User's Manual
Table Of Contents
- 54M/150M/300Mbps
- USBWIRELESSADAPTER
- User’sManual
- (Ver2.3)
- FederalCommunicationCommissionInterferenceStat
- 1.Introduction
- 2.PackageContents:
- Warranty
- 3.Installation
- 4.WirelessConnection
- 5.TipsforWi-Fiusers
- 6.Warning
- 7.Security
- 8.Keyterms
- Wi-Fi:Shortfor“wirelessfidelity,”agenericla
- Hotspot:Aspecificgeographiclocationinwhicha
- Throughput::Theamountofdatatransmittedinas
- Bandwidth:theamountofdatathatcanbecarried
- Chipset::Agroupofmicrochipsthatexecutevario
- TxPower:Thetransmitpowermeasuredatthetermin
- 1T1R,2T2R:Thestreamchannel.1T1Rmeansonetra
- DualBand:Normallymeans802.11b/g/nor802.11a,
- 9.Specifications(Typical):
User ʼ s Manual
Wireless USB Adapte
r
Page 13
5.
5.
5.
5. Tips
Tips
Tips
Tips for
for
for
for Wi-Fi
Wi-Fi
Wi-Fi
Wi-Fi users
users
users
users
With a Wi-Fi connection, you can roam about 150 m around the access point (depends on
different environment), so find a spot where you can work without any interruption. Then see
how much work you can do, such as:
Easily and quickly receive and transmit files within your local network — no problem
for big files.
Access your email and surf the web with the same speed as that connected with
network cables.
Synchronize data between devices.
Take advantage of wireless printing — send files directly from your laptop PC to a
wireless printer over Wi-Fi connection.
6.
6.
6.
6. Warning
Warning
Warning
Warning
Wi-Fi offers greater speed and range than Bluetooth, but it drains your portable device
batteries a lot faster than Bluetooth does. In fact, if you use a Wi-Fi connection regularly on
your laptop PC, you'll undoubtedly notice that you need to recharge more often. If you need to
conserve battery life — on a long trip for example — turn off your Wi-Fi connection when you
don't actually need it.
7.
7.
7.
7. Security
Security
Security
Security
Because wireless networks rely on radio signals to transmit data, they are not as secure as
wire network. Wireless networks are susceptible to viruses and breaches like eavesdropping
and need to be protected in order to be secure.
There are many security measures to safeguard wireless networks, protect the data, and
keep unauthorized users out. Hotspots, on the other hand, are often free of standard security
practices in an effort to make it easy for anyone to connect. It may be found that some pay
hotspots administered by service providers offer have some level of security, however, when
using a hotspot, it ’ s always a good idea to be proactive and to employ security measures of
your own.
8.
8.
8.
8. Key
Key
Key
Key terms
terms
terms
terms
Wi-Fi:
Wi-Fi:
Wi-Fi:
Wi-Fi: Short for “ wireless fidelity, ” a generic label that refers to wireless networks or
networking.
Hotspot:
Hotspot:
Hotspot:
Hotspot: A specific geographic location in which an access point provides public
wireless broadband network services to mobile visitors through a WLAN.
Throughput
Throughput
Throughput
Throughput : :
:
:
: The amount of data transmitted in a set amount of time.
Bandwidth
Bandwidth
Bandwidth
Bandwidth :
:
:
: the amount of data that can be carried from one point to another in a given
time period (usually a second).
Chipset
Chipset
Chipset
Chipset : :
:
:
: A group of microchips that execute various functions (like memory) to support
the CPU.
Tx
Tx
Tx
Tx Power
Power
Power
Power : The transmit power measured at the terminal without antenna be considered.
Should the antenna gain be considered, the EIRP value is mentioned.
1T1R,
1T1R,
1T1R,
1T1R, 2T2R:
2T2R:
2T2R:
2T2R: The stream channel. 1T1R means one transmitter and one receiver. 2T2R
means two transmitters and two receivers.
Dual
Dual
Dual
Dual Band:
Band:
Band:
Band: Normally means 802.11b/g/n or 802.11a, which one works in 2.4GHz, and
other works in 5GHz.