Wireless N 300 Open Source Router Wireless N 300 OPEN SOURCE 無線寬頻路由器
Table of Contents Table of Contents Package Contents.......................................................................1 System Requirements............................................................1 Features................................................................................. 2 Hardware Overview................................................................3 Rear Panel Connections.................................................. 3 Front Panel LEDs.......................................
Table of Contents Leopard (10.6)............................................................................64 Troubleshooting........................................................................68 Wireless Basics.........................................................................72 Tips....................................................................................... 75 Wireless Modes....................................................................76 Networking Basics.......................
Section 1 - Product Overview Package Contents • D-Link DIR-627 Wireless Router • Power Adapter • Ethernet Cable • Wall Mount Kit • User Manual on CD • Open Source Manual on CD • Warranty Card Note: Using a power supply with a different voltage than the one included with the DIR-627 will cause damage and void the warranty for this product. Note: Always attach the power cord plug to the power supply, before inserting the power cord and connected power supply to the wall outlet.
Section 1 - Product Overview Features • Faster Wireless Networking - The DIR-627 provides up to 300Mbps* wireless connection with other 802.11n wireless clients. This capability allows users to participate in real-time activities online, such as video streaming, online gaming, and real-time audio. • Compatible with 802.11b and 802.11g Devices - The DIR-627 is still fully compatible with the IEEE 802.11b and IEEE 802.11g standard, so it can connect with existing 802.11b and IEEE 802.
Section 1 - Product Overview Hardware Overview Rear Panel Connections Internet Port The Auto MDI/MDIX WAN port is the connection for the Ethernet cable to the Cable or DSL modem. Reset Button Pressing the Reset Button restores the Router to its original factory default settings. Alarm Connector The connector for the alarm. This is used to set up alarms. LAN Ports Connect Ethernet devices such as computers, switches, and hubs.
Section 1 - Product Overview Hardware Overview Front Panel LEDs Internet LED A solid green light indicates the connection on the WAN port. An amber light indicates that the Internet connection has failed. This LED blinks during data transmission. WLAN LED A solid light indicates that the wireless segment is ready. This LED blinks during wireless data transmission. Power LED A solid green light indicates a proper connection to the power supply. A blinking amber light indicates the device is booting up.
Section 1 - Product Overview Hardware Overview Right Side Panel LED WPS Button LED Use the WPS button on the right side panel of the Router to establish a secure connection to wireless clients that support WPS (Wi-Fi Protected Setup).
Section 2 - Installation Installation This section will walk you through the installation process. Placement of the Router is very important. Do not place the Router in an enclosed area such as a closet, cabinet, or in the attic or garage. Before you Begin Please configure the Router with the computer that was last connected directly to your modem. Also, you can only use the Ethernet port on your modem.
Section 2 - Installation Wireless Installation Considerations The D-Link wireless Router lets you access your network using a wireless connection from virtually anywhere within the operating range of your wireless network. Keep in mind, however, that the number, thickness and location of walls, ceilings, or other objects that the wireless signals must pass through, may limit the range.
Section 2 - Installation Wall Mounting Your Device You can mount the Router to a wall or a partition for easy and convenient placement of your device. To wall mount your device, A. Place the two provided screw anchors about 15 centimeters (~6 inches) apart in the wall or partition where the device is to be placed. D-Link DIR-627 User Manual B. Drive the two provided screws into the screw anchors in the wall or partition where the device is to be placed.
Section 2 - Installation C. Place the mounting holes on the bottom of the device over the screws to mount it to the wall or partition. D-Link DIR-627 User Manual D. Connect your cables to the device.
Section 2 - Installation Connect to Cable/DSL/Satellite Modem If you are connecting the Router to a cable/DSL/satellite modem, please follow the steps below: 1. Place the Router in an open and central location. Do not plug the power adapter into the Router. 2. Turn the power off on your modem. If there is no on/off switch, then unplug the modem’s power adapter. Shut down your computer. 3.
Section 2 - Installation Connect to Another Router If you are connecting the Router to another router to use as a wireless access point and/or switch, you will have to do the following before connecting the router to your network: • Disable UPnP™ • Disable DHCP • Change the LAN IP address to an available address on your network. The LAN ports on the Router cannot accept a DHCP address from your other router. To connect to another router, please follow the steps below: 1. Plug the power into the router.
Section 2 - Installation 6. Disconnect the Ethernet cable from the router and reconnect your computer to your network. 7. Connect an Ethernet cable in one of the LAN ports of the Router and connect it to your other router. Do not plug anything into the WAN port of the Router. 8. You may now use the other three LAN ports to connect other Ethernet devices and computers. To configure your wireless network, open a Web browser and enter the IP address you assigned to the router.
Section 3 - Configuration Configuration This section will show you how to configure your new D-Link wireless Router using the Web-based configuration utility. Web-based Configuration Utility To access the configuration utility, open a Web-browser such as Mozilla Firefox or Internet Explorer and enter the IP address of the Router (192.168.0.1). The opening Router page appears.
Section 3 - Configuration Basic The Basic page allows users to configure the basic operations of the Router. Local Time: Displays the Local TIme maintained by the Router. Router Set the router user name for access to the Router’s User Name: Web interface. The initial router user name is admin. Once this is set up, users can leave this field and the router password field blank to disable the authentication login process. Router Set the router password for access to the Router’s Password: Web interface.
Section 3 - Configuration LAN The LAN page allows users to configure the LAN of the Router. MAC Displays the MAC address of the LAN interface. Address: This is also referred to as the Ethernet address. IP Address: Set the IP address of the LAN interface. Subnet Mask: Set the IP netmask of the LAN interface. DHCP Choose either Enabled or Disabled. This controls Server: DHCP server functionality on the LAN. DHCP Starting Set the start of the IP address range that the DHCP IP Address: server will use.
Section 3 - Configuration WAN The WAN page allows users to configure the WAN connections of the Router. Protocol: Set the method to obtain an IP address for the connection: DHCP, Static, or PPPoE. Host Name: Set a host name. Some ISPs require a host name be provided when requesting an IP address using DHCP. The default host name is DIR-627. Domain Set the domain name provided to LAN clients who Name: request an IP address through DHCP. MAC Some ISPs require users to enter a specific MAC Address: address.
Section 3 - Configuration PPPoE Set the PPPoE service name. This is required by some ISPs. Service Name: PPPoE Set the PPPoE access concentrator. This is required by some ISPs. Access Concentrator: PPPoE Choose either Enabled or Disabled. This determines whether the PPPoE link should be automatically disconnected if no Connect On traffic has been observed for the period specifies by the PPPoE Max Idle Time.
Section 3 - Configuration Status The Status page displays miscellaneous status information. System Up Displays the system up time since the Router was Time: last booted up. Connection Displays a log of recent connection attempts.
Section 3 - Configuration Filters The Filters page allows users to configure LAN filters for the Router. The LAN machines affected by the filters will not be able to communicate through the WAN but will be able to communicate with each other and with the Router itself. LAN MAC Set whether clients with the specified MAC address Filter are denied or allowed access to the Router and the Mode: WAN. The options are: Disabled, Allow, or Deny.
Section 3 - Configuration Routing The Routing page allows users to configure port forwarding for the Router. Requests to the specified WAN port range will be forwarded to the port range of the LAN machine. Users may also configure static routes here. Port The Router allows users to forward packets Forwarding: destined in the first range to the LAN machine with the specified IP address.
Section 3 - Configuration Radio The Radio page allows users to configure the physical wireless interfaces. Interface: Choose either Enabled or Disabled. This enables or disables the wireless interface. Control Set the channel on which to operate on: Auto, 1, Channel: 2, 3, 4, 5, 6, 7, 8, 9, 10, or 11. 802.11n Choose either Auto or Off to enable or disable Mode: 802.11n support. Bandwidth: Choose the channel bandwith, either 20 MHz in Both Bands or 40 MHz in Both Bands.
Section 3 - Configuration Beacon Choose either Enabled or Disabled. This enables or disables the rotation of the beacon order when running in Rotation: Multi BSS mode. Preamble Choose either Short or Long. This sets whether short or long preambles are used. Short preambles improve Type: throughput but all clients in the wireless network must support this capability if selected. RIFS Mode Choose either Auto or Off. Reduced Interframe Spacing (RIFS) mode is used to advertise in beacons and probe responses.
Section 3 - Configuration SSID The SSID page allows users to configure virtual interfaces for each physical interface. Enable Choose either Enabled or Disabled. This enables Wireless: or disables the wireless interface. Wireless Set the service set identifier (SSID), otherwise Network known as the network name, of this network. Name: Visibility Choose either Open or Closed. Open reveals the Status network to active scans while Closed hides the (SSID network from active scans.
Section 3 - Configuration Security The Security page allows users to configure security for the wireless interfaces. WPS Choose either Enabled or Disabled to enable Configur- or disable Wi-Fi Protected Setup (WPS) simple ation: configuration mode. Device Enter a mnemonic name that can be used to identify Name: the Router. Device WPS This displays the Wi-Fi Protected Setup (WPS) UUID: UUID number of the Router. Device PIN: Click the Generate button to create a PIN number for the Router.
Section 3 - Configuration WPS Click the Start button to use the Push Button Configuration (PBC) Wi-Fi Protected Setup (WPS) method. Method: 802.11 Choose the 802.11 authentication method, either Open or Shared. Authentication: 802.1X Once the user has decided on the network authentication type, choose either Enabled or Disabled to enable or disable Authen- network authentication. tication: WPA: Choose either Enabled or Disabled to enable or disable Wi-Fi Protected Access (WPA).
Section 3 - Configuration Network Enter five ASCII characters or ten hexadecimal digits for a 64-bit key. Enter 13 ASCII characters or 26 hexadecimal digits Key 1-4: for a 128-bit key. Current Select which network key is used for encrypting outbound data and/or authenticating clients. Network Key: Network Set the network key rotation interval, in seconds. Leave blank or set to zero to disable the rotation. Key Rotation Interval: Network Set the network re-authentication interval, in seconds.
Section 3 - Configuration Firmware The Firmware page allows users to upgrade the Router firmware. Firmware Enter the new firmware to upload to the Router or Upgrade: click Browse to locate the firmware on the user’s computer. Click Upload new Firmware to initiate the firmware upgrade. Save Click Save configuration to file to save NV-RAM Settings To variables to file.
Section 4 - Security Wireless Security This section will show you the different levels of security you can use to protect your data from intruders. The DIR-627 offers the following types of security: • WPA2 (Wi-Fi Protected Access 2) • WPA (Wi-Fi Protected Access) • WEP (Wired Equivalent Privacy) • WPA2-PSK (Pre-Shared Key) • WPA-PSK (Pre-Shared Key) What is WEP? WEP stands for Wired Equivalent Privacy. It is based on the IEEE 802.11 standard and uses the RC4 encryption algorithm.
Section 4 - Security Configure WEP It is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. 1. Log into the Web-based configuration by opening a Web browser and entering the IP address of the Router (192.168.0.1). Click Security at the top of the window. 2. Go to WEP Encryption and toggle Disabled to Enabled.
Section 4 - Security What is WPA? WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired Equivalent Privacy). The two major improvements over WEP: • Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t been tampered with. WPA2 is based on 802.
Section 4 - Security Configure WPA-PSK It is recommended to enable encryption on your wireless Router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. 1. Log into the Web-based configuration by opening a Web browser and entering the IP address of the router (192.168.0.1). Click Security at the top of the window. 2. Go to 802.11 Authentication and select Open. 3.
Section 4 - Security Configure WPA2-PSK It is recommended to enable encryption on your wireless Router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. 1. Log into the Web-based configuration by opening a Web browser and entering the IP address of the router (192.168.0.1). Click Security at the top of the window. 2. Go to 802.11 Authentication and select Open. 3.
Section 4 - Security Configure WPA It is recommended to enable encryption on your wireless Router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. If you are using a RADIUS server for wireless authentication that is using WPA encryption, carry out the following: 1.
Section 4 - Security Configure WPA2 It is recommended to enable encryption on your wireless Router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. If you are using a RADIUS server for wireless authentication that is using WPA2 encryption, carry out the following: 1.
Section 4 - Security Configure WPA (RADIUS) It is recommended to enable encryption on your wireless Router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. 1. Log into the Web-based configuration by opening a Web browser and entering the IP address of the Router (192.168.0.1). Click Security at the top of the window. 2. Go to 802.11 Authentication and select Open.
Section 4 - Security Configure and WPA2 (RADIUS) It is recommended to enable encryption on your wireless Router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. 1. Log into the Web-based configuration by opening a Web browser and entering the IP address of the Router (192.168.0.1). Click Security at the top of the window. 2. Go to 802.
Section 5 - Connecting to a Wireless Network Connect to a Wireless Network Using Windows® XP Windows® XP users may use the built-in wireless utility (Zero Configuration Utility). The following instructions are for Service Pack 2 users. If you are using another company’s utility or Windows® 2000, please refer to the user manual of your wireless adapter for help with connecting to a wireless network. Most utilities will have a “site survey” option similar to the Windows® XP utility as seen below.
Section 5 - Connecting to a Wireless Network Configure WEP It is recommended to enable WEP on your wireless Router or access point before configuring your wireless adapter. If you are joining an existing network, you will need to know the WEP key being used. 1. Open the Windows® XP Wireless Utility by right-clicking on the wireless computer icon in your system tray (lower-right corner of screen). Select View Available Wireless Networks. 2.
Section 5 - Connecting to a Wireless Network 3. The Wireless Network Connection box will appear. Enter the same WEP key that is on your Router and click Connect. It may take 20-30 seconds to connect to the wireless network. If the connection fails, please verify that the WEP settings are correct. The WEP key must be exactly the same as on the wireless router.
Section 5 - Connecting to a Wireless Network Configure WPA-PSK It is recommended to enable WEP on your wireless Router or access point before configuring your wireless adapter. If you are joining an existing network, you will need to know the WEP key being used. 1. Open the Windows® XP Wireless Utility by right-clicking on the wireless computer icon in your system tray (lower-right corner of screen). Select View Available Wireless Networks. 2.
Section 5 - Connecting to a Wireless Network 3. The Wireless Network Connection box will appear. Enter the WPA-PSK passphrase and click Connect. It may take 20-30 seconds to connect to the wireless network. If the connection fails, please verify that the WPA-PSK settings are correct. The WPA-PSK passphrase must be exactly the same as on the wireless router.
Section 6 - Setting Up Wi-Fi Protection (WCN 2.0 in Windows Vista) Setting Up Wi-Fi Protection (WCN 2.0 in Windows Vista) The Router supports Wi-Fi protection, referred to as WCN 2.0 in Windows Vista. The instructions for setting this up depend on whether you are using Windows Vista to configure the Router or third party software. Initial Router Configuration for Wi-Fi Protection When you first set up the Router, Wi-Fi protection is disabled and unconfigured.
Section 6 - Setting Up Wi-Fi Protection (WCN 2.0 in Windows Vista) Setting Up a Configured Router Once the Router has been configured, you can use the push button on the Router or third party software to invite a newcomer to join your Wi-Fi protected network. For maximum security, the software method is recommended. However, the push button method is ideal if there is no access to a GUI.
Section 7 - Changing the Computer Name and Joining a Workgroup Changing the Computer Name and Joining a Workgroup The following are step-by-step directions to change the computer name and join a workgroup. 1. Click on Properties. 2. Click on the Advanced system settings link.
Section 7 - Changing the Computer Name and Joining a Workgroup 3. Click the Computer Name tab in the System Properties window and enter a description of your computer in the textbox. When you are finished, click the Change button. 4. Go to the Computer Name/Domain Changes window and click the radio button next to the Workgroup you want to join. When you are finished, click the OK button.
Section 8 - Configuring the IP Address in Vista Configuring the IP Address in Vista The following are step-by-step directions to configure the IP address in Windows Vista. 1. Click on Properties. 2. Go to the Network and Internet window and click the appropriate Local Area Connection icon. 3. Right-click the Local Area Connection icon and then select Properties from the drop-down menu.
Section 8 - Configuring the IP Address in Vista 4. Tick the Internet Protocol Version 4 (TCP/IPv4) check box in the Networking tab in the Local Area Connection Properties window. 5. Click the “Use the following IP address” option in the General tab in the Local Area Connections Properties window and enter the desired IP address in the space offered. Then click the “Use the following DNS server adresses” option on the same tab and enter the desired DNS server information.
Section 8 - Configuring the IP Address in Vista 6. Right-click the Local Area Connection icon and then select Status from the drop-down menu. 7. Go to the Local Area Connection Status window and click the Details button. 8. Confirm your new settings on the Network Connection Status window. When you are finished, click the Done button.
Section 9 - Setting Up a Connection Wirelessly Setting Up a Connection or Network Wirelessly The following are step-by-step directions to set up a wireless connection. 1. Click on Set up a connection or network in the Network and Sharing Center section. 2. Go to the Set up a connection or network window and choose the Set up a wireless router or access point Set up a new wireless network for your home or business option. Click the Next button.
Section 9 - Setting Up a Connection Wirelessly 3. Click the Next button on the Set up a wireless router or access point window. 4. The following window displays the system progress. 5. This window confirms that you want to create wireless network settings that are savable to a USB flash drive.
Section 9 - Setting Up a Connection Wirelessly 6. Enter a network name on the Give your network a name window in the Set up a wireless router or access point wizard. Click the Next button. 7. Enter a passphrase on the Help make your network more secure with a passphrase window in the Set up a wireless router or access point wizard. Click the Show advanced network security options link. 8.
Section 9 - Setting Up a Connection Wirelessly 9. Once you have selected the desired security method on the Choose advanced network security options window in the Set up a wireless router or access point wizard, click the Next button. 10.Select the desired file and printer sharing option on the Choose file and printer sharing options window in the Set up a wireless router or access point wizard. Click the Next button. 11.
Section 9 - Setting Up a Connection Wirelessly 12.Once you have saved your network settings to USB, the Copying settings to the USB drive window in the Set up a wireless router or access point wizard opens to indicate the system progress. 13.Once you are finished, the To add a device or computer, follow these instructions window in the Set up a wireless router or access point wizard opens. When you are finished, click the Close button.
Section 10 - Connecting to a Secured Wireless Network (WEP, WPA-PSK & WPA2-PSK) Connecting to a Secured Wireless Network (WEP, WPA-PSK & WPA2-PSK) The following are step-by-step directions to set up a wireless connection. 1. Click on Properties. 2. Click the Manage network connections link in the Network and Sharing Center window.
Section 10 - Connecting to a Secured Wireless Network (WEP, WPA-PSK & WPA2-PSK) 3. Right-click the Wireless Network Connection entry and then select Connect/Disconnect from the drop-down menu. 4. Select a network to connect to in the Select a network to connect to window in the Connect to a network wizard and then click the Connect button. 5. The following Connect to a network wizard window displays the system progress.
Section 10 - Connecting to a Secured Wireless Network (WEP, WPA-PSK & WPA2-PSK) 6. Enter the network security key or passphrase for the Router in the textbox provided in the Type the network security key or passphrase for dlink300 window in the Connect a network wizard. When you are finished, click the Connect button. 7. The following Successfully connected to dlink300 window in the Connect to a network wizard is displayed. Choose to save to the network and/or start the new connection automatically.
Section 10 - Connecting to a Secured Wireless Network (WEP, WPA-PSK & WPA2-PSK) 9. Confirm your new settings by calling up the command prompt and then entering the ipconfig command. 10.To test the new IP address, use the Ping feature of the command prompt.
Section 11 - Connecting to an Unsecured Wireless Network Connecting to an Unsecured Wireless Network The following are step-by-step directions to set up an unsecured wireless connection. 1. Click on Properties. 2. Go to the Network and Sharing Center window and click the Manage Network Connections link.
Section 11 - Connecting to an Unsecured Wireless Network 3. Right-click the Wireless Network Connection entry and then select Connect/Disconnect from the drop-down menu. 4. Select a network to connect to in the Select a network to connect to window in the Connect to a network wizard and then click the Connect button. 5. Confirm your desire to connect anyway on the following Network Connection Status window.
Section 11 - Connecting to an Unsecured Wireless Network 6. The following Connect to a network wizard window displays the system progress. 7. The following Successfully connected to dlink300 window in the Connect to a network wizard is displayed. Choose to save to the network and/or start the new connection automatically. When you are finished, click the Close button. 8. The successful connection is displayed at the bottom of the Windows start up menu.
Section 11 - Connecting to an Unsecured Wireless Network 9. Confirm your new settings by calling up the command prompt and then entering the ipconfig command. 10.To test the new IP address, use the Ping feature of the command prompt.
Section 11 - Connecting to an Unsecured Wireless Network Configuring the Network in MAC OS X Snow Leopard (10.6) The following are step-by-step directions to configure the network in MAC OS X Snow Leopard (10.6). 1. Click the icon in your Dock to open your System Preferences window. 2. Click the Network icon in System Preferences menu to view the Network menu.
Section 11 - Connecting to an Unsecured Wireless Network 3. Click Ethernet on the left to see the local network settings. TCP/IP settings should be set to obtain an IP address from a DHCP server (i.e. wireless router) automatically. The IP address, its subnet mask and the router’s IP address displays when selecting Using DHCP from the Configure IPv4 drop-down menu.
Section 11 - Connecting to an Unsecured Wireless Network Configuring the Wireless Network in MAC OS X Snow Leopard (10.6) The following are step-by-step directions to configure the Wireless in MAC OS X Snow Leopard (10.6). 1. Click the icon in your Dock to open your System Preferences window. 2. Click the Network icon in System Preferences menu to view the Network menu.
Section 11 - Connecting to an Unsecured Wireless Network 3. Click AirPort on the left to configure the wireless network. 4. Make sure the Status is On. If the Status is Off, click the Turn AirPort On button to enable AirPort. 5. Click the Advanced button to see the window. 6. Click the + button to see the window in the next page.
Section 11 - Connecting to an Unsecured Wireless Network 7. Enter the Network Name (SSID) of the Router. 8. Select the Security type of the network from the drop-down list, and security related information below. Click the Add button to add the wireless network in the Preferred Network list.
Section 11 - Connecting to an Unsecured Wireless Network 9. Click OK to proceed. 10. 11. Select the Network Name from the drop-down menu. Click the Apply button to save the settings.
Section 12 - Troubleshooting Troubleshooting This chapter provides solutions to problems that can occur during the installation and operation of the DIR-627. Read the following descriptions if you are having problems. (The examples below are illustrated in Windows® XP. If you have a different operating system, the screenshots on your computer will look similar to the following examples.) 1. Why can’t I access the web-based configuration utility? When entering the IP address of the D-Link router (192.168.
Section 12 - Troubleshooting • Configure your Internet settings: • Go to Start > Settings > Control Panel. Double-click the Internet Options icon. From the Security tab, click the button to restore the settings to their defaults. • Click the Connection tab and set the dial-up option to Never Dial a Connection. Click the LAN Settings button. Make sure nothing is checked. Click OK. • Go to the Advanced tab and click the button to restore these settings to their defaults. Click OK three times.
Section 12 - Troubleshooting 3. Why can’t I connect to certain sites or send and receive emails when connecting through my router? If you are having a problem sending or receiving email, or connecting to secure sites such as eBay, banking sites, and Hotmail, we suggest lowering the MTU in increments of ten (Ex. 1492, 1482, 1472, etc). Note: AOL DSL+ users must use MTU of 1400. To find the proper MTU Size, you’ll have to do a special ping of the destination you’re trying to go to.
Section 12 - Troubleshooting You should start at 1472 and work your way down by 10 each time. Once you get a reply, go up by 2 until you get a fragmented packet. Take that value and add 28 to the value to account for the various TCP/IP headers. For example, lets say that 1452 was the proper value, the actual MTU size would be 1480, which is the optimum for the network we’re working with (1452+28=1480). Once you find your MTU, you can now configure your router with the proper MTU size.
Appendix A - Wireless Basics Wireless Basics D-Link wireless products are based on industry standards to provide easy-to-use and compatible high-speed wireless connectivity within your home, business or public access wireless networks. Strictly adhering to the IEEE standard, the D-Link wireless family of products will allow you to securely access the data you want, when and where you want it. You will be able to enjoy the freedom that wireless networking delivers.
Appendix A - Wireless Basics What is Wireless? Wireless or Wi-Fi technology is another way of connecting your computer to the network without using wires. Wi-Fi uses radio frequency to connect wirelessly, so you have the freedom to connect computers anywhere in your home or office network. Why D-Link Wireless? D-Link is the worldwide leader and award winning designer, developer, and manufacturer of networking products. D-Link delivers the performance you need at a price you can afford.
Appendix A - Wireless Basics Bluetooth is the industry standard wireless technology used for WPAN. Bluetooth devices in WPAN operate in a range up to 30 feet away. Compared to WLAN the speed and wireless operation range are both less than WLAN, but in return it doesn’t use nearly as much power which makes it ideal for personal devices, such as mobile phones, PDAs, headphones, laptops, speakers, and other devices that operate on batteries.
Appendix A - Wireless Basics Where is wireless used? Wireless technology is expanding everywhere not just at home or office. People like the freedom of mobility and it’s becoming so popular that more and more public facilities now provide wireless access to attract people. The wireless connection in public places is usually called “hotspots”.
Appendix A - Wireless Basics Eliminate Interference Wireless Modes Place home appliances such as cordless telephones, microwaves, and televisions as far away as possible from the router/access point. This would significantly reduce any interference that the appliances might cause since they operate on same frequency. Security Don’t let you next-door neighbors or intruders connect to your wireless network. Secure your wireless network by turning on the WPA or WEP security feature on the router.
Appendix B - Networking Basics Networking Basics Check your IP address After you install your new D-Link adapter, by default, the TCP/IP settings should be set to obtain an IP address from a DHCP server (i.e. wireless router) automatically. To verify your IP address, please follow the steps below. Click on Start > Run. In the run box type cmd and click OK. At the prompt, type ipconfig and press Enter. This will display the IP address, subnet mask, and the default gateway of your adapter.
Appendix B - Networking Basics Statically assign an IP address If you are not using a DHCP capable gateway/router, or you need to assign a static IP address, please follow the steps below: Step 1 Windows® XP - Click on Start > Control Panel > Network Connections. Windows® 2000 - From the desktop, right-click My Network Places > Properties. Step 2 Right-click on the Local Area Connection which represents your D-Link network adapter and select Properties.
! " # $ % %& % '" ()'" ) '" %*'" )'" '" '" '" '" *'" ( ('" '" '" Security +, + . ,# / 0 ,1 ' 1 3 1 # 0 4 & 5 *)8 " + , , 98,: +, "; < 8 <:, 0 8 <=, 0 8 0 !; *= ' 8 *)= ' 8 :, 0 8 =, 0 > ?.
Appendix C - Technical Specifications Wireless Operating Range2 • Indoors - up to 328 ft. (100 meters) • Outdoors- up to 1312 ft. (400 meters) Wireless Transmit Power (AVG Power) 11b:17dBm(Max) 11g:16dBm(Max) 11n:13dBm(Max) External Antenna Type Two fixed reverse SMA external antennas LEDs • Power • Internet • WLAN (Wireless Connection) • Ethernet • USB • WPS Operating Temperature 32°F to 129 °F (0°C to 40°C) Dimensions • L = 197.82mm • W = 133.18mm • H = 28.
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.