User manual ASUS M2N-VM DH
Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!
If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual ASUS M2N-VM DH. We hope that this ASUS M2N-VM DH user guide will be useful to you.
Lastmanuals help download the user guide ASUS M2N-VM DH.
Manual abstract: user guide ASUS M2N-VM DH
Detailed instructions for use are in the User's Guide.
[. . . ] E2949
®
User Guide
E2949 Third Edition V3 December 2006
Copyright © 2006 ASUSTeK COMPUTER INC. All Rights Reserved.
No part of this manual, including the products and software described in it, may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means, except documentation kept by the purchaser for backup purposes, without the express written permission of ASUSTeK COMPUTER INC. Product warranty or service will not be extended if: (1) the product is repaired, modified or altered, unless such repair, modification of alteration is authorized in writing by ASUS; or (2) the serial number of the product is defaced or missing.
ASUS PROVIDES THIS MANUAL "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OR CONDITIONS OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL ASUS, ITS DIRECTORS, OFFICERS, EMPLOYEES OR AGENTS BE LIABLE FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES (INCLUDING DAMAGES FOR LOSS OF PROFITS, LOSS OF BUSINESS, LOSS OF USE OR DATA, INTERRUPTION OF BUSINESS AND THE LIKE), EVEN IF ASUS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES ARISING FROM ANY DEFECT OR ERROR IN THIS MANUAL OR PRODUCT. [. . . ] Combination of letters, numbers and non alphnumeric charecters is recommended for ensuring security.
3-15
Encryption
Encryption is used to convert plain text data into unreadable codes with certain type of algorithm before capsulation for wireless transmission. WiFi-AP Solo supports the following encryption methods: WEP: WEP stands for Wired Equivalent Privacy. You can let the system generate the WEP keys by inputting a Passphrase. TKIP: AES: Temporal Key Integrity Protocol (TKIP) dynamically generates unique keys to encypt every data packet in a wireless session. Advanced Encryption Standard (AES) is a dependable encryption adopted in WPA2 or IEEE802. 11i standard. It offers stronger protection and greatly increases the complexity of wireless encryption. TKIP + AES: For a network where WPA clients (using TKIP encryption) and WPA2 clients (using AES encryption) co-exit. Select this option to enable both.
3-16
Glossary
4-1
Access Point (AP)
A networking device that seamlessly connects wired and wireless networks. Access Points combined with a distributed system support the creation of multiple radio cells that enable roaming throughout a facility.
Ad Hoc
A wireless network composed solely of stations within mutual communication range of each other (no Access Point).
Basic Rate Set
This option allows you to specify the data transmission rate.
Basic Service Area (BSS) Broadband
A set of stations controlled by a single coordination function. A type of data transmission in which a single medium (such as cable) carries several channels of data at once.
Channel
An instance of medium use for the purpose of passing protocol data units that may be used simultaneously, in the same volume of space, with other instances of medium use (on other channels) by other instances of the same physical layer, with an acceptably low frame error ratio due to mutual interference.
Client
A client is the desktop or mobile PC that is connected to your network.
COFDM (for 802. 11a or 802. 11g)
Signal power alone is not enough to maintain 802. 11b-like distances in an 802. 11a/g environment. To compensate, a new physical-layer encoding technology was designed that departs from the traditional direct-sequence technology being deployed today. This technology is called COFDM (coded OFDM). COFDM was developed specifically for indoor wireless use and offers performance much superior to that of spread-spectrum solutions. COFDM works by breaking one high-speed data carrier into several lower-speed subcarriers, which are then transmitted in parallel. Each high-speed carrier is 20 MHz wide and is broken up into 52 subchannels, each approximately 300 KHz wide. COFDM uses 48 of these subchannels for data, while the remaining four are used for error correction. COFDM delivers higher data rates and a high degree of multipath reflection recovery, thanks to its encoding scheme and error correction.
4-2
Each subchannel in the COFDM implementation is about 300 KHz wide. At the low end of the speed gradient, BPSK (binary phase shift keying) is used to encode 125 Kbps of data per channel, resulting in a 6, 000-Kbps, or 6 Mbps, data rate. Using quadrature phase shift keying, you can double the amount of data encoded to 250 Kbps per channel, yielding a 12-Mbps data rate. And by using 16-level quadrature amplitude modulation encoding 4 bits per hertz, you can achieve a data rate of 24 Mbps. The 802. 11a/g standard specifies that all 802. 11a/g-compliant products must support these basic data rates. The standard also lets the vendor extend the modulation scheme beyond 24 Mbps. [. . . ] These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: · · · · Reorient or relocate the receiving antenna. [. . . ]
DISCLAIMER TO DOWNLOAD THE USER GUIDE ASUS M2N-VM DH Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service. Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual ASUS M2N-VM DH will begin.