User manual TP-LINK TL-WN353G

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual TP-LINK TL-WN353G. We hope that this TP-LINK TL-WN353G user guide will be useful to you.


TP-LINK TL-WN353G : Download the complete user guide (750 Ko)

You may also download the following manuals related to this product:

   TP-LINK TL-WN353G INSTALLATION GUIDE (1894 ko)

Manual abstract: user guide TP-LINK TL-WN353G

Detailed instructions for use are in the User's Guide.

[. . . ] TL-WN353G 54M Wireless PCI Adapter COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from TP-LINK TECHNOLOGIES CO. , LTD. Other brands and product names are trademarks or FCC STATEMENT This equipment has been tested and found to comply with the limits for a class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. [. . . ] Wireless network security - This configure the security for the adapter. Note: You should configure the security for the adapter according with the wireless network that you want to connect. If the wireless network takes some security measure, you should configure the same security for the adapter accordingly. If the wireless network doesn't take security measure, you don't need to configure the security for the adapter. · Network Authentication - Select which mode the Wireless PCI Adapter uses to authenticate to an access point. These modes are: Open System, Shared key, WPA-PSK, WPA2-PSK, WPA 802. 1X, WPA2 802. 1X, WEP 802. 1X. Data encryption - Select the corresponding data encryption for the authentication. These encryptions are: Disabled, WEP, TKIP and AES. · 11 TL-WN353G Note: 54M Wireless PCI Adapter User Guide 1) Select different authentications and data encryptions, the security configuration is different. 2) When you select channel manually, the available network authentication are Open System, Shared key and WPA-None. 3) The RTWCU does not support WPA 802. 1x authentication in Windows Vista, while the Windows Zero Config Tools may satisfy your need. · · · · ASCII - Select this option, you can enter any ASCII characters to compose the password. PASSPHRASE - Select this option, you can enter the characters from 0~9 to compose the password. Network Key & Confirm network key - The fields configure the network key. The two should be the same. 802. 1x configure - This configures the 802. 1x security, it is available when you select the data encryption as WPA 802. 1X, WPA2 802. 1X or WEP 802. 1X. EAP TYPE - Select the EAP type for the 802. 1x configuration, the options are: GTC, TLS, LEAP, TTLS, PEAP. Certificate - Select the certificate you apply. Open System authentication When you select the Open System as the authentication, the Disabled and WEP can be available for the data encryption. If you select Disabled, you don't need to configure any passwords. For example: If the wireless network takes Open System authentication, WEP data encryption, the password is 64bit with the value of 0123456789. The index is 1. 12 TL-WN353G 54M Wireless PCI Adapter User Guide Figure 3-7 Step 1: Select the "Open System" as the Network Authentication. Step 3: Select the type for the password, you can select the ASCII or PASSPHRASE. For ASCII, you can enter any characters in the keyboard; For PASSPHRASE, you can enter the characters from 0 to 9. Step 4: Select "64 Bits" as the Key Length, then enter "0123456789" as the password value. [. . . ] Ad-hoc wireless computers operate on a peer-to-peer basis, communicating directly with each other without the use of an access point. Ad-hoc mode is also referred to as an Independent Basic Service Set (IBSS) or as peer-to-peer mode, and is useful at a departmental scale or SOHO operation. DSSS (Direct-Sequence Spread Spectrum) - DSSS generates a redundant bit pattern for all data transmitted. Even if one or more bits in the chip are damaged during transmission, statistical techniques embedded in the receiver can recover the original data without the need of retransmission. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE TP-LINK TL-WN353G




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual TP-LINK TL-WN353G will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.