Topcom SKYR@CER USB 4001G user manual

User manual for the device Topcom SKYR@CER USB 4001G

Device: Topcom SKYR@CER USB 4001G
Category: Computer Drive
Manufacturer: Topcom
Size: 0.73 MB
Added : 8/19/2014
Number of pages: 30
Print the manual

Download

How to use this site?

Our goal is to provide you with a quick access to the content of the user manual for Topcom SKYR@CER USB 4001G. Using the online preview, you can quickly view the contents and go to the page where you will find the solution to your problem with Topcom SKYR@CER USB 4001G.

For your convenience

If looking through the Topcom SKYR@CER USB 4001G user manual directly on this website is not convenient for you, there are two possible solutions:

  • Full Screen Viewing - to easily view the user manual (without downloading it to your computer), you can use full-screen viewing mode. To start viewing the user manual Topcom SKYR@CER USB 4001G on full screen, use the button Fullscreen.
  • Downloading to your computer - You can also download the user manual Topcom SKYR@CER USB 4001G to your computer and keep it in your files. However, if you do not want to take up too much of your disk space, you can always download it in the future from ManualsBase.
Topcom SKYR@CER USB 4001G User manual - Online PDF
Advertisement
« Page 1 of 30 »
Advertisement
Print version

Many people prefer to read the documents not on the screen, but in the printed version. The option to print the manual has also been provided, and you can use it by clicking the link above - Print the manual. You do not have to print the entire manual Topcom SKYR@CER USB 4001G but the selected pages only. paper.

Summaries

Below you will find previews of the content of the user manuals presented on the following pages to Topcom SKYR@CER USB 4001G. If you want to quickly view the content of pages found on the following pages of the manual, you can use them.

Abstracts of contents
Summary of the content on the page No. 1
















Skyr@cer USB 4001g
Skyr@cer USB 4001g




Full User Guide

Summary of the content on the page No. 2

Summary of the content on the page No. 3

CONTENTS 1.1 Features......................................................................................................................... 2 1.2 Specifications................................................................................................................ 2 1.3 Package Contents.......................................................................................................... 3 3.1 Site Survey........................................................................

Summary of the content on the page No. 4

1 Introduction Thank you for purchasing the 802.11g Wireless LAN USB Adapter. This USB adapter is designed to comply with IEEE 802.11g Wireless LAN standard and easy to carry with the Mini size. It is suitable for any Laptop or Desktop computers. This adaptor supports higher data throughput than the IEEE 802.11g standard (up to 54Mbps). It supports specific ways to increase the data transfer rate at a time; compress the data and decrease the waiting time to send the next data to the

Summary of the content on the page No. 5

1.1 Features • Complies with the IEEE 802.11b and IEEE 802.11g 2.4GHz (DSSS) standards. • High data transfer rate – up to 54Mbps. • Supports Turbo Mode to enhance the data transfer speed within the specific wireless network. • Supports 64/128-bit WEP, WPA (TKIP with IEEE 802.1x), WPA2 (AES with IEEE 802.1x) functions for high level of security. • Supports the most popular operating system: Windows 98SE/Me/2000/XP/2003 Server. • Supports USB 2.0/1.1/1.0 interface. • Portable and mini-s

Summary of the content on the page No. 6

1.3 Package Contents Before you begin the installation, please check the items of your package. The package should include the following items: • One USB Adaptor • One CD (Driver/Utility/User’s Manual) 3

Summary of the content on the page No. 7

2 Installation Procedure Before you proceed with the installation, please notice following descriptions. Note1: Please do not install the adaptor into your computer before installing the software program from the CD. Note2: The following installation was operated under Windows XP. (Procedures are similar for Windows 2000/2003 Server.) Note3: If you have installed the Turbo Wireless LAN USB Adaptor driver & utility before, please uninstall the old version first. A. Insert the Instal

Summary of the content on the page No. 8

C. If you need the adaptor to operate with better performance, please choose the “Optimize for performance” to enable the Tx Burst mode. Or you can choose “Optimize for Wi-Fi mode” to let the adaptor run in standard wireless network. 5

Summary of the content on the page No. 9

D. The system starts to install the software of the adaptor. Please follow the instructions of the program to plug in the adaptor into the USB port of your computer. And the system will automatically detect the adaptor E. Please click “Finish” to complete the installation. 6

Summary of the content on the page No. 10

3 Configuration Utility The Topcom Configuration Utility is a powerful application that helps you configure the USB adaptor and monitor the link status and the statistics during the communication process. When the adaptor is installed, the configuration utility will be displayed automatically. This adaptor will auto connect to wireless device which has better signal strength and no wireless security setting. The Topcom Configuration Utility appears as an icon on the system tray o

Summary of the content on the page No. 11

3.1 Site Survey When you open the Topcom Configuration Utility, the system will scan all the channels to find all the access points/stations within the accessible range of your adaptor and automatically connect to the wireless device with the highest signal strength. From the “Site Survey”, all the networks nearby will be listed. You can change the connection to another networks or add one of the networks to your own profile list. Parameter Description Available Networks This

Summary of the content on the page No. 12

3.2 Profile The “Profiles List” is for you to manage the networks you connect to frequently. You are able to Add/Delete/Edit/Activate a profile. Parameter Description Profiles List The profiles list display all the profiles and the relative settings of the profiles including Profile Name, SSID, Channel, etc. This sign indicates the activated profile is been connecting. This sign indicates the activated profile is not been connecting. Add/Delete/Edit Button Click the

Summary of the content on the page No. 13

3.2.1 Configure the Profile 3.2.1.1 Configuration Parameter Description Profile Name Define a recognizable profile name for you to identify the different networks. SSID The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs. You may specify a SSID for the adaptor and then only the device with the same SSID can interconnect to the adaptor. If you want to add the network n

Summary of the content on the page No. 14

Parameter Description PSM (Power Saving Mode) The power saving function is only available when the network type is in Infrastructure. CAM (Constantly Awake Mode) – The adaptor will always set in active mode. PSM (Power Saving Mode) – Enable the adaptor in the power saving mode when it is idle. Network Type Infrastructure – This operation mode requires the presence of an 802.11 Access Point. All communication is done via the Access Point or Router. Ad-Hoc – Select this mode i

Summary of the content on the page No. 15

Parameter Description RTS Threshold Minimum packet size required for an RTS (Request To Send). For packets smaller than this threshold, an RTS is not sent and the packet is transmitted directly to the wireless network. Select a setting within a range of 0 to 2347 bytes. Minor change is recommended. Fragment Threshold The value defines the maximum size of packets; any packet size larger than the value will be fragmented. If you have decreased this value and experience high packet erro

Summary of the content on the page No. 16

Parameter Description Authentication Type LEAP – LEAP is a pre-EAP, Cisco-proprietary protocol, with many of the features of EAP protocols. Cisco controls the ability of other vendors to implement this protocol, so it should be selected for use only when limited vendor choice for client, access-point, and server products is not a concern. When you have set up LEAP authentication, you have to enter the user name and password of your computer. WPA – WPA provides a scheme of mutual auth

Summary of the content on the page No. 17

Parameter Description Encryption Mode None – Disable the encryption mode. WEP – Enable the WEP Data Encryption. When the item is selected, you have to continue setting the WEP Encryption keys. TKIP – TKIP (Temporal Key Integrity Protocol) changes the temporal key every 10,000 packets (a packet is a kind of message transmitted over a network.) This ensures much greater security than the standard WEP security. AES – AES has been developed to ensure the highest degree of security a

Summary of the content on the page No. 18

The IEEE 802.1X specification describes a protocol that can be used for authenticating both clients and servers on a network. The authentication algorithms and methods are those provided by the Extensible Authentication Protocol (EAP), a method of authentication that has been in use for a number of years on networks that provide Point-to-Point Protocol (PPP) support as many internet service providers and enterprises do. When an AP acting as an authenticator detects a wireless stat

Summary of the content on the page No. 19

3.2.1.3 802.1x Setting-Certification Parameter Description Authentication Type The EAP authentication protocols this adaptor has supported are included as follows. This setting has to be consistent with the wireless APs or Routers that the adaptor intends to connect. PEAP &TTLS – PEAP and TTLS are similar and easier than TLS in that they specify a stand-alone authentication protocol be used within an encrypted tunnel. TTLS supports any protocol within its tunnel, including CHAP, MS-

Summary of the content on the page No. 20

Parameter Description Tunneled Authentication Protocol When the authentication type is PEAP or TTLS, select a protocol to be used to build the encrypted tunnel. Identity This is the protected user EAP Identity used for authentication. The identity specified may contain up to 63 ASCII characters, is case sensitive and takes the form of a Network Access Identifier, consisting of @. The user’s home realm is optional and indicates the rout


Alternative user manuals
# User manual Category Download
1 Topcom SKYR@CER 8144827 User manual Computer Drive 3
2 Topcom Wireless USB Stick User manual Computer Drive 16
3 Sony MSH-128S2 User manual Computer Drive 2
4 Sony 2GB Flash Drive USM2GLX User manual Computer Drive 0
5 Sony SAITE1300-F User manual Computer Drive 0
6 Sony CRX - 160E User manual Computer Drive 0
7 Sony 2GN User manual Computer Drive 0
8 Sony 7819900133 User manual Computer Drive 0
9 Sony USM512U2 User manual Computer Drive 0
10 Sony DRX-S70U-W User manual Computer Drive 22
11 Sony BDX-S500U User manual Computer Drive 29
12 Sony 500gb External Hard Disk Drive HDEG5/B User manual Computer Drive 1
13 Sony VAIO VPCSB User manual Computer Drive 39
14 Sony 500gb External Hard Disk Drive HDEG5B User manual Computer Drive 2
15 Sony 2-586-675-11 (1) User manual Computer Drive 0