User manual BELKIN F5D6051

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual BELKIN F5D6051. We hope that this BELKIN F5D6051 user guide will be useful to you.


BELKIN F5D6051 : Download the complete user guide (3197 Ko)

You may also download the following manuals related to this product:

   BELKIN F5D6051 (1301 ko)

Manual abstract: user guide BELKIN F5D6051

Detailed instructions for use are in the User's Guide.

[. . . ] Wireless B USB Network Adapter Connect your desktop or notebook computer to a wireless network Mbps 2. 4GHz 802. 11g Wireless User Manual Mbps 2. 4GHz 802. 11b Wireless F5D6051 Table of Contents 1 Introduction . 1 Placement of your Wireless Networking Hardware for Optimal Performance . 38 Introduction section Congratulations and thank you for purchasing the Belkin Wireless B USB Network Adapter (the Adapter). It gives you the freedom to roam within your wireless range while connected to your home or office network--and the Internet--without using cables. [. . . ] Minimum Power Save mode will partially shut the Adapter off to reduce power consumption, but the radio will still be on, ready to transmit or receive. Maximum Power Save mode will completely shut the Adapter down when there is no activity. When there is activity, the Adapter will turn itself back on and begin transmitting or receiving data. This introduces a short delay, but will save the most battery power on your laptop. Setting the Default Ad-Hoc Channel You can select the channel you want the Adapter to operate in when it is set for Ad-Hoc (peer-to-peer) mode. In an Ad-Hoc configuration, one client initiates the connection by broadcasting its presence as an Ad-Hoc client. The rest of the clients will connect to the initial client, making the initial client's channel the channel that all of the clients will operate on. The default Ad-Hoc channel is 11. Showing the Icon in System Tray You can choose to display the Utility icon in the system tray. By placing a check in the box, the icon will be displayed in the system tray. When there is no icon in the system tray, you can access the Utility by using the desktop shortcut. Turning the Radio Off You can manually turn the radio off by placing a check in the box. This will disable the Adapter until you turn it back on. 22 Securing your Wireless Network 1 2 3 4 128-bit Wired Equivalent Privacy 128-bit WEP Better Static keys Securing your Wi-Fi Network Here are a few different ways to maximize the security of your wireless network and protect your data from unwanted intrusions. This section is intended for the home, home office, and small office user. At the time of publication, three encryption methods are available. Encryption Methods: Name Acronym Security Features 64-bit Wired Equivalent Privacy 64-bit WEP Good Static keys 5 section 6 7 Encryption keys based on Added security over 64-bit WEP RC4 algorithm (typically 40- using a key length of 104 bits, plus bit keys) 24 additional bits of system-generated data Life span 1997-2003 1997-2003 23 Securing your Wireless Network WEP (Wired Equivalent Privacy) WEP (Wired Equivalent Privacy) is a common protocol that adds security to all Wi-Fi-compliant wireless products. WEP gives wireless networks the equivalent level of privacy protection as a comparable wired network. 64-Bit WEP 64-bit WEP was first introduced with 64-bit encryption, which includes a key length of 40 bits plus 24 additional bits of system-generated data (64 bits total). Shortly after the technology was introduced, researchers found that 64-bit encryption was too easy to decode. 128-Bit WEP As a result of 64-bit WEP's potential security weaknesses, a more secure method of 128-bit encryption was developed. 128-bit encryption includes a key length of 104 bits plus 24 additional bits of system-generated data (128 bits total). Most of the new wireless equipment in the market today supports both 64-bit and 128-bit WEP encryption, but you might have older equipment that only supports 64-bit WEP. All Belkin wireless products will support both 64-bit and 128-bit WEP. Encryption Keys After selecting either the 64-bit or 128-bit WEP encryption mode, it is critical that you generate an encryption key. If the encryption key is not consistent throughout the entire wireless network, your wireless networking devices will be unable to communicate with one another. You can enter your key by typing in the hex key manually, or you can type a passphrase into the "Passphrase" field and click "Generate" to create a key. A hex (hexadecimal) key is a mixture of numbers and 24 Securing your Wireless Network 1 2 3 4 5 section letters from A­F and 0­9. For instance: AF0F4BC3D4 = 64-bit WEP key C3030FAF0F4BB2C3D44BC3D4E7 = 128-bit WEP key The WEP passphrase is NOT the same as a WEP key. Your Adapter uses this passphrase to generate your WEP keys, but different hardware manufacturers might have different methods on generating the keys. [. . . ] Nevertheless, the device shall be used in such manner that the potential for human contact normal operation is minimized. When connecting an external antenna to the device, the antenna shall be placed in such a manner to minimize the potential for human contact during normal operation. In order to avoid the possibility of exceeding the FCC radio frequency exposure limits, human proximity to the antenna shall not be less than 20cm (8 inches) during normal operation. Federal Communications Commission Notice This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE BELKIN F5D6051




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual BELKIN F5D6051 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.