Home > TP-Link > Wireless > TP-Link N150 Wireless Nano USB Adapter (TL-WN725N) User Manual

TP-Link N150 Wireless Nano USB Adapter (TL-WN725N) User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual TP-Link N150 Wireless Nano USB Adapter (TL-WN725N) User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 13 TP-Link manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							TL-WN725N 150Mbps Wireless N Nano USB Adapter User Guide 
     
    34
     
    Figure 6-5 Uninstall Driver 
    2. Click  Yes to start uninstalling the driv er software from your PC. 
     
    Figure 6-6 
    3.  It may take a few minutes to undergo the whole un-installation process.  
    						
    							TL-WN725N 150Mbps Wireless N Nano USB Adapter User Guide 
     
    35
     
    Figure 6-7 
    4. Click  Finish when the figure below appears. 
     
    Figure 6-8    
    						
    							TL-WN725N 150Mbps Wireless N Nano USB Adapter User Guide 
     
    36
    Appendix A: Specifications 
    Normal 
    Interface USB 2.0 Interface 
    Standards IEEE  802.11n, IEEE 802.11g, IEEE 802.11b 
    Operating System  Windows XP, Windows Vista, Windows 7 
    Throughput 150Mbps  (Maximal) 
    Radio Data Rate 11b: 1/2/5.5/11Mbps 
    11g: 6/9/12/18/
    24/36/48/54Mbps 
    11n: Up to 150Mbps 
    Modulation  11b:CCK,QPSK,BPSK 
    11g:OFDM 
    11n: QPSK, BPSK, 16-QAM, 64-QAM 
    Media Access Protocol  CSMA/CA with ACK 
    Data Security 
    WEP, WPA/WPA2, WPA-PSK/ WPA2-PSK 
    Frequency*  2.4 ~ 2.4835GHz 
    Spread Spectrum  Direct Seque nce Spread Spectrum (DSSS) 
    Safety & Emissions  FCC, CE, IC, WIFI 
     
    Environmental and Physical 
    Working Temperature 0℃ ~40  (32 ℃ ~104
    ℉℉ ) 
    Working Humidity  10% ~ 90% RH, Non-condensing 
    Storage Temperature  -40 ~70 ( ℃℃-40 ~158℉ )
    ℉  
    Storage Humidity  5% ~  90% RH, Non-condensing 
    * Only 2.412GHz~2.462GHz is allowed to be used in USA, which means only channel 1~11 is 
    available for American users to choose.
      
    						
    							TL-WN725N 150Mbps Wireless N Nano USB Adapter User Guide 
     
    37
    Appendix B: Glossary 
    ¾ 802.11b - The 802.11b standard specifies a wirele ss product networking at 11 Mbps using 
    direct-sequence spread-s pectrum (DSSS) technology and oper ating in the unlicensed radio 
    spectrum at 2.4GHz, and WEP enc ryption for security. 802.11b networks are also referred to 
    as Wi-Fi networks. 
    ¾  802.11g  - specification for wireless network ing at 54 Mbps using direct-sequence 
    spread-spectrum (DSSS) tec hnology, using OFDM modulation and operat ing in the 
    unlicensed radio spectrum at  2.4GHz, and backward compatibility with IEEE 802.11b devices, 
    and WEP encryption for security. 
    ¾  802.11n -  802.11n builds upon previous 802.11 standards  by adding MIMO (multiple-input 
    multiple-output). MIMO us es multiple transmitter and 
    3receiver antennas to allow for increased 
    data throu
    ghput via spatial multiplexing and incr eased range by exploiting the spatial diversity, 
    perhaps through coding schemes  like Alamouti coding. The Enhanced Wireless Consortium 
    (EWC) was formed to help accelerate the  IEEE 802.11n development process and promote a 
    technology specificati on for interoperability of next-genera tion wireless local area networking 
    (WLAN) products. 
    ¾  Ad hoc Network - An ad hoc network is a group of com puters, each with a Wireless Adapter, 
    connected as an independent 802.11  wireless LAN. Ad hoc wireless computers operate on a 
    peer-to-peer basis, communicating directly with ea ch other without the use of an access point. 
    Ad hoc mode is also referred to as an I ndependent Basic Service Set (IBSS) or as 
    peer-to-peer mode, and is us eful at a departmental scale or SOHO operation.   
    ¾  DSSS - ( Direct- Sequence  Spread  Spectrum)  - DSSS generates a redundant bit pattern for all 
    data transmitted. This bit pattern is called a ch ip (or chipping code). Even if one or more bits 
    in the chip are damaged during transmission, st atistical techniques embedded in the receiver 
    can recover the original data without the ne ed of retransmission. To an unintended receiver, 
    DSSS appears as low power wideb and noise and is rejected (ignored) by most narrowband 
    receivers. However, to an intended receiver  (i.e. another wireless LAN endpoint), the DSSS 
    signal is recognized as the only valid signal, and  interference is inherently rejected (ignored). 
    ¾  FHSS - ( Frequency  Hopping  Spread  Spectrum)  - FHSS continuously changes (hops) the 
    carrier frequency of a conventional carrier  several times per second according to a 
    pseudo-random set of channels. Because a fi xed frequency is not used, and only the 
    transmitter and receiver know the hop patterns, interception of FHSS is extremely difficult. 
    ¾  Infrastructure Network -  An infrastructure network is a group of computers or other devices, 
    each with a Wireless Adapter, connected as an 802. 11 wireless LAN. In infrastructure mode, 
    the wireless devices communicate with each ot her and to a wired network by first going 
    through an access point. An infrastructure wi reless network connected to a wired network is 
    referred to as a Basic Service Set (BSS). A set  of two or more BSS in a single network is 
    referred to as an Extended Service Set (ESS). Infr astructure mode is useful at a corporation 
    scale, or when it is neces sary to connect the wired and wireless networks.    
    						
    							TL-WN725N 150Mbps Wireless N Nano USB Adapter User Guide 
     
    38
    ¾ Spread Spectrum -  Spread Spectrum technology is  a wideband radio frequency technique 
    developed by the military for use in reliable, se cure, mission-critical communications systems. 
    It is designed to trade off bandwidth efficiency for  reliability, integrity, and security. In other 
    words, more bandwidth is consumed than in t he case of narrowband transmission, but the 
    trade off produces a signal that is, in effect, louder and thus easier to  detect, provided that the 
    receiver knows the parameters of the spread-spectr um signal being broadcast. If a receiver is 
    not tuned to the right frequency, a spread-spectrum signal looks like background noise. 
    There are two main alternatives, Direct  Sequence Spread Spectrum (DSSS) and Frequency 
    Hopping Spread Spectrum (FHSS). 
    ¾  SSID -  A Service  Set  Identification is a thirty-two char acter (maximum) alphanumeric key 
    identifying a wireless local area network. Fo r the wireless devices in a network to 
    communicate with each other, all devices must be  configured with the same SSID. This is 
    typically the configuration parameter for a wireless PC card. It corresponds to the ESSID in 
    the wireless Access Point and to the wireless network name.  See also Wireless Network 
    Name and ESSID. 
    ¾  WEP - ( Wired  Equivalent  Privacy)  - A data privacy mechanism based  on a 64-bit or 128-bit or 
    152-bit shared key algorithm, as described in  the IEEE 802.11 standard. To gain access to a 
    WEP network, you must know the key. The key  is a string of characters that you create. 
    When using WEP, you must determine the leve l of encryption. The type of encryption 
    determines the key length. 128-bit encryption re quires a longer key than 64-bit encryption. 
    Keys are defined by entering in a string in HEX  (hexadecimal - using characters 0-9, A-F) or 
    ASCII (American Standard Code for Informati on Interchange – alphanumeric characters) 
    format. ASCII format is provided so you can  enter a string that is easier to remember. The 
    ASCII string is converted to HEX for use over  the network. Four keys can be defined so that 
    you can change keys easily. 
    ¾  Wi-Fi -  A trademark of the Wi-Fi Alliance and the  brand name for products using the IEEE 
    802.11 family of standards. 
    ¾  WLAN -  (W ireless  Local Area  Network) - A group of computers and associated devices 
    communicate with each other wirelessly, which network serving users are limited in a local 
    area. 
    ¾  WPA -  (W i-Fi  Protected
    
     A ccess)  - A wireless security protocol uses TKIP (Temporal Key 
    Integrity Protocol) encryption,  which can be used in conjunct ion with a RADIUS server. 
      
    						
    All TP-Link manuals Comments (0)