![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
User's Guide11Mbps Wireless LAN USB AdapterVersion 1.45 |
![]() |
![]() |
![]() |
![]() |
![]() |
INFORMATION TO USER
Federal Communications Commission Statement This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. The antenna used for this transmitter must be installed to provide a separation distance of least 20 centimeters from all persons and must operate in conjunction with other antenna or transmitters. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used according to the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which is found by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Notice: The Part 15 radio device operates on a non-interference basis with other devices operating at this frequency. Any change or modification not expressly approved by the party responsible could void the user's authority to operate the device.
Regulatory
The wireless LAN USB Adapter must be installed and used in strict accordance with the manufacturer's instructions. This device complies with the following radio frequency and safety standards.
USA - Federal Communications Commission (FCC) This device complies with Part 15 of FCC Rules. Operation is subject to the following two conditions: 1. This device may not cause harmful interference. 2. This device must accept any interference that may cause undesired operation.
Europe - R&TTE Directive
EU Countries not intended for use The ETSI version of this device is intended for home and office use in Austria, Belgium, Denmark, Finland, France (with Frequency channel restrictions). Germany, Greece, Ireland, Italy, Luxembourg, Netherlands, Portugal, Spain, Sweden and United Kingdom.
The ETSI version of this device is also authorized for use in EFTA member states Iceland, Liechtenstein, Norway and Switzerland. | ||||
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() Fig 2-2 Infrastructure Wireless LAN
| ||||||||||
| ||||||||||
The adapter provides access to a wired LAN for wireless workstations. An integrated wireless and wired LAN is called an infrastructure configuration. A group of adapter PC users and an Access Point compose a Basic Service Set (BSS). Each adapter PC in a BSS can talk to any computer in the wired LAN infrastructure via the Access Point.(Fig 2-2) An infrastructure configuration extends the accessibility of a adapter equipped PC to a wired LAN, and doubles the effective wireless transmission range for 2 adapter PCs. Since the Access Point is able to forward data within its BSS, the effective transmission range in an infrastructure LAN is double.(Fig 2-3) | ||||||||||
Fig 2-3 The effective transmission range | ||||||||||
The use of a unique ID in a BSS is essential. All adapter equipped PCs configured without roaming options in independent BSS must be configured with a BSS ID corresponding to the Access Point used in the BSS. Check your Access Point for its BSS ID or use the Access Point Browser Utility program to determine the BSS ID.(Fig 2-4) The infrastructure wireless LAN configuration is appropriate for enterprise-scale wireless access to a central database, or as a wireless application for mobile users.
| ||||||||||
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() | ![]() | |||||||||||||||
Fig 3-2 Install WLAN Driver / Utility |
Fig 3-3 Componets Version | |||||||||||||||
3. The installation provides you to install package Custom or Typical. (Fig 3-4) 4. If "Custom" be chosen, you can select package individually. If you choose "Typical", The 3 packages will be installed in your system. (Fig 3-5) The 3 packages mean Application, PCMCIA card driver, and USB adapter driver. (Fig 3-6). | ||||||||||||||||
![]() | ![]() | |||||||||||||||
Fig 3-4 Setup Type |
Fig 3-5 Typical Setup | |||||||||||||||
![]() | ||||||||||||||||
Fig 3-6 Custom Setup | ||||||||||||||||
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
After installing USB WLAN Adapter driver and utility. Please insert the WLAN Adapter. You will see Found New Hardware. Please select "Intall the software automatically" then click "Next>" (Fig 3-10). The screen in Windows XP (Fig 3-11) will appear click "Countine Anyway". The Windows has finished installing software for the device. Click "Finish" to finish the installation.(Fig 3-12). Configuration Utility please see Chapter 4 | |||||||||||||||
![]() | ![]() | ||||||||||||||
Fig 3-10 Found New Hardware |
Fig 3-11 Windows XP Screen | ||||||||||||||
![]() | |||||||||||||||
Fig 3-12 Finish the installation | |||||||||||||||
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() | |||||||||||
Fig 4-2 | |||||||||||
|
NOTE: When in Ad-Hoc mode, Signal Strength and Link Quality indicators will not be available. | ||||||||||
The Signal Strength field will display a bar indicating the percentage, between 0 and 100 percent, of the strength of the signal. The higher the percentage, the stronger the signal.
The Link Quality field will display a bar indicating the percentage, between 0 and 100 percent, of the quality of the link. The higher the percentage, the better the link.
The Change bottom, allows you to customize the setting for the WLAN USB adapter and your wireless network.
The Operating Mode setting determines the architecture of your wireless network select Ad-Hoc or Infrastructure Mode depending on your network type. The Ad-Hoc mode is used for sample peer-to-peer network and allows the sharing of local resources only between Network PC Card without needing a Wireless Access Point. The Infrastructure mode allows a wireless network to be integrated into an existed, wired network through an Access Point. Infrastructure networks permit roaming between Access Points while maintaining a connection to all network resources.
| |||||||||||
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
An acronym for Service Set Identifier, SSID is the unique name shared among all points in a wireless network. The SSID must be identical for all points in the network. It is case sensitive and must not exceed 32 characters. The Tx Rate field shows the current transfer rate for the Network PC Card. To optimize performance and range, the Tx Rate should be set to Auto, which will automatically adjust the transfer speed for best performance and longest range. The Channel setting specifies the channel used in wireless communication and should be set to the same channel as the other points in the wireless network. The setting can only be adjusted in Ad-Hoc mode. | |||||||||||
Statistics | |||||||||||
The Statistics screen (Shown in Fig 4-3) provides information about the Tx / Rx Data, Management, rejected Packets. | |||||||||||
![]() | ![]() | ||||||||||
Fig 4-3 |
Fig 4-4 | ||||||||||
Site Survey | |||||||||||
The Site Survey screen shows some features of the available access points or other stations. Click on the desired access point / station. Then double click BSSID to connect or Re-Scan to search for more access points. (Shown in Fig 4-4) | |||||||||||
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Encryption | ||||||||||
On the Encryption screen, show in Fig 4-5, you can set the level of security with which you will be using the WLAN USB Adapter. Under the drop-down box, you can choose to have WEP encryption Disabled, 64-Bit, or 128-Bit Wired Equivalent Privacy (WEP) is an encryption scheme use to protect wireless data communication. If you decide to use encryption, you can choose any of the available WEP keys (1 to 4). You also have option to select the WEP mode (Mandatory/optional). If you select "Mandatory", then not only WEP will be used, but also any other station needs to use WEP encryption in order to establish a communication with your station. This requirement is in line with the IEEE 802.11b standard. If, on the other hand, you choose "Option", then your station can communication with every other station regardless if they use WEP or not. The Disabled setting prevents the sharing of data with other computers on the WEP network. When Enable encryption for the WEP Key entry, enter the hexadecimal number (the letters "A" through "F" and the numbers "0" through "9") set by the other wireless WEP settings; these settings must be identical to the WEP encryption on all points in your wireless network in order to network to your WLAN USB adapter. The security keys are four 10 digit key for the 64-Bit WEP setting and four 26 digit key for the 128-Bit WEP setting. | ||||||||||
![]() | ||||||||||
Fig 4-5 | ||||||||||
|
NOTE: The WEP Key Entry must match the Key on all other devices on the wireless network or this device will be unable to transmit or receive data. | |||||||||
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
For Authentication Type, you may choose between Open System or Shared Key.
Shared Key is when both the sender and recipient share a secret key. Both units this key for an extended length of time, sometimes indefinitely. Any eavesdropper that discovers the key may decipher all packets unit the key is changed. | ||||||||
Open System the default setting, is when the sender and the recipient do not share a secret key. Each party generates its own key-pair and asks the receiver to accept the (usually randomly) generated key. Once accepted, this key is use for short time only: then a new key is generated and agrees upon. | ||||||||
Advanced | ||||||||
The Advanced screen (Fig 4-6) allows you to set Fragmentation Threshold, the RTS/CTS Threshold, and the Preamble Type. The Fragmentation Threshold Value indicates how much of the network resources is devoted to recovering packet errors. The value should remain at its default setting of 2,346. If you experience high packet error rates, you can decrease this value but it will likely decrease overall network performance. Only minor modifications of this value are recommended. | ||||||||
![]() | ||||||||
Fig 4-6 | ||||||||
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
The RTS Threshold Value should remain at its default setting of 2,347. A preamble is a signal used to synchronize the transmission timing between two or more systems. A series of transmission pulses is sent before the data to indicate that "someone is about transmit data." this ensures that systems receive the information correctly when the data transmission stars. The Preamble Type should be set to Short (if the network environment is "noisy") or Long (if the environment is "clear") Click Submit to complete the configuration. | ||||||||
| ||||||||
Power Save, you can select then submit to allow your adapter to go to sleep mode while the adapter doesn't precede the datat transmission. Or unselect disabled to make the adapter never go to sleep mode. Click submit to save the settings. | ||||||||
Profiles | ||||||||
The Profiles screen (Fig 4-7) allows you can manage the profiles that you have created for the wireless network at home, office and in public places. You can create New file for Save a profile or Delete and Rename the profiles. | ||||||||
![]() | ||||||||
Fig 4-7 | ||||||||
About | ||||||||
The About screen (Fig 4-8) shown the release information for the Driver Version, Firmware Version, Application Version, and MAC Address. User the "Exit" button in order to exit the application. | ||||||||
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() | ||||||||||
Fig 4-8 | ||||||||||
How to Uninstall the configuration & Monitor Utility | ||||||||||
In order to uninstall the Configuration & Monitor Utility from Windows 95/98/ME, you can RUN Setup utility again then you will see Fig 4-9 then step by step remove all installed components. It is recommended to stop the WLAN adapter and "Exit" the application prior to staring the uninstallation procedure. | ||||||||||
![]() | ||||||||||
Fig 4-9 | ||||||||||
|
![]() |
![]() |
![]() |
![]() |
![]() |
Fragmentation- Breaking a packet into smaller units when transmitting over a network medium that cannot support the original size of the packet.
Infrastructure- An integrated wireless and wired LAN is called an infrastructure configuration.
IRQ- Interrupt ReQuest, A hardware interrupt on a PC. There are 16 IRQ lines used to signal the CPU that peripheral event has started or terminated. In most cases, two devices cannot use the same line.
PCMCIA- Personal Computer Memory Card International Association, which develops standards for PC cards, formerly known as PCMCIA cards, are available in three types which are about the same length and width as credit cards, but range in thickness from 3.3mm(Type I), 5.0mm(Type II), to 10.5mm(Type III). These cards can be used for many functions, including memory storage, as landline modems and as wireless LAN.
Roaming- A function that allow one to travel with a mobile end system (wireless LAN mobile station, for example) through the territory of domain(an ESS, for example) while continuously connecting to the infrastructure.
RTS- Request to Send, An RS-232 signal sent from the transmitting station to the receiving station requesting permission to transmit.
Throughput- The amount of data moved successfully from one place to another in a given time period.
Tx Rate- Transmission Rate.
WEP- Wired Equivalent Privacy, A data privacy mechanism based on a 64-bit or 128-bit shared key algorithm, as described in IEEE 802.11 standard. | ||||
|