Preview

Engineering Research Paper

Satisfactory Essays
Open Document
Open Document
1272 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Engineering Research Paper
Package Contents

1 Hardware Connection
Wireless Router
Cable/DSL Modem

Quick Installation Guide
54Mbps Wireless Router
TL-WR ss Router 54M Wirele 340G
WLAN PWR SYS WAN 1 2 3 4

TL-WR340G/TL-WR340GD

Power Adapter

RJ45

Internet

3 2
54Mbps Wireless Router

POWER

4

3

2

1

WAN

RESET

LAN

LINE

1
Cable
Line

Cable

MODEL NO.

TL-WR340G/TL-WR340GD

Ethernet Cable

Resource CD

QIG

Step 1. System Requirement
· Windows 7
MODEL NO.

Connect the WAN port on your Router to the Modem’s LAN port with an Ethernet cable. Connect your computer to any Port labeled 1~4 on the Router with an Ethernet cable. Plug the provided Power Adapter into the Power jack on the back of the Router and the other end to a standard electrical Wall socket, and power on the Modem.

Step 2. Step 3.
· Windows XP · Windows 2000

· Windows Vista

TL-WR340G/TL-WR340GD

2 Connecting by Easy Setup Assistant
The Easy Setup Assistant is not supported in Linux or Mac OS. If you are runing Linux /Mac or without CD-ROM, please refer to Appendix 1.

1

Insert the TP-LINK Resource CD into the CD-ROM drive.

3

After con rming the hardware connection and the status of LEDs, click Next to continue.

5

Select the connection type your ISP provides and click Next. Here we take connection type PPPoE for example.

7

Create a unique or easy-to-remember name for your wireless network. You can also keep the default setting. Click Next to continue.

2

Here we take TL-WR340G for example. Select TL-WR340G and click Easy Setup Assistant.

4

After the connectivity has been checked successfully, please click Next to continue.

6

Enter the User Name and Password provided by your ISP and then click Next.

8

You are recommended to select Most Security (WPA2-PSK) to secure your wireless network. Enter a key of 8~63 characters and click Next.

(Turn over)
7106503567

2 Connecting by Easy Setup Assistant
9
NEXT

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Before beginning the labs, set up the wireless network just as you did last week. Remember: You will need to configure the routers for every lab period for every lab meeting. Use the same settings you used last week (if they differ from the worksheet) and the same router/network you assigned to each student. Remind…

    • 411 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Refer to the exhibit. When configuring the wireless access point, which setting does the network administrator use to configure the unique identifier that client devices use to distinguish this wireless network from others?…

    • 2145 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    To set it up you will need to use the program that is provided which will immediately run when the router is first hooked up to your computer. You may need to give your router a password; if you already have a password you will type it in. You can leave everything set on default if you want and your router will work properly. However if you need to, you can configure the router by opening a browser and typing in 192.68.1.1 or whatever your routers host IP is set to, my router is set to default which is the…

    • 747 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2640 Lab Outline

    • 672 Words
    • 4 Pages

    7. Basic Router Configuration and Command Line Interface Page 55 8. Switch and Router Security a. Setting Routing Passwords - Source documents located in Student CD > ICND-1-SB-Part1-SettingRouterPassword.pdf b. Setting Switch Passwords - Source documents located in Student CD > ICND-1-SB-Part1-SettingSwitchPassword.pdf c. Switch Security I - Source documents located in Student CD > ICND-1-SB-Part2-SwitchSecurityI.pdf d. Switch Security II - Source documents located in Student CD > ICND-1-SB-Part2-SwitchSecurityII.pdf e. Switch Security III - Source documents located in Student CD > ICND-1-SB-Part2-SwitchSecurityIII.pdf f. Switch Security IV - Source documents located in Student CD > ICND-1-SB-Part2-SwitchSecurityIV.pdf 9.…

    • 672 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Even if the above options does not work, you must go to command prompt in Windows system by clicking on Run and then typing cmd. A terminal will open where you should type ipconfig. You will get the ipaddress of your router.…

    • 570 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    1A

    • 432 Words
    • 3 Pages

    6. Let the setup stand for 20 minutes. Follow procedure 8 as your setup stands.…

    • 432 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Everyone wants privacy in their life and they often secure their things from others but what about your WIFI connection?…

    • 367 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Dot Box Research Paper

    • 2324 Words
    • 10 Pages

    AWG wires are wired facing the proper way. If they are reversed, the ignition cut will not work.…

    • 2324 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    It-242 Wlan Check Point

    • 265 Words
    • 2 Pages

    There are several ways a person can go about securing a wireless local area network, or WLAN. One of the best ways in my opinion is to not broadcast the network publicly. This does not prevent people from accessing the network, but instead prevents the network from being visible to others. A person searching for a network to connect to can easily see your network exists. Without broadcasting the network people that are not aware of your network have no way of even knowing it is there. Another way to help to secure a WLAN is by using MAC address filtering. MAC filtering requires a list of the valid MAC addresses the user wants to be able to access the network. Any computer with a MAC address that is not on the provided list will not be able to gain access to the network. These steps alone are not enough to keep a network secure but when used with other security measures such as strong passwords and encryption can make a network a lot less accessible from malicious outsiders. These individuals can be a bothersome hindrance stealing network bandwidth or far more dangerous individuals that intend to cause harm with malicious programs or viruses or to steal private information. A wireless network may never be completely secure, but it is always best practice to use as many security steps as possible to insure the safety of the data on the network.…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Use the arrow buttons on the remote to highlight the “Setup” menu option. Press “Enter.”…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Disney

    • 2424 Words
    • 10 Pages

    I have read the above instructions and descriptions and I understand everything that I am being asked to do so far.…

    • 2424 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Windows 7 Config

    • 10250 Words
    • 41 Pages

    2. Do one of the following: * If your computer has a single operating system installed, press and hold the F8 key as your computer restarts. You need to press F8 before the Windows logo appears. If the Windows logo appears, you need to try again by waiting until the Windows logon prompt appears, and then shutting down and restarting your computer.…

    • 10250 Words
    • 41 Pages
    Good Essays
  • Satisfactory Essays

    Wireless Network

    • 268 Words
    • 2 Pages

    The second step is to select the IEEE wireless network type 802.11a/b/g/n depending on what type of applications will be used and what speeds are needed to the size of the area to be covered you could also use a AP that can combine two or more of the 802.11 types.…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This was done as part of the ADSL Router and Cisco configuration Controller. The composition contained in the composition of ADSL factors. DHCP is created in the ADSL Router at the same time we will stop using DHCP server that is part of Windows Server 2008. The operating systems for the security of wireless networks are configured using WPA2 / WPA Mixed type. MAC made pass through a filter to allow only certain devices to connect to the Internet through various wireless networks white list their own MAC addresses. ADSL Router has also integrated firewall protection. This is configured with the default selections. It has an access point also some parental controls to prevent some of the sites. It is configured…

    • 914 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    A wireless modem is a type of modem which connects to a wireless network instead of a telephone system. When a mobile Internet user connects using a wireless modem, they're attached directly to the wireless ISP (Internet Service Provider) and can then access the Internet. Mobile phones, smartphones, and PDAs can be employed as data modems to form a wireless access point connecting a personal computer to the Internet (or some proprietary network). In this use the mobile phone is providing a gateway between the cellular service provider's data network technology and Point-to-Point Protocol (PPP) spoken by PCs. Almost all current mobile phone models support the Hayes command set, a standard method of controlling…

    • 2425 Words
    • 10 Pages
    Powerful Essays