User manual AIRLIVE X.USB
DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!
If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual AIRLIVE X.USB. We hope that this AIRLIVE X.USB user guide will be useful to you.
You may also download the following manuals related to this product:
AIRLIVE X.USB BROCHURE (184 ko)
AIRLIVE X.USB ANNEXE 105 BROCHURE (184 ko)
Manual abstract: user guide AIRLIVE X.USB
Detailed instructions for use are in the User's Guide.
[. . . ] Table of Contents
X. USB
11 a/b/g/n 300Mbps Dual Band USB Adapter
User's Manual
X. USB User's Manual
Copyright & Disclaimer
Copyright & Disclaimer No part of this publication may be reproduced in any form or by any means, whether electronic, mechanical, photocopying, or recording without the written consent of OvisLink Corp. has made the best effort to ensure the accuracy of the information in this user's guide. However, we are not liable for the inaccuracies or errors in this guide. All information is subject to change without notice All Trademarks are properties of their respective holders.
X. USB User's Manual
ii
Copyright & Disclaimer
Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. [. . . ] A DHCP server can either be a designated PC on the network or another network device, such as a router.
DMZ Demilitarized Zone. When a router opens a DMZ port to an internal network device, it opens all the TCP/UDP service ports to this particular device. The feature is used commonly for setting up H. 323 VoIP or Multi-Media servers.
DNS A program that translates URLs to IP addresses by accessing a database maintained on a collection of Internet servers.
Domain Name The unique name that identifies an Internet site. In www. airlive. com, the "airlive. com" is the doman name.
19
X. USB User's Manual
5. A type of network attack that floods the network with useless traffic. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols.
Encryption Encoding data to prevent it from being read by unauthorized people. The common wireless encryption schemes are WEP, WPA, and WPA2.
ESSID (SSID) The identification name of an 802. 11 wireless network. Since wireless network has no physical boundary liked wired Ethernet network, wireless LAN needs an identifier to distinguish one network from the other. Wireless clients must know the SSID in order to associate with a WLAN network. Hide SSID feature disable SSID broadcast, so users must know the correct SSID in order to join a wireless network.
Firewall A system that secures a network and prevents access by unauthorized users. Firewalls can prevent unrestricted access into a network, as well as restricting data from flowing out of a network.
Firmware The program that runs inside embedded device such as router or AP. Many network devices are firmware upgradeable through web interface or utility program.
FTP File Transfer Protocol. A standard protocol for sending files between computers over a TCP/IP network and the Internet.
X. USB User's Manual
20
5. Wireless Network Glossary
Fragment Threshold Frame Size larger than this will be divided into smaller fragment. If there are interferences in your area, lower this value can improve the performance. You can try 1500, 1000, or 500 when there are interference around your network.
Full Duplex The ability of a networking device to receive and transmit data simultaneously. In wireless environment, this is usually done with 2 or more radios doing load balancing.
Gateway In the global Internet network, the gateways are core routers that connect networks in different IP subnet together. In a LAN environment with an IP sharing router, the gateway is the router. In an office environment, gateway typically is a multi-function device that integrates NAT, firewall, bandwidth management, and other security functions.
Hotspot A place where you can access Wi-Fi service. One is the wireless infrastructure deployment, the other is the Internet access billing system. In a hotspot system, a service provider typically need an authentication and account system for billing purposes, and a wireless AP network to provide access for customers.
IGMP Snooping Internet Group Management Protocol (IGMP) is a Layer 3 protocol to report IP multicast memberships to neighboring multicast switches and routers. IGMP snooping is a feature that allows an Ethernet switch to "listen in" on the IGMP conversation between hosts and routers. [. . . ] Wireless Network Glossary
TCP A layer-4 protocol used along with the IP to send data between computers over the Internet. While IP takes care of handling the actual delivery of the data, TCP takes care of keeping track of the packets that a message is divided into for efficient routing through the Internet.
Turbo A Turbo A is an Atheros proprietary turbo mode to increase speed over standard 802. 11a mode. This protocol may be combined with Super-A model to increase the performance even more. The used of channel binding might be prohibited in EU countries.
TX Output Power Transmit Output Power. [. . . ]
DISCLAIMER TO DOWNLOAD THE USER GUIDE AIRLIVE X.USB
Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual AIRLIVE X.USB will begin.