802.11g Wireless LAN PCI Card User Manual Version: 1.
COPYRIGHT Copyright ©2004/2005 by this company. All rights reserved.
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
Federal Communications Commission (FCC) RF Exposure Requirements SAR compliance has been established in the laptop computer(s) configurations with PCMCIA slot on the side near the center, as tested in the application for Certification, and can be used in laptop computer(s) with substantially similar physical dimensions, construction, and electrical and RF characteristics. Use in other devices such a PDAs or lappads is not authorized.
CONTENTS 1 INTRODUCTION............................................................................. 1 1.1 Features ......................................................................................................................... 1 1.2 Specifications ................................................................................................................ 1 1.3 Package Contents ..........................................................................................................
1 Introduction Thank you for purchasing the 802.11g Wireless LAN PCI Card. This card complies with IEEE 802.11g standard, which supports up to 54Mbps high-speed wireless network connections. It can also work with IEEE 802.11b devices. When the card connects to 11b devices, the link speed will be up to 11Mbps. For WLAN security issues, this card supports 64/128-bit WEP data encryption that protects your wireless network from eavesdropping.
• • • • • • • Security: 64/128-bit WEP Data Encryption, WPA, AES and IEEE 802.1x Antenna: External detachable dipole antenna (Connector: RP-SMA connector, Cable Length: 94 cm) Drivers: Windows 98SE/Me/2000/XP LEDs: TX/RX, Link Transmit Power: 16dBm~18dBm Power consumption: Tx: 350mA, Rx: 250mA Receive Sensitivity: 54Mbps OFDM, 10% PER, -70dBm, 11Mbps CCK, 8% PER, -86dBm, 1Mbps BPSK, 8% PER, -92dBm • • • • Dimension: 19(H) x 127(W) x 121(D) mm Temperature: 32~131 ° F (0 ~55 ° C) Humidity: Max.
2 Installation Procedure Before you proceed with the installation, please notice following descriptions. Note1: Please do not install the card into your laptop computer before installing the software program from the CD. Note2: The following installation was operated under Windows XP. Windows 98SE/Me/2000.) (Procedures are similar for Note3: If you have installed the Wireless PC Card driver & utility before, please uninstall the old version first. A. Insert the Installation CD to your CD-ROM Drive.
D. The system will automatically detect the card and display “Hardware Installation” screen. Click “Continue Anyway” to continue. E. Click “Finish” to complete the installation. F. The “RaConfig” utility is displayed and you can start to configure the card.
5
3 Configuration Utility The Configuration Utility is a powerful application that helps you configure the PC card and monitor the link status and the statistics during the communication process. The Configuration Utility appears as an icon on the system tray of Windows while the card is running. You can open it by double-click on the icon. Right click the icon, there are some items for you to operate the configuration utility.
Parameter Description Available Networks This list shows all available wireless networks within range of your card. It also displays the information of the networks including the SSID, BSSID, Signal Strength, Channel, Encryption, Authentication and Network Type. If you want to connect to any networks on the list, double-click the item on the list, and the card will automatically connect to the selected network.
3.2.1 Configure the Profile System Configuration Parameter Description Profile Name Define a recognizable profile name for you to identify the different networks. SSID The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs. You may specify a SSID for the card and then only the device with the same SSID can interconnect to the card.
Parameter Description Network Type Infrastructure – This operation mode requires the presence of an 802.11 Access Point. All communication is done via the Access Point or Router. Ad-Hoc – Select this mode if you want to connect to another wireless stations in the Wireless LAN network without through an Access Point or Router. Transmit Power If you want to lower the transmit power of the card for saving the power of the system, you can select the lower percentages from the list.
Authentication vs. Security Parameter Authentication Type Description This setting has to be consistent with the wireless networks that the card intends to connect. None – No authentication is needed among the wireless network. Shared – Only wireless stations using a shared key (WEP Key identified) are allowed to connecting each other. WPA-PSK –It is a special mode designed for home and small business users who do not have access to network authentication servers.
WEP – Enable the WEP Data Encryption. When the item is selected, you have to continue setting the WEP Encryption keys. TKIP – TKIP (Temporal Key Integrity Protocol) changes the temporal key every 10,000 packets (a packet is a kind of message transmitted over a network.) This insures much greater security than the standard WEP security. AES – AES has been developed to ensure the highest degree of security and authenticity for digital information and it is the most advanced solution defined by IEEE 802.
(authentication) for existing and future wireless LAN systems. The technical components of WPA include Temporal Key Integrity Protocol (TKIP) for dynamic key exchange, and 802.1x for authentication. There are two types of WPA security: WPA-PSK (no server) and WPA (with server). WPA requires a Radius Server to complete the authentication among wireless stations and Access Points. Typically, this mode is used in a enterprise environment. WPA-PSK uses a so-called pre-shared key as the security key.
3. Press “Configure” button to configure the WPA function for the current network. Note: Uncheck “Use Windows to Configure my wireless network settings”, the “RaConfig” utility will be enabled again. Parameter Description Network Authentication Open –No authentication is needed among the wireless network. Shared – Only wireless stations using a shared key (WEP Key identified) are allowed to connecting each other.
Parameter Description Data Encryption WEP – In WPA or WPA-PSK mode, WEP is also able to be the encryption method for the transmission data. TKIP – TKIP (Temporal Key Integrity Protocol) changes the temporal key every 10,000 packets (a packet is a kind of message transmitted over a network.) This insures much greater security than the standard WEP security.
Parameter Description Authentication Type There are five kinds , such as PEAP , TLS/Smartcart , TTLS , LEAP and MD5 ,etc.. Identity Password User account number Password of user’s account’s number. Prove that the method is used while choosing LEAP and MD5-Challenge. Session Resumption We suggests to using “always” to perform the authentication with CA server. Use Client Authenticate Client evidence is the essential project of TLS, and the alternative projects (Option) of PEPA and TTLS.
Prove that CA server is divided into two steps: 1. Confirm whether the server evidence (Server Certificate ) is authorized the unit to send out by the designated evidence, if " proving while allowing " is hit and colluded , show that this server evidence can authorize the unit (that a dependable evidence authorize the unit approved of the unit ) to send out from a relaying evidence . 2. Check whether the server name of the server evidence accords with user's name input or belongs to the same network.
by relaying evidence). On the contrary, the server evidence must be that the evidence chosen by user authorize the unit to issue. Server name This field is made according to selecting (checkbox), its value can be the server name or the domain name of the server. 3.3 z The server name must be totally correct: If choose this to select, the server name which shows the server evidence must be self-same as "server name ".
Link Quality This bar indicates the quality of the link. The higher the percentage, the better the quality. dBm If you want to know the signal strength in the unit of dBm, select this check box. Signal Strength This bar shows the signal strength level. The higher percentage shown in the bar, the more radio signal been received by the card. This indicator helps to find the proper position of the wireless device for quality network operation. 3.
Parameter Description Wireless Mode 802.11 B/G mix – If you have a mix of 802.11b and 802.11g wireless stations in your network, it is recommended to setting the card to this mode. This mode is also the default setting. 802.11 B only – This card can be compatible with both 802.11g and 802.11b wireless stations. If there are only 802.11b wireless stations in the network, you can set the card to this mode.
suitable transmission rate automatically. The higher data rate you designated in the network, the shorter distance is allowed between the card and the wireless stations. When the wireless mode is “802.11 B only”, the maximum data rate is 11Mbps (11b) so that there are only “Auto/1/2/5.5/11Mbps” options you can select. Tx BURST Tx Burst enables the card to deliver the better throughput in the same period and environment.
4 Troubleshooting This chapter provides solutions to problems usually encountered during the installation and operation of the adapter. 1. What is the IEEE 802.11g standard? 802.11g is the new IEEE standard for high-speed wireless LAN communications that provides for up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream wireless LAN technology for the home, office and public networks. 802.11g defines the use of the same OFDM modulation technique specified in IEEE 802.
6. What is BSS ID? A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7. What is WEP? WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .11 standard. 8. What is TKIP? TKIP is a quick-fix method to quickly overcome the inherent weaknesses in WEP security, especially the reuse of encryption keys. TKIP is involved in the IEEE 802.
13. What is Spread Spectrum? Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communication systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security.