User manual SMC 2862W-G
DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!
If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual SMC 2862W-G. We hope that this SMC 2862W-G user guide will be useful to you.
You may also download the following manuals related to this product:
SMC 2862W-G (568 ko)
SMC 2862W-G (568 ko)
SMC 2862W-G (1411 ko)
SMC 2862W-G (693 ko)
SMC 2862W-G (693 ko)
SMC 2862W-G (709 ko)
SMC 2862W-G (692 ko)
SMC 2862W-G annexe 1 (565 ko)
SMC 2862W-G annexe 1 (693 ko)
SMC 2862W-G annexe 1 (693 ko)
SMC 2862W-G annexe 1 (693 ko)
SMC 2862W-G annexe 1 (1781 ko)
SMC 2862W-G annexe 1 (1489 ko)
SMC 2862W-G annexe 1 (692 ko)
SMC 2862W-G FICHE TECHNIQUE (189 ko)
Manual abstract: user guide SMC 2862W-G
Detailed instructions for use are in the User's Guide.
[. . . ] SMC2862W-G EZ ConnectTM g Wireless USB 2. 0 Adapter User Guide
From SMC's EZ ConnectTM line of small office, home office networking products
March 2004
TABLE OF CONTENTS
System Requirements . . v
ii
SYSTEM REQUIREMENTS
· · · · · ·
A PC running Windows 98SE/Me/2000/XP. A minimum of 10MB available hard disk space for utility and driver installation. Another IEEE 802. 11b or 802. 11g compliant device installed in your network, such as the BarricadeTM g 2. 4GHz 54Mbps Wireless Broadband Router with Print Server (SMC2804WBRP-G), or another wireless adapter, such as the EZ ConnectTM g 2. 4GHz 54Mbps Wireless PCI Card (SMC2802W).
1
PACKAGE CONTENTS
After unpacking the EZ ConnectTM g 2. 4GHz 54 Mbps Wireless USB 2. 0 Adapter, check the contents of the box to be sure you have received the following components:
· · · ·
1 SMC2862W-G EZ ConnectTM g 2. 4GHz 54 Mbps Wireless USB 2. 0 Adapter. [. . . ] What is Tx Rate?
o
·
Tx-Rate or TRANSFER RATE is the current speed at which the network component is operating. SMC-802. 11b products can operate at speeds of 1Mb, 2Mb, 5. 5Mb, & 11Mbps. A wireless card set to AUTO will attempt to connect at whatever speed will give the best throughput on the network.
40
Frequently Asked Questions
·
o
What is RTS Threshold?(Request To Send) An RS-232 signal sent from the transmitting station to the receiving station requesting permission to transmit. RTS is a collision avoidance method used by all 802. 11b wireless networking devices. Only if you find yourself in an Infrastructure environment where all nodes are in range of the Access Point but may be out of range of each other. It is recommended to leave this setting at its default value leaving this feature disabled. What is Authentication Algorithm?
o
·
Authentication Algorithm is the means by which one station is authorized to communicate with another. In an Open System, any station can request authorization in accordance with the WECA standard. In a Shared key system, only stations that possess a secret encrypted key may participate in the network. This is a low level security key which allows the equipment with the shared key algorithm to see each other on the wireless LAN. What is DBI?
·
o
The ability of the antenna to shape the signal and focus it in a particular direction is called Antenna Gain, and is expressed in terms of how much stronger the signal in the desired direction is, compared to the worst possible antenna, which distributes the signal evenly in all directions (an Isotropic Radiator). To express the relationship to the Isotropic reference, this is abbreviated: dBi. The typical omni-directional stick antenna is rated at 6-8 dBi, indicating
41
Frequently Asked Questions
that that by redirecting the signal that would have gone straight up or down to the horizontal level, 4 times as much signal is available horizontally. A parabolic reflector design can easily achieve 24 dBi.
·
o
What is WEP?Short for Wired Equivalent Privacy, WEP is a security protocol for wireless local area networks (WLANs) defined in the 802. 11b and 802. 11a standards. WEP is designed to provide the same level of security as that of a wired LAN. LANs are inherently more secure than WLANs because LANs are somewhat protected by the physicalities of their structure, having some or all part of the network inside a building that can be protected from unauthorized access. WLANs, which are over radio waves, do not have the same physical structure and therefore are more vulnerable to tampering. WEP aims to provide security by encrypting data over radio waves so that it is protected as it is transmitted from one end point to another. The Wired Equivalent Privacy (WEP) feature uses the RC4 PRNG algorithm developed by RSA Data Security, Inc. If your wireless access point supports MAC filtering, it is recommended that you use this feature in addition to WEP (MAC filtering is much more secure than encryption).
42
TERMINOLOGY
10BaseT Physical Layer Specification for Twisted-Pair Ethernet using Unshielded Twisted Pair wire at 10Mbps. [. . . ] Any replaced or repaired product carries, either a 30-day limited warranty or the remainder of the initial warranty, whichever is longer. SMC is not responsible for any custom software or firmware, configuration information, or memory data of Customer contained in, stored on, or integrated with any products returned to SMC pursuant to any warranty. Products returned to SMC should have any customer-installed accessory or add-on components, such as expansion modules, removed prior to returning the product for replacement. SMC is not responsible for these items if they are returned with the product. [. . . ]
DISCLAIMER TO DOWNLOAD THE USER GUIDE SMC 2862W-G
Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual SMC 2862W-G will begin.