User manual TP-LINK TL-WN620G
Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!
If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual TP-LINK TL-WN620G. We hope that this TP-LINK TL-WN620G user guide will be useful to you.
Lastmanuals help download the user guide TP-LINK TL-WN620G.
You may also download the following manuals related to this product:
TP-LINK TL-WN620G INSTALLATION GUIDE (8282 ko)
Manual abstract: user guide TP-LINK TL-WN620G
Detailed instructions for use are in the User's Guide.
[. . . ] TL-WN620G 108M Wireless USB Adapter
108Mbps Super GTM 2X to 3x eXtended RangeTM 2. 4GHz 802. 11b/g
Rev1. 0. 1
COPYRIGHT & TRADEMARKS
Specifications are subject to change without notice. registered trademarks of their respective holders. No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from TP-LINK TECHNOLOGIES CO. , LTD. Copyright © 2007 TP-LINK TECHNOLOGIES CO. , LTD. [. . . ] The Profile Management dialog box will display a screen similar to that shown in Figure 3-4. Edit the General tab Profile Name - Identifies the configuration profile. Client Name - Identifies the client machine. Network Names (SSIDs) - The IEEE 802. 11 wireless network name. This field has a maximum limit of 32 characters.
Figure 3-4 General Tab of Profile Management 2. Edit the Security tab
Edit the fields in the Security tab of Profile Management to configure the profile. To define the security mode, select the radio button of the desired security mode. WPA/WPA2 - Wi-Fi Protected Access WPA/WPA2 Passphrase - Wi-Fi Protected Access Passphrase 802. 1x - Enables 802. 1x security. Shared Key (Static WEP) - Enables the use of shared keys that are defined on both the access point and the station. To define shared encryption keys, choose the Shared Key radio button and click the Configure button to fill in the Define Shared Keys window. None: No security (not recommended).
11
TL-WN620G Note:
108M Wireless USB Adapter User Guide
If the access point that the wireless adapter is associating to has WEP set to optional and the client has WEP enabled, make sure that Allow Association to Mixed Cells is checked on the Security Tab to allow association. To complete WEP encryption configuration, you must select the 802. 11 Authentication Mode as appropriate on the Advanced tab of this Profile Management dialog.
Figure 3-5 Security tab of Profile Management
Figure 3-6 Define Shared Keys 3. Edit the Advanced tab Power Save Mode · Maximum - Select maximum mode to let the access point buffer incoming messages for the wireless adapter. The adapter will detect the access point if any messages are 12
TL-WN620G waiting periodically. · ·
108M Wireless USB Adapter User Guide
Normal - In Normal mode, the adapter will be switched to maximum mode automatically when no large packets are retrieved. Off - turns power saving off, thus powering up the wireless adapter continuously for a short message response time.
802. 11b Preamble - Specifies the preamble setting in 802. 11b. The default setting is Short & Long (access point mode), which allows both short and long headers in the 802. 11b frames. The adapter can only use short radio headers if the access point supports and uses them. Set to Long Only to override allowing short frames. Wireless Mode - Specifies 2. 4 GHz 54 Mbps, 2. 4 GHz 11 Mbps, or Super G operation in an access point network. The wireless adapter must match the wireless mode of the access point with which it associates. Wireless Mode when Starting an Ad Hoc Network - Specifies Super G or 2. 4 GHz 54/11 Mbps to start an ad hoc network if no matching network name is found after scanning all available modes. [. . . ] This bit pattern is called a chip (or chipping code). Even if one or more bits in the chip are damaged during transmission, statistical techniques embedded in the receiver can recover the original data without the need for retransmission. To an unintended receiver, DSSS appears as low power wideband noise and is rejected (ignored) by most narrowband receivers. another wireless LAN endpoint), the DSSS signal is recognized as the only valid signal, and interference is inherently rejected (ignored). [. . . ]
DISCLAIMER TO DOWNLOAD THE USER GUIDE TP-LINK TL-WN620G Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service. Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual TP-LINK TL-WN620G will begin.