose different channel to avoid noise coming from other wireless networking devices. Please click “ [...]

  • Page 26

    Step 4: Set WEP Encryption If user wants to enable WEP, please click “ Enabled ”. Then, select the key size of WEP encryption and enter the key value in the key text box. Click “ Next” to continue. Step 5: Restart The Setup wizard is now completed. The new settings will be effective after the Access Point restarted. Please click “ Restart[...]

  • Page 27

    5. Configuration Wireless Ethernet Adapter through WEB Browser 5.1 St atus This page as below shows the following information. Firmware Version: Shows the current firmware version. LAN: Shows the Mac address, IP address (default: 192.168.1.50), Subnet Mask, Gateway Address. The current LAN tra ffic calculated in terms of number of packets sent and [...]

  • Page 28

    User may clear the entries recor ded in the log by clicking the “ Clear Log ” button, and refresh the screen to show the la test log entries by clicking “ Refresh ” button. 5.2 Basic Setting This is the page allow to change the settings of access point. 25[...]

  • Page 29

    AP Name: The name of the AP, wh ich can be used to identify the Access Point among the all the Access Points in the wireless network. SSID: Service Set Identifier, which is a unique name shared among all clients and nodes in a wireless network. The SSID must be identical for each clients and nodes in the wireless network. Channel: The channel that [...]

  • Page 30

    If WPA-PSK is enabled, users need to set the key in the passphrase field as the below screen. The key length should be 8 characters at least. Note: Once WP A-PSK function enables, it will t ake some time to make the setting active. 27[...]

  • Page 31

    5.3 IP Setting This page allows users to configure the IP and DHCP settings of the Access Point. The default IP address of this Wireless Ethernet Adapter is 192.168.1.50 with the subnet mask of 255.255.25 5.0. User can type in other values for IP Address, Subnet Mask and Gateway and click “ Apply ” button for the changes to be effective. User c[...]

  • Page 32

    5.4 Advanced Setting This page contains configur ations for advanced users, which the change reflects, the wireless performance and operating modes. Beacon Interval: To set the period of time in m illiseconds that AP sends out a beacon. Default is 100 milliseconds. RTS Threshold: To set the size of RTS/CTS packet size. Default is 2432 bytes. Fragme[...]

  • Page 33

    Preamble: Select Long or Short Preamble type. Preamble is a sequence of bits transmitted at 1Mbps that allows the PHY circuitry to reach steady-state demodulation and synchronization of bit cl ock and frame start. Two different preambles and headers are defined: t he mandatory supported Long Preamble and header, which interoperates with the 1 Mbit/[...]

  • Page 34

    5.6 T ools Four functions are provided in this page, Backup, Restore Settings, Restore default settings and Firmware Upgrade. Backup Settings: Click on “ Backup ” button, which will ope n a FileSave Dialog box, where gets to save all the current settings and configurations to a file. Restore Settings: Click on the “ Brow se ” button to open[...]

  • Page 35

    6. Getting S t art with Wireless Router 6.1 Know the 802.1 1g W ireless Router Port s: ● Power Receptor ● Reset Button ● RJ-45 Ethernet Port Cross-over cable is required to connect to computer directly ● There is no visual LAN port for Pocket AP . LEDs: ● Power LED: ON when the unit is powered up ● LAN LED: ON indicates LAN connecti on;[...]

  • Page 36

    The below window will popup. Please enter the user name and password. Both of the default is “admin”. Now, the main menu screen is popup. 33[...]

  • Page 37

    6.2.2 Quick Setup with Wizard Setup wizard is provided as the part of the web configur ation utility. User can simply follow the step-by-step process to get wireless router configuration ready to run in 6 easy steps by clicking on the “ Wizard ” button on the function menu. The following screen will appear. Please click “ Next ” to continue[...]

  • Page 38

    Step2: Choose time zone Select properly time zone from the drop down list. Please click “ Next” to continue. Step 3: Set LAN connection and DHCP server Set IP address and mask. The default IP is 192.168.1.1. If user likes to enable DHCP, please click “ Enabled ”. DHCP enabled is able to automatically assign IP addresses. Please assign the r[...]

  • Page 39

    Step 4: Set Internet connection Select how the router will set up the Internet connection: Obtained IP automatically; Fixed IP addr ess; PPPoE to obtain IP automatically; PPPoE with a fixed IP address; PPTP . Obt ain IP automatically (DHCP client) : If user wants to enabled DHCP server , choose " Obtain IP automat ically (DHCP client) " t[...]

  • Page 40

    If Fixed IP address is assigned, t he below screen will pop up. Please set the WAN address and DNS server. PPPoE to obtain IP automatically: 37[...]

  • Page 41

    PPPoE with a fixed IP address: 38[...]

  • Page 42

    PPTP: 39[...]

  • Page 43

    Step 5: Set Wireless LAN connection Click “ enable ” to enable wireless LAN. If user enables the wireless LAN, type the SSID in the text box and select a communications channel. The SSID and channel must be the same as wireless dev ices attempting communication to the router . Step 6: Restart The Setup wizard is now completed. The new settings [...]

  • Page 44

    7. Configuration Wireless Router through WEB Browser 7.1 LAN Setting The screen leads to configure the LAN & DHCP Server , set WAN p arameters, create Administrator and User passwords , and set the local time, time zone, and dynamic DNS. 7.1.1 LAN & DHCP Server This page enables to set LAN and DHCP pr operties, such as the host name, IP add[...]

  • Page 45

    DHCP Server: Enables the DHCP server to allo w the router to automatically assign IP addresses to devices connecti ng to the LAN. DHCP is enabled by default. All DHCP client computers are listed in the table at the bottom of the screen, providing the host name, IP addre ss, and MAC address of the client. Star t I P : T ype an IP address to serve as[...]

  • Page 46

    Connection T ype: Select the connection type, eit her DHCP client, Fixed IP or PPPoE from the drop-down list. W AN IP: Select whether to specify an IP address manually , or DHCP to obta in an IP address automatically . When “ S pecify IP ” is selected, type the IP address, subnet mask, and default gateway in the text boxes. ISP will provide thi[...]

  • Page 47

    7.1.4 T ime This screen leads to set the time and date fo r the router's real-t ime clock, select properly time zone, and enable or disable daylight saving. Local Time: Displays the local time and date. Time Zone: Select properly time z one from the drop-down list. Daylight Saving: Enable or disable daylight sa ving time. When enabled, select [...]

  • Page 48

    7.2 Wireless This section leads to set wireless comm unications parameters for the router's wireless LAN feature. 7.2.1 Basic This page allow to enable and disable the wireless LAN function, create a SSID, and select the channel for wireless communications. SSID: T ype an SSID in the text box. Th e SSID of any wireless device must match the SS[...]

  • Page 49

    7.2.2 WEP This screen leads to set authentication type for secure wireless communications. Open System allows publ ic access to the router via wireless communications. Shared Key requires the user to set a WEP key to exchange data with other wireless client s that have th e same WEP key . This router also supports WP A-PSK. Authentication Type: The[...]

  • Page 50

    If WP A-PSK is selected, please set the PSK ke y in the pass phrase field. The length should be 8 characters at least. Note: Once WP A-PSK function enables, it will t ake some time to make the setting active. 47[...]

  • Page 51

    7.2.3 Advanced This screen leads to configure advanced wireless functions. Beacon Interval: T ype the beacon interval in the text box. User can specify a value from 1 to 1000. The default beacon interval is 100. RTS Threshold: T ype the RTS (Request-T o-Send) threshold in the text box. This value stabilizes data flow . If data flow is irregular , c[...]

  • Page 52

    7.3 S t atus This selection leads to view the status of the router LAN, W AN connections, and view logs and statistics pert aining to connections and packet transfers. 7.3.1 Device Information This screen leads to view the router LAN, Wireless and W AN configuration. Firmware V ersion: Displays the latest build of the router firmware interface. Aft[...]

  • Page 53

    7.3.2 Log This screen leads to view a running log of router system st atistics, events, and activities. The log displays up to 200 entries. Older entries are overwritten by new entries. The Log screen commands are as follows: Click “ First Page ” to view the first page of the log Click “ Last Page ” to view the final page of the log Click ?[...]

  • Page 54

    7.3.3 Log Setting This screen leads to set router logging parameters. SMTP Server: T ype the SMTP server address fo r the email that the log will be sent to in the next field. Send to: T ype an email address for the log to be sent to. Click “ Email Log Now ” to immediately send the current log. Syslog Server: T ype the IP address of the Syslog [...]

  • Page 55

    7.3.4 S t atistic This screen displays a table that shows the rate of p acket transmission via the router LAN and W AN ports (in bytes per second). Click “ Reset ” to erase all statistics and begin logging statistics again. 52[...]

  • Page 56

    7.3.5 Wireless This screen leads to view information about wireless devices that are connected to the wireless router . Connected Time: How long the wireless device has been connected to the LAN via the router? MAC Address: Displays the devices wireles s LAN interface MAC address. 53[...]

  • Page 57

    7.4 Routing This selection leads to set how the rout er forwards data: S tatic and Dynamic. Routing T able enables user to view t he information created by the router that displays the network interconnection topology . 7.4.1 S t atic It enables user to set para meters by which the router forwards data to its destination if network has a static IP [...]

  • Page 58

    Add: Click to add the configur ation to the static IP address table at the bottom of the page. Up date: Select one of the entries in the stat ic IP address table at the bottom of the page and, af ter changing parameters, click “ Up date ” to confirm the changes. Delete: Select one of the entries in the stat ic IP address table at the bottom of [...]

  • Page 59

    7.4.3 Routing T able This screen leads to view the routing tabl e for the router . The routing table is a database created by the rout er that displays the network interconnection topology . Network Address: Displays the network IP address of the connected node. Network Mask: Displays the network (subnet) mask of the connected node. Gateway Address[...]

  • Page 60

    7.5 Access This page leads to define access restricti ons, set up protocol and IP filters, create virtual servers, define access for special applications such as games, and set firewall rules. 7.5.1 MAC Filters Allow or deny Internet access to users within the LA N based upon the MAC address of their network interface. Click the radio button next t[...]

  • Page 61

    MAC Address: T ype the MAC address of the user's network interface. Add: Click to add the user to the lis t at the bottom of the page. Up date: Click to update information for the user , if user has changed any of the fields. Delete: Select a user from the table at the bottom of the list and click “ Delete ” to remove the user profile. New[...]

  • Page 62

    7.5.3 IP Filter This screen leads to define a minimum and maximum IP address range filter; all IP addresses falling in the range are not allo wed Internet access. The IP filter profiles are listed in the table at the bottom of the p age. ( Note: Click anywhere in the item. Once the line is selected, t he fields automatically load the item's pa[...]

  • Page 63

    7.5.4 V irtual Server This screen leads to create a virtual server vi a the router . If the router is set as a virtual server , remote users requesting Web or FTP services through the W AN are directed to local servers in the LAN. The router redirect s the request via the protocol and port numbers to the correct LAN server . The Virtual Sever profi[...]

  • Page 64

    LAN Server: T ype the LAN IP address that will be assigned to the virtual server . Add: Click to add the virtual server to t he table at the bottom of the screen. Up date: Click to update information for the virt ual server if user has selected a list item and have made changes. Delete: Select a list item and click “Delete” to remove the item f[...]

  • Page 65

    Enable: Click to enable or disable the app lication profile. When enabled, users will be able to connect to the applicatio n via the router WAN connection. Click Disabled on a profile to prevent users from accessing the application on the WA N . Name: T ype a descriptive name for the application. T rigger: Defines the outgoing communication t hat d[...]

  • Page 66

    7.5.6 DMZ This screen leads to create a DMZ for those computers that cannot access Internet applications properly through the router and associated security settings. Note: Any clients added to the DMZ exposes the clients to security risks such as viruses and unauthorized access. Enable: Click to enable or disable the DMZ. DMZ Host IP: T ype a host[...]

  • Page 67

    7.5.7 Firewall Rule This screen leads to set up the firewall. The router provides basic firewall functions, by filtering all t he packet s that enter the rout er using a set of rules. The rules are in an order sequence list --the lower the rule number , the higher the priority the rule has. Enable: Click to enable or disable the firewall rule profi[...]

  • Page 68

    Destination: Defines the destination of the incoming packet that the rule is applied to. ● Interface: Select which interface (W AN or LAN) the rule is applied to. ● IP Range S tart: T ype the start IP addres s that the rule is applied to. ● IP Range End: T ype the end IP address that the rule is applied to. ● Protocol: Select the protocol ([...]

  • Page 69

    7.6 Management Management leads to set up Re mote Management feature. 7.6.1 Remote Management This screen leads to set up remote management. Using remote management, the router can be configured through the W AN via a W eb browser . A user name and password are required to perform remote management. HTTP: Set up HTTP access fo r remote management. [...]

  • Page 70

    GAMING MODE : If user is experiencing diffic ulties when playing online games or even certain applications that use voice data, user may need to enable Gaming Mode for these applications to wo rk correctly . When not playing games or using these voice applications, it is recommended that Gaming Mode is disabled. 67[...]

  • Page 71

    7.7 T ools This page leads to rest art the system , save and load dif ferent settings as profiles, restore factory default settings, run a setup wizard to configure router settings, upgrade the firmware, and ping remote IP addresses. 7.7.1 Rest art Click “Rest ar” t to restart the system in the ev ent the system is not performing correctly . 68[...]

  • Page 72

    7.7.2 Settings This screen leads to save settings as a profile and load prof iles for different circumstances. User can also load the fa ctory default settings, and run a setup wizard to configure the rout er and router interface. VPN Pass-Through: Choose enable or disable on the PPTP or IPSec. Save Settings: Click to save the current configur atio[...]

  • Page 73

    7.7.3 Firmware This screen leads to keep the router firmware up to date. Please follow the below instructions: 1. Download the latest firmware from t he manufacturer's Web site, and save it to disk. 2. Click “Browse” and go to the location of the downloaded firmware file. Select the file and click “Upgrade” to update the firmwa re to t[...]

  • Page 74

    7.7.4 Ping T est The ping test is to determine whether an IP address or host is present on the Internet. T ype the host name or IP address in the text box and click “Ping” to start testing. 71[...]

  • Page 75

    Glossary Access Point: An internetworking device that seamlessly connects wired and wireless networks. Ad-Hoc: An independent wireless LAN netwo rk formed by a group of computers, each with a network adapter. ASCII: American Standard Code for Inform ation Interchange, ASCII, is one of the two formats that can us e for entering the values for WEP ke[...]

  • Page 76

    Channel: The bandwidth which wireless Radio op erates is divided into several segments, which we call t hem “Channels”. AP and the cli ent stations that it associated work in one of the channels. CSMA/CA: In local area networking, this is the CSMA technique that combines slotted time -division multiplexing wit h carrier sense multiple ac cess/c[...]

  • Page 77

    ESSID: The unique identifier that identif ies the ESS. In infrastructure association, the stations use the same ESSID as AP’s to get connected. Ethernet: A popular local area data communications network, originally developed by Xerox Corp., that a ccepts transmission fr om computers and terminals. Ethernet operates on a 10/ 100 Mbps base transmis[...]

  • Page 78

    Node: A network junction or connection point, typically a computer or workstation. Packet: A unit of data routed between an origin and a destination in a network. PLCP: Physical layer convergence protocol PPDU: PLCP protocol data unit Preamble Type: During transmission, the PSDU shall be appended to a PLCP preamble and header to create the PPDU. Tw[...]

  • Page 79

    Throughput: The amount of data transferred successfully from one point to another in a given period of time. WEP: Wired Equivalent Priva cy (WEP) is an encryption scheme used to protect wireless data communication. To enable the icon will prevent other stations without the same WEP key from linking with the AP. 76[...]

  • Page 80

    Certification Notes Federal Communication Commissi on Interference St atement This equipment has been te sted and found to comply with the limits for a Class B digital device, pursuant to Pa rt 15 of the FCC Rules. These limits are designed to provide r easonable protection against harmful interference in a residential insta llation. This equ ipmen[...]

  • Page 81

    other antenna or transmitter . W e declare that the product is limited in CH1~CH1 1 by specified firmware controlled in the USA. 78[...]