Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!
If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual AOPEN AOI-812. We hope that this AOPEN AOI-812 user guide will be useful to you.
Lastmanuals help download the user guide AOPEN AOI-812.
You may also download the following manuals related to this product:
AOPEN AOI-812 QUICK INSTALLATION GUIDE (266 ko)
Manual abstract: user guide AOPEN AOI-812
Detailed instructions for use are in the User's Guide.
[. . . ] User Manual
AOI-812 IEEE 802. 11g Wireless LAN PC Card
COPYRIGHT
Copyright 2004/2005 by this company. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the prior written permission of this company This company makes no representations or warranties, either expressed or implied, with respect to the contents hereof and specifically disclaims any warranties, merchantability or fitness for any particular purpose. Any software described in this manual is sold or licensed "as is". Should the programs prove defective following their purchase, the buyer (and not this company, its distributor, or its dealer) assumes the entire cost of all necessary servicing, repair, and any incidental or consequential damages resulting from any defect in the software. [. . . ] Select the number of the radio channel used for the networking. The channel setting should be the same as the network you are connecting to.
Fragment Threshold
Channel
9
Authentication vs. Security
Parameter Authentication Type Description This setting has to be consistent with the wireless networks that the card intends to connect. None No authentication is needed among the wireless network. Shared Only wireless stations using a shared key (WEP Key identified) are allowed to connect to each other. WPA-PSK It is a special mode designed for home and small business users who do not have access to network authentication servers. In this mode, known as Pre-Shared Key, the user manually enters the starting password in their access point or gateway, as well as in each wireless stations in the network. WPA takes over automatically from that point, keeping unauthorized users that don't have the matching password from joining the network, while encrypting the data traveling between authorized devices. The encryption methods include TKIP and AES. Note that this option is only available to Windows XP.
10
Parameter Encryption Mode
Description None Disable the WEP Data Encryption. WEP Enable the WEP Data Encryption. When the item is selected, you have to continue setting the WEP Encryption keys. TKIP TKIP (Temporal Key Integrity Protocol) changes the temporal key every 10, 000 packets (a packet is a kind of message transmitted over a network. ) This insures much greater security than the standard WEP security. AES AES has been developed to ensure the highest degree of security and authenticity for digital information and it is the most advanced solution defined by IEEE 802. 11i for the security in the wireless network. Note: All devices in the network should use the same encryption method to ensure the communication.
WPA Pre-Shared Key
The WPA-PSK key can be from eight to 64 characters and can be letters or numbers. This same key must be used on all of the wireless stations in the network. The WEP keys are used to encrypt data transmitted in the wireless network. There are two types of key length: 64-bit and 128-bit. Select the default encryption key from Key 1 to Key 4 by selecting the radio button. Fill the text box by following the rules below. 64-bit Input 10-digit Hex values (in the "A-F", "a-f" and "0-9" range) or 5-digit ASCII characters (including "a-z" and "0-9") as the encryption keys. For example: "0123456aef" or "test1". [. . . ] TKIP is a quick-fix method to quickly overcome the inherent weaknesses in WEP security, especially the reuse of encryption keys. TKIP is involved in the IEEE 802. 11i WLAN security standard, and the specification might be officially released by early 2003. AES (Advanced Encryption Standard), a chip-based security, has been developed to ensure the highest degree of security and authenticity for digital information, wherever and however communicated or stored, while making more efficient use of hardware and/or software than previous encryption standards. It is also included in IEEE 802. 11i standard. [. . . ]
DISCLAIMER TO DOWNLOAD THE USER GUIDE AOPEN AOI-812
Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service.
Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual AOPEN AOI-812 will begin.