MPN
MPN: 1746036000
Key Features
WLAN Standards: IEEE 802.11a
IEEE 802.11b
IEEE 802.11n
IEEE 802.11g
Interfaces
Interfaces LAN: 10 Base-T
10/100 Base-T
10/100/1000 Base-T
Standards and Protocols
Protocols: The protocols are standard formats for converting data between devices. They determine many aspects of data: error checking, compression types and names of the procedures for sending and retrieving data from the devices. Programmers can choose from a wide variety of standard protocols, each with their advantages and disadvantages. Some are easier than others, some are more reliable and more faster. The key for the user that the device uses the correct protocol to communicate with other ordinateurs.DHCP
IP
PPPoE
PPTP
L2TP
Wireless
Data Rates 802.11a: 54 Mbps, 48 ​​Mbps, 36 Mbps, 24 Mbps, 18 Mbps, 12 Mbps, 9 Mbps, 6 Mbps
802.11b data rates: 11 Mbps, 5.5 Mbps, 2 Mbps, 1 Mbps
802.11g data rates: 54 Mbps, 48 ​​Mbps, 36 Mbps, 24 Mbps, 28 Mbps, 12 Mbps, 9 Mbps, 6 Mbps, 5.5 Mbps, 2 Mbps, 1 Mbps
Modulation: There are many standards of modulation. The most commonly used are:
DSSS
The norme DSSS (Direct-Sequence Spread Spectrum) is a transmission technology that combines the data signal to a sequence of data bits higher technique called "chipping." This ensures an increased resistance to noise and better data integrity.
OFDM
The standard OFDM (Orthogonal Frequency Division Multiplexing) is to transmit digital data by radio wave by dividing a radio signal into multiple sub-signals. These signals are then transmitted simultaneously at different frequencies. This modulation technique has the advantage of reducing the crosstalk noise.
CCK
CCK (Complementary Code Keying) uses a sequence of 64 code words 8 bits to encode data. This results in speeds of 5.5 and 11 Mb / s in the 2.4 GHz band of laOFDM
CCK
QPSK
BPSK
DBPSK
DQPSK
16QAM
64QAM
DSSS
WEP Encryption Length: WEP data encryption, as defined by the 802.11 standard, is used to build a network of two main security features: the first is to prevent unauthorized persons can access the network using a similar wireless LAN equipment. The second is to prevent unauthorized traffic on the LAN. WEP works on the following principle: the administrator can define "key" for each user of the wireless network and accesss is denied to all persons who have no clé.40 bits (= 64 bit)
Various
UPC: 4719543332467
Product No.: 105095807