Preview

Engineering Research Paper

Satisfactory Essays
Open Document
Open Document
1272 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Engineering Research Paper
Package Contents

1 Hardware Connection
Wireless Router
Cable/DSL Modem

Quick Installation Guide
54Mbps Wireless Router
TL-WR ss Router 54M Wirele 340G
WLAN PWR SYS WAN 1 2 3 4

TL-WR340G/TL-WR340GD

Power Adapter

RJ45

Internet

3 2
54Mbps Wireless Router

POWER

4

3

2

1

WAN

RESET

LAN

LINE

1
Cable
Line

Cable

MODEL NO.

TL-WR340G/TL-WR340GD

Ethernet Cable

Resource CD

QIG

Step 1. System Requirement
· Windows 7
MODEL NO.

Connect the WAN port on your Router to the Modem’s LAN port with an Ethernet cable. Connect your computer to any Port labeled 1~4 on the Router with an Ethernet cable. Plug the provided Power Adapter into the Power jack on the back of the Router and the other end to a standard electrical Wall socket, and power on the Modem.

Step 2. Step 3.
· Windows XP · Windows 2000

· Windows Vista

TL-WR340G/TL-WR340GD

2 Connecting by Easy Setup Assistant
The Easy Setup Assistant is not supported in Linux or Mac OS. If you are runing Linux /Mac or without CD-ROM, please refer to Appendix 1.

1

Insert the TP-LINK Resource CD into the CD-ROM drive.

3

After con rming the hardware connection and the status of LEDs, click Next to continue.

5

Select the connection type your ISP provides and click Next. Here we take connection type PPPoE for example.

7

Create a unique or easy-to-remember name for your wireless network. You can also keep the default setting. Click Next to continue.

2

Here we take TL-WR340G for example. Select TL-WR340G and click Easy Setup Assistant.

4

After the connectivity has been checked successfully, please click Next to continue.

6

Enter the User Name and Password provided by your ISP and then click Next.

8

You are recommended to select Most Security (WPA2-PSK) to secure your wireless network. Enter a key of 8~63 characters and click Next.

(Turn over)
7106503567

2 Connecting by Easy Setup Assistant
9
NEXT

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Before beginning the labs, set up the wireless network just as you did last week. Remember: You will need to configure the routers for every lab period for every lab meeting. Use the same settings you used last week (if they differ from the worksheet) and the same router/network you assigned to each student. Remind…

    • 411 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Refer to the exhibit. When configuring the wireless access point, which setting does the network administrator use to configure the unique identifier that client devices use to distinguish this wireless network from others?…

    • 2145 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    To set it up you will need to use the program that is provided which will immediately run when the router is first hooked up to your computer. You may need to give your router a password; if you already have a password you will type it in. You can leave everything set on default if you want and your router will work properly. However if you need to, you can configure the router by opening a browser and typing in 192.68.1.1 or whatever your routers host IP is set to, my router is set to default which is the…

    • 747 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2640 Lab Outline

    • 672 Words
    • 4 Pages

    Configuring Hostnames Page 25 10. Subnetting Lab 1 11. Subnetting Lab 2 Unit 3 1. Setting Router passwords Page 29 2. Configuring Router IP settings Page 32 3.…

    • 672 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Even if the above options does not work, you must go to command prompt in Windows system by clicking on Run and then typing cmd. A terminal will open where you should type ipconfig. You will get the ipaddress of your router.…

    • 570 Words
    • 3 Pages
    Good Essays
  • Good Essays

    When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network. true…

    • 602 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    1A

    • 432 Words
    • 3 Pages

    6. Let the setup stand for 20 minutes. Follow procedure 8 as your setup stands.…

    • 432 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nick Finsterbusch

    • 2610 Words
    • 11 Pages

    In order to properly authenticate on the wireless network, you must agree and sign the ITT Wireless Network Release Form. You can acquire this form from your local System Support Technician.…

    • 2610 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Everyone wants privacy in their life and they often secure their things from others but what about your WIFI connection?…

    • 367 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    It-242 Wlan Check Point

    • 265 Words
    • 2 Pages

    There are several ways a person can go about securing a wireless local area network, or WLAN. One of the best ways in my opinion is to not broadcast the network publicly. This does not prevent people from accessing the network, but instead prevents the network from being visible to others. A person searching for a network to connect to can easily see your network exists. Without broadcasting the network people that are not aware of your network have no way of even knowing it is there. Another way to help to secure a WLAN is by using MAC address filtering. MAC filtering requires a list of the valid MAC addresses the user wants to be able to access the network. Any computer with a MAC address that is not on the provided list will not be able to gain access to the network. These steps alone are not enough to keep a network secure but when used with other security measures such as strong passwords and encryption can make a network a lot less accessible from malicious outsiders. These individuals can be a bothersome hindrance stealing network bandwidth or far more dangerous individuals that intend to cause harm with malicious programs or viruses or to steal private information. A wireless network may never be completely secure, but it is always best practice to use as many security steps as possible to insure the safety of the data on the network.…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Dot Box Research Paper

    • 2324 Words
    • 10 Pages

    AWG wires are wired facing the proper way. If they are reversed, the ignition cut will not work.…

    • 2324 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    unit 7 assignment 1

    • 547 Words
    • 2 Pages

    WLANs (wireless local area networks) are becoming increasingly prevalent, not only in schools, but in many businesses and establishments. They can provide a plethora of benefits within a school environment including flexibility, speed, and resource mobility. A WLAN would assist in ease of use, and make many of the day-to-day functions of school employees easier.…

    • 547 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Use the arrow buttons on the remote to highlight the “Setup” menu option. Press “Enter.”…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Disney

    • 2424 Words
    • 10 Pages

    I have read the above instructions and descriptions and I understand everything that I am being asked to do so far.…

    • 2424 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    A wireless modem is a type of modem which connects to a wireless network instead of a telephone system. When a mobile Internet user connects using a wireless modem, they're attached directly to the wireless ISP (Internet Service Provider) and can then access the Internet. Mobile phones, smartphones, and PDAs can be employed as data modems to form a wireless access point connecting a personal computer to the Internet (or some proprietary network). In this use the mobile phone is providing a gateway between the cellular service provider's data network technology and Point-to-Point Protocol (PPP) spoken by PCs. Almost all current mobile phone models support the Hayes command set, a standard method of controlling…

    • 2425 Words
    • 10 Pages
    Powerful Essays