MPN
MPN: DYWL10EK
Main features
Form factor: the format indicates the mode of integration of the adapter in the device.
Internal
An internal adapter connects from the inside of a computer.
External
An external adapter connects to your computer through a port (USB or Ethernet).
Extension slot
The adapter is integrated with integrated laptop or other device with slots (PCMCIA, for example).External adapter
Compatibility of the interface: technology/interface standard used by an adapter to "communicate" with a system/computer.USB 2.0
Standard: A device supports a number of wireless standards that indicate features available to it, and the standards that the wireless adapter must itself take charge.IEEE 802.11 has
IEEE 802 .11b
IEEE 802.11n
IEEE 802.11 g
Wireless
Operating frequency: standards 802 .11b and 802.11 g use the 2.4 GHz signal frequency, which allows to achieve data rates high with longer spans. The WLAN 2.4 GHz are sometimes subject to interference from cordless phones, microwaves and other WLAN. The 802.11 standard uses the 5 GHz signal frequency, which also offer a much plu spectrum for its partwide s, is relatively prone to interference. 2, 4 GHz
5 GHz
Data rates 802 has: data rate supported by the device with this type of connection. A device can support multiple flows of data. 54 Mbps, 48 Mbps, 36 Mbps 24 Mbps, 18 Mbps, 12 Mbps, 9 Mbps, 6 Mbps
802 .11B data rates: data rate supported by the device with this type of connection. A device can support multiple flows of data. 11 Mbps, 5.5 Mbps, 2 Mbps, 1 Mbps
802.11 G data rates: data rate supported by the device with this type of connection. A device can support multiple flows of data. 54 Mbps, 48 Mbps, 36 Mbps 24 Mbps, 28 Mbps, 12 Mbps, 9 Mbps, 6 Mbps, 5.5 Mbps, 2 Mbps, 1 Mbps
Channel 802.11: 802.11 b/g: 11 (North America), 13 (Europe), 14 (Japan), 802.11 has: 8 (North America), 4 (Japan)
Security
Length of WEP encryption: WEP data encryption, defined by the 802.11 standard, is used to provide a network of two major security functions:
first of all, to prevent unauthorized access to the network with a similar wireless LAN equipment and, secondly, to prevent any interception of traffic on the LAN.
The WEP standard works on the following principle: the administrator is authorizedto define, through the algorithm encryption WEP and on the basis of a "string key", "keys" for each user in the wireless network. All persons who are not key 40 bit (= 64 bit) is simply denied access
128-bit
Security: All wireless access points must ensure a level of security to protect access to the data that you pass. It security standards to which the device is consistent.TKIP
AES
WPA - PSK
WPA2-PSK
Other features
Operating voltage: 5 volts
Packaging: 1
Dimension
Width: 4.4 cm
Depth: 7.3 cm
Height: 2.9 cm
Various
Product no.: 98760362
No comment was published at the time.
Only registered users can post comments.