Hama WLAN USB Stick, 54 Mbps Betriebsanleitung Seite 16

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 20
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 15
15
8.2 Detailed confi guration
When confi guring your Hama WLAN USB stick, it is useful to create a profi le. A profi le serves to save
various settings for a connection under a certain name. For example, if you want to connect to various wire-
less networks, you can save the settings for the networks in profi les, which allows you to change
the confi guration quickly.
8.2.1 Creating a new profi le
You need the following information to create a profi le (Profi le):
SSID (network ID): This is the name of the required network.
Encryption Type: Encryption used in the target network
(Network Type): (type of network): Infrastructure or ad-hoc
Open the Wireless Utility. Using the Network overview (Site survey) tab, you can select the required network
and then open the dialog box using the ADD PROFILE button, or open the Profi le tab and start the dialog box by
clicking the ADD button.
First enter a name for your profi le (Profi le name).
Under SSID, select the network you want to connect to
from the list of available networks.
To reduce the energy consumption, you can run the
stick in Power saving mode. In this mode, certain
functions are deactivated or run at a lower setting if
they are not fully used. Select CAM (Constantly Awake
Mode), if you want to run the stick at full power all
the time.
This Hama WLAN USB Stick allows you to set up two different network types. Select Infrastructure under
Network type, if you want to connect to a router or access point. The settings for TX Power, RTS Threshold
and Fragment Threshold can be left at the default settings.
If you want to connect to another WLAN client device without a router or access point,
select 802.11 Ad-hoc.
The settings for TX Power, Channel, RTS Threshold and Fragment Threshold can be left at the
default settings.
8.2.2 Setting the wireless LAN encryption
First, it is important to understand a range of terms. The next section will explain the main terms
used here:
Authentication: Authentication is a process in which the identity, e.g. of a person is determined based on a
certain characteristic. This can be done by fi ngerprint, password or any other proof of authorisation.
Encryption: Encryption is a process in which a plain text is transformed into a coded text via an encryption
process (algorithm). One or more codes can be used for this.
Seitenansicht 15
1 2 ... 11 12 13 14 15 16 17 18 19 20

Kommentare zu diesen Handbüchern

Keine Kommentare