605837
52
Zoom out
Zoom in
Previous page
1/52
Next page
Archer T2UH
AC600 High Gain Wireless Dual Band USB Adapter
Infrastructure Network - An infrastructure network is a group of computers or other devices,
each with a Wireless Adapter, connected as an 802.11 wireless LAN. In infrastructure mode,
the wireless devices communicate with each other and to a wired network by first going
through an access point. An infrastructure wireless network connected to a wired network is
referred to as a Basic Service Set (BSS). A set of two or more BSS in a single network is
referred to as an Extended Service Set (ESS). Infrastructure mode is useful at a corporation
scale, or when it is necessary to connect the wired and wireless networks.
Spread Spectrum - Spread Spectrum technology is a wideband radio frequency technique
developed by the military for use in reliable, secure, mission-critical communications systems.
It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other
words, more bandwidth is consumed than in the case of narrowband transmission, but the
trade off produces a signal that is, in effect, louder and thus easier to detect, provided that the
receiver knows the parameters of the spread-spectrum signal being broadcast. If a receiver is
not tuned to the right frequency, a spread-spectrum signal looks like background noise.
There are two main alternatives, Direct Sequence Spread Spectrum (DSSS) and Frequency
Hopping Spread Spectrum (FHSS).
SSID - A Service Set Identification is a thirty-two character (maximum) alphanumeric key
identifying a wireless local area network. For the wireless devices in a network to
communicate with each other, all devices must be configured with the same SSID. This is
typically the configuration parameter for a wireless PC card. It corresponds to the ESSID in
the wireless Access Point and to the wireless network name. See also Wireless Network
Name and ESSID.
WEP - (Wired Equivalent Privacy) - A data privacy mechanism based on a 64-bit or 128-bit or
152-bit shared key algorithm, as described in the IEEE 802.11 standard. To gain access to a
WEP network, you must know the key. The key is a string of characters that you create.
When using WEP, you must determine the level of encryption. The type of encryption
determines the key length. 128-bit encryption requires a longer key than 64-bit encryption.
Keys are defined by entering in a string in HEX (hexadecimal - using characters 0-9, A-F) or
ASCII (American Standard Code for Information Interchange alphanumeric characters)
format. ASCII format is provided so you can enter a string that is easier to remember. The
ASCII string is converted to HEX for use over the network. Four keys can be defined so that
you can change keys easily.
Wi-Fi - A trade name for the 802.11b wireless networking standard, given by the Wireless
Ethernet Compatibility Alliance (WECA, see http://www.wi-fi.net), an industry standards
group promoting interoperability among 802.11b devices.
WLAN - (Wireless Local Area Network) - A group of computers and associated devices
communicate with each other wirelessly, which network serving users are limited in a local
area.
WPA - (Wi-Fi Protected Access) - A wireless security protocol uses TKIP (Temporal Key
Integrity Protocol) encryption, which can be used in conjunction with a RADIUS server.
43
52


Need help? Post your question in this forum.

Forumrules


Report abuse

Libble takes abuse of its services very seriously. We're committed to dealing with such abuse according to the laws in your country of residence. When you submit a report, we'll investigate it and take the appropriate action. We'll get back to you only if we require additional details or have more information to share.

Product:

For example, Anti-Semitic content, racist content, or material that could result in a violent physical act.

For example, a credit card number, a personal identification number, or an unlisted home address. Note that email addresses and full names are not considered private information.

Forumrules

To achieve meaningful questions, we apply the following rules:

Register

Register getting emails for TP-LINK Archer T2UH AC600 at:


You will receive an email to register for one or both of the options.


Get your user manual by e-mail

Enter your email address to receive the manual of TP-LINK Archer T2UH AC600 in the language / languages: English as an attachment in your email.

The manual is 2,8 mb in size.

 

You will receive the manual in your email within minutes. If you have not received an email, then probably have entered the wrong email address or your mailbox is too full. In addition, it may be that your ISP may have a maximum size for emails to receive.

Others manual(s) of TP-LINK Archer T2UH AC600

TP-LINK Archer T2UH AC600 Installation Guide - English - 1 pages


The manual is sent by email. Check your email

If you have not received an email with the manual within fifteen minutes, it may be that you have a entered a wrong email address or that your ISP has set a maximum size to receive email that is smaller than the size of the manual.

The email address you have provided is not correct.

Please check the email address and correct it.

Your question is posted on this page

Would you like to receive an email when new answers and questions are posted? Please enter your email address.



Info