Turbo Wireless LAN Hi-Gain USB 2.0 Adaptor User Manual Version: 1.
COPYRIGHT Copyright ©2005/2006 by this company. All rights reserved.
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
Federal Communications Commission (FCC) RF Exposure Requirements SAR compliance has been established in the laptop computer(s) configurations with PCMCIA slot on the side near the center, as tested in the application for Certification, and can be used in laptop computer(s) with substantially similar physical dimensions, construction, and electrical and RF characteristics. Use in other devices such a PDAs or lappads is not authorized.
CONTENTS 1 INTRODUCTION ............................................................................. 1 1.1 1.2 1.3 Features ......................................................................................................................... 2 Specifications................................................................................................................ 2 Package Contents ..........................................................................................................
1 Introduction Thank you for purchasing the 802.11g Turbo Wireless LAN USB Adapter. This USB adapter is designed to comply with IEEE 802.11g Wireless LAN standard and easy to carry with the Mini size. It is suitable for any Laptop or Desktop computers. This adaptor supports higher data throughput than the IEEE 802.11g standard (up to 54Mbps). It supports specific ways to increase the data transfer rate at a time; compress the data and decrease the waiting time to send the next data to the Routers or APs.
1.1 Features • • • • • • • Complies with the IEEE 802.11b and IEEE 802.11g 2.4GHz (DSSS) standards. High data transfer rate – up to 54Mbps. Supports Turbo Mode to enhance the data transfer speed within the specific wireless network. Supports 64/128-bit WEP, WPA (TKIP with IEEE 802.1x), WPA2 (AES with IEEE 802.1x) functions for high level of security. Supports the most popular operating system: Windows 98SE/Me/2000/XP/2003 Server. Supports USB 2.0/1.1/1.0 interface. Portable and mini-size design. 1.
1.3 Package Contents Before you begin the installation, please check the items of your package. The package should include the following items: • One USB Adaptor • One Hi-Gain Antenna • One CD (Driver/Utility/User’s Manual) • One Quick Guide If any of the above items is missing, contact your supplier as soon as possible.
2 Installation Procedure Before you proceed with the installation, please notice following descriptions. Note1: Please do not install the adaptor into your computer before installing the software program from the CD. Note2: The following installation was operated under Windows XP. Windows 98SE/Me/2000/2003 Server.) (Procedures are similar for Note3: If you have installed the Turbo Wireless LAN USB Adaptor driver & utility before, please uninstall the old version first. A.
C. In Windows XP, there is a “Windows Zero Configuration Tool” for you to setup the wireless adaptor. You can choose to configure the adaptor through the Windows Zero Configuration Tool or the Ralink Configuration Tool for the adaptor. It is recommended to choose the Ralink Configuration Tool for the adaptor. Click “Next” to continue. D. If you need the adaptor to operate with better performance, please choose the “Optimize for performance” to enable the Tx Burst mode.
E. The system starts to install the software of the adaptor. Please follow the instructions of the program to plug in the adaptor into the USB port of your computer. And the system will automatically detect the adaptor F. Please click “Finish” to complete the installation.
3 Configuration Utility The Ralink Configuration Utility is a powerful application that helps you configure the USB adaptor and monitor the link status and the statistics during the communication process. When the adaptor is installed, the configuration utility will be displayed automatically. This adaptor will auto connect to wireless device which has better signal strength and no wireless security setting.
Second Way A. Right-click the icon and select “View Available Wireless Networks”. B. Click “Advanced”. C. Uncheck “Use Windows to configure my wireless network settings” to enable the utility for the adaptor. Note: If “Wireless Zero Configuration” is enabled, you can only configure the advance setting or check the link status and statistics from the configuration utility of the adaptor.
3.1 Site Survey When you open the Ralink Configuration Utility, the system will scan all the channels to find all the access points/stations within the accessible range of your adaptor and automatically connect to the wireless device with the highest signal strength. From the “Site Survey”, all the networks nearby will be listed. You can change the connection to another networks or add one of the networks to your own profile list.
3.2 Profile The “Profiles List” is for you to manage the networks you connect to frequently. You are able to Add/Delete/Edit/Activate a profile. Parameter Description Profiles List The profiles list display all the profiles and the relative settings of the profiles including Profile Name, SSID, Channel, etc. This sign indicates the activated profile is been connecting. This sign indicates the activated profile is not been connecting.
3.2.1 Configure the Profile 3.2.1.1 Configuration Parameter Description Profile Name Define a recognizable profile name for you to identify the different networks. SSID The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs. You may specify a SSID for the adaptor and then only the device with the same SSID can interconnect to the adaptor.
Parameter Description PSM (Power Saving Mode) The power saving function is only available when the network type is in Infrastructure. CAM (Constantly Awake Mode) – The adaptor will always set in active mode. PSM (Power Saving Mode) – Enable the adaptor in the power saving mode when it is idle. Network Type Infrastructure – This operation mode requires the presence of an 802.11 Access Point. All communication is done via the Access Point or Router.
Parameter Description RTS Threshold Minimum packet size required for an RTS (Request To Send). For packets smaller than this threshold, an RTS is not sent and the packet is transmitted directly to the wireless network. Select a setting within a range of 0 to 2347 bytes. Minor change is recommended. Fragment Threshold The value defines the maximum size of packets; any packet size larger than the value will be fragmented.
Parameter Description Authentication Type LEAP – LEAP is a pre-EAP, Cisco-proprietary protocol, with many of the features of EAP protocols. Cisco controls the ability of other vendors to implement this protocol, so it should be selected for use only when limited vendor choice for client, access-point, and server products is not a concern. When you have set up LEAP authentication, you have to enter the user name and password of your computer.
Parameter Description Encryption Mode None – Disable the encryption mode. WEP – Enable the WEP Data Encryption. When the item is selected, you have to continue setting the WEP Encryption keys. TKIP – TKIP (Temporal Key Integrity Protocol) changes the temporal key every 10,000 packets (a packet is a kind of message transmitted over a network.) This ensures much greater security than the standard WEP security.
The IEEE 802.1X specification describes a protocol that can be used for authenticating both clients and servers on a network. The authentication algorithms and methods are those provided by the Extensible Authentication Protocol (EAP), a method of authentication that has been in use for a number of years on networks that provide Point-to-Point Protocol (PPP) support as many internet service providers and enterprises do.
3.2.1.3 802.1x Setting-Certification Parameter Description Authentication Type The EAP authentication protocols this adaptor has supported are included as follows. This setting has to be consistent with the wireless APs or Routers that the adaptor intends to connect. PEAP &TTLS – PEAP and TTLS are similar and easier than TLS in that they specify a stand-alone authentication protocol be used within an encrypted tunnel.
Parameter Description Tunneled Authentication Protocol When the authentication type is PEAP or TTLS, select a protocol to be used to build the encrypted tunnel. Identity This is the protected user EAP Identity used for authentication. The identity specified may contain up to 63 ASCII characters, is case sensitive and takes the form of a Network Access Identifier, consisting of @. The user’s home realm is optional and indicates the routing domain.
Parameter Description Allow Intermediate Certificates A server designates an issuer as a trusted root authority by placing the issuer's self-signed certificate, which contains the issuer's public key, into the trusted root certification authority certificate store of the host computer. Intermediate or subordinate certification authorities are trusted only if they have a valid certification path from a trusted root certification authority. Server Name Enter the authentication server name.
Parameter Description Status Display the SSID and MAC ID of the network the adaptor is connecting to. Extra Info Display the link status. Channel Display the number of the radio channel and the frequency used for the networking. Link Speed (Mbps) Display the transmission and reception rate of the network. The maximum transmission rate is 54Mbps. Throughput (Kbps) Display the speed of data transmitted and received. Link Quality This bar indicates the quality of the link.
3.4 Statistics This option enables you to view the statistic information of the connection including transmit statistics and receive statistics. You may reset the counters by clicking ”Reset Counter”. 3.5 Advance This option enables you to configure more advanced settings, for example: wireless mode, protection mode and etc.
Parameter Description Wireless Mode 802.11 B/G mix – If you have a mix of 802.11b and 802.11g wireless stations in your network, it is recommended to set the adaptor to this mode. This mode is also the default setting. 802.11 B only – This adaptor can be compatible with both 802.11g and 802.11b wireless stations. If there are only 802.11b wireless stations in the network, you can set the adaptor to this mode. 802.11 G only – This adaptor can be compatible with both 802.11g and 802.11b wireless stations.
Parameter Description Enable TCP Window Size The TCP Window is the amount of data a sender can send on a particular connection before it gets an acknowledgment back from the receiver that it has gotten some of it. When the Router or AP the adaptor is connecting to have set up the TCP Window, you can enable the parameter to meet the data size for the Router or AP connection. The larger TCP Window the better performance.
3.6 About By choosing this option, you can click the hyperlink to connect the website for the information of the wireless chipset vendor and review basic information about the Utility such as the Driver, Utility and EEPROM Version. The MAC Address of the adaptor is displayed in the screen as well. 3.
4 Troubleshooting This chapter provides solutions to problems usually encountered during the installation and operation of the adapter. 1. What is the IEEE 802.11g standard? 802.11g is the new IEEE standard for high-speed wireless LAN communications that provides for up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream wireless LAN technology for the home, office and public networks. 802.11g defines the use of the same OFDM modulation technique specified in IEEE 802.
6. What is BSS ID? A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7. What is WEP? WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .11 standard. 8. What is TKIP? TKIP is a quick-fix method to quickly overcome the inherent weaknesses in WEP security, especially the reuse of encryption keys. TKIP is involved in the IEEE 802.
13. What is Spread Spectrum? Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communication systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security.