GN-WB31N-RH AIRCRUISER N300 USB Adapter Quick Start Guide http://www.gigabyte.com.tw Rev. 1.
Federal Communication Commission Interference Statement: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
Contents CHAPTER 1 PRODUCT OVERVIEW...........................................1 1.1 1.2 1.3 1.4 1.5 1.6 INTRODUCTION TO THE AIRCRUISER N300 USB WIRELESS ADAPTER .........................1 FEATURES .................................................................................................................1 SYSTEM SPECIFICATIONS ............................................................................................2 CONTENTS PACKAGE ..................................................................
Chapter 1 Product Overview 1.1 Introduction to the AIRCRUISER N300 USB Wireless Adapter This GN-WB31N-RH 802.11b/g/n Wireless Local Area Network (WLAN) USB adapter is composed of the MAC, Baseband, and radio components, USB interface, and two antennas with high throughput and MIMO (Multi-Input and Multi-Output) feature. It operates at 2.4GHz frequency band, providing fast (up to 300Mbps) and secure (WEP 64/128, TKIP, AES, WPA, WPA2 and 802.1x) connections to 802.11n networks from a single Adapter.
1.3 System Specifications System Host Interface USB v2.0 Chipset Ralink MAC RT2770, Transceiver RT2720 Operating Voltages 5.0V+/-5% Transmitting (Legacy mode): 305 mA @ 11b, 320 mA @ 11g; Transmitting (HT20 mode): 320 mA; Transmitting (HT40 mode): 330 mA; Receiving (Legacy mode, HT20 mode): 210 mA @ 11b/g; Receiving (HT40 mode): 235 mA. Typical Power RF – 802.11n (backward compatible to 802.
1.4 Contents Package Before beginning the installation procedures, please inspect the components to assure that they have not been damaged during shipping. The components include: Package Contents • GN-WB31N-RH with pocket clip cap • GN-WB31N-RH Setup CD-ROM • Quick Start Guide In case of any missing or damaged accessories, please contact your local distributor or authorized reseller immediately.
Chapter 2 Installation This chapter covers the installation of the GN-WB31N-RH for your Notebook or Desktop PC. The following sections will assist you with proper installation of the Adapter. 2-1. Installing the GN-WB31N-RH Note: If your system has other third party wireless drivers installed, we suggest you disable them before starting installation. You can do this by going to Hardware Manager from Windows Control Panel and click ‘disable’ on the WLAN driver.
Figure 2-2. Found New Hardware Wizard Step 4: Select the driver locations. Click Next. Figure 2-3. Found New Hardware Wizard Step 5: Copying files, when complete, click on Next.
Figure 2-4. Found New Hardware Wizard Complete Step 6: Installation Wizard complete. Click Finish. 2-2. SmartSetup 3 Note: The following section applies to users of GIGABYTE Wireless Routers. GIGABYTE SmartSetup 3 is a powerful, yet user-friendly wireless network configuration wizard specially designed for GIGABYTE wireless networks. If you are connecting to a GIGABYTE wireless router, SmartSetup 3 will detect this and activate.
Figure 2-5. SmartSetup 3 Network Selection Step 2: Create a WPA(WPA-PSK) Passphrase using any keyboard character. Make it no less than 8 but no more than 63 characters in length. Anyone wishing to gain access to your network, will first need to key-in this Passphrase. In the example below, we used ‘I love green eggs and ham’. Figure 2-6.
Step 3: Your GIGABYTE router’s web configuration utility will automatically open, and detect your ISP type. Just input the Username and Password. Click Continue. Figure 2-7. Auto detecting your ISP type Note: If Figure2-7 Setup” from the main menu which displays. For more information about SmartSetup 3, please see the enclosed Quick Start Guide.
Chapter 3 Using the Wireless Utility The GN-WB31N-RH Wireless Utility is a powerful application that helps you to configure the Adapter and monitor the statistics of the communication link. It also permits the configuration for parameters while the Adapter is operating – no restarting is required. It also offers more configuration options than does Windows native Zero Wireless Configuration.
Figure 3-2. Current profile Description of items in Figure 3-2 is as follows: Profile Name: A profile can be saved for various wireless settings in different environments, i.e. home, office, and the corner coffee shop. SSID: The Network Name of the wireless router or Access Point. Channel: Shows the current wireless channel. Authentication: Sever authentication types. They include “OPEN”, “Shared”, “LEAP”, “WPA”, “WPA-PSK”, “WPA2” and “WPA2-PSK”.
3-1-1. Configuration Screen If you want to ADD new profiles, or EDIT existing ones, the Configuration screen will open. Here you will Name your profile, and if you like, select an alternate network type (Ad hoc), restrict on SSID connections and more. All three tabs shown (see Figure 3-3) are related, so when you’re done with all three (Configuration, Authentication, Advanced) tabs, click OK. Figure 3-3.
Preamble will function but not PSM. Also, the Channel option will appear and 802.1X Authentication will be disabled. (Default: Infrastructure) TX Power: Select percentage of transmitted power. (Default: Auto) RTS Threshold: This is a mechanism implemented to prevent the “Hidden Node” problem, “Hidden Node” is a situation in which two stations are within range of the same Access Point, but are not within range of each other. Therefore, they are hidden nodes for each other and can not detect each other.
Authentication Type: Before a station connects to a SSID, the authentication type used by the SSID must be known. Authentication types include OPEN SYSTEM, WPA, WPA-PSK, WPA2, WPA2-PSK, LEAP and SHARED. Encryption: To prevent unauthorized access to data transmitted on the network, the Adapter and the Access Point agree on a type of data encryption. Any station that wishes to connect must have the same password and encryption scheme to connect. Different authentication types have different level of security.
Figure 3-5. 802.1X Authentication Description of items in Figure 3-5 is as follows: Authentication type: PEAP, TLS/Smart Card, TTLS and MD5-Challenge. (Default: PEAP) Session Resumption: This feature can create a new connection without the overhead of a full handshake. Identity: The Account’s User ID. Password: Passwords for users accounts can be used when LEAP and MD5-Challenge are selected as authentication types.
Protocol: Use assigned authentication type in the safe tunnel. Tunnel ID: Users’ accounts. Password: Passwords for users’ accounts. Figure 3-6.
3-1-2-2. 802.1x Settings - CA Server Tab CA Server is used when TLS, TTLS or PEAP is in use. When Use certificate chain is checked, the Client can verify if such server is reliable and then transmit Client Certificate after the verification is confirmed. Figure 3-7. CA Server Setting To verify the CA server: 1. Confirm if the Server Certificate is issued by assigned certificate issuer.
Server name must match exactly: If this option is selected, the server name of server certificate must be the same as “Server Name” or as the name of domain where the server is located. Domain name must end in specified name: If this option is selected, the certificate issuer must be the domain or secondary domain entered in “Server Name”. 3-1-3. Advanced Screen The Advanced screen is the third tab in the trio of tabs under Edit Profile (see Figure 3-8). It includes the 802.
Ad Hoc Wireless Mode: Sets Ad Hoc Wireless Protocols, including 802.11 B/G mix, 802.11 B Only and 802.11 G Only. (Default: 802.11 B/G mix) TX Burst: The longest interval between frames is normally one DIFS while frames are transmitted. When this setting is open, the longest interval between frames is one SIFS that means the system is allowed to transmit higher capacity of data in one interval.(Default: OFF) B/G Protection: 802.11b uses CCK modulation. 802.11g uses OFDM while CCK modulation for 802.
3.2. Link Status Tab The Link Status tab displays the current association information about the Adapters connection with a wireless network. (see Figure 3-9) Figure 3-9. Link Status Description of items in Figure 3-9 is as follows: Status: Shows current link status. “No Link” will appear on the screen when no connection is available. Otherwise, SSID and BSSID of a link will appear. Channel: The current channel number used by the Adapter.
the signal strength in dBm. Noise Level: Noise level during connection. 3.3. Site Survey Tab The Site Survey tab shows you the list of reachable access points and/or peer-to-peer Stations. Just double click on the SSID that you want to connect or click the Connect button. (see Figure 3-10) Figure 3-10. Site Survey Description of items in Figure 3-10 is as follows: SSID: The name of the wireless network (also known as Network Name). BSSID: Displays the MAC address of the Access Point or router.
Encryption: The security method used by the Access Point. Authentication: The authentication type used by the Access Point. Network Type: Informs you if an Access Point (infrastructure) or other stations (802.11 Ad Hoc) is connected. When it is 802.11 Ad Hoc, we can select a channel for all members in 802.11 Ad Hoc. Rescan: Rescan the available networks and then re-display results. Connect: Connects with the highlighted Access Point. Add to Profile: Adds a specific Access Point into the profile. 3.4.
Frames Transmitted Successfully: Number of frames transmitted successfully. Frames Transmitted Successfully Without Retry: Number of frames transmitted successfully, excluding packets transmitted successfully with more than one retry. Frames Transmitted Successfully After Retry[s]: Number of frames transmitted successfully with more than one retry. Frames Fail To Receive ACK After All Retries: Number of frames failing to receive ACK after many retries.
3.5. QoS The Qos tab allows you to configure the Quality of services settings. Qos configuration contains WMM Enable function, Enable WMM Power Save setting, and Enable Direct Link Setup. (see Figure 3-12) Figure 3-12. QoS Tab WMM (Wi-Fi Multimedia) is a subset of the IEEE RFC known as 802.11e. WMM is designed to support user applications and works with all three 802.11 wireless physical layer standards - 802.11a, 802.11b and 802.11g.
Direct Link Setup Enable– Enable Direct Link Setup Enable functions. Select Direct Link Setup Enable option and click Apply. Direct Link Setup MAC Address– Specify the MAC Address of client adapter you want to direct link and click Apply to add DLS status table. Timeout Value– Specify the timeout value for DLS. DLS Status– DLS Status displays all DLS connections. If you want to terminate one of connections, just select specified connection and click Tear Down button.
3.6. About Tab The About tab displays information about current drivers and physical MAC address (see Figure 3-13). Figure 3-13. About Tab GNConfig Version (Date) – The version number (and date) of the Adapter Utility Driver Version (Date) – The version number (and date) of the Adapter Driver. EEPROM Version – Hardware version number of the Adapter’s EPROM. IP Address – The current IP Address of the Adapter. Phy_Address – The MAC address of the Adapter. Sub Mask – The current Subnet Mask of the Adapter.
Appendix A Troubleshooting This troubleshooting guide provides answers to some common problems which you may encounter while installing or using GIGABYTE Wireless Adapters. Contact the GIGABYTE Wireless Technical Support Team at www.giga-byte.com if you encounter problems not mentioned in this section. Problem: Cannot connect to an AP Advice: z Make sure the SSID for the USB Adapter is the same as the Access Point. z Make sure the security settings are the same as that of Access Point.
Appendix B Regulatory Information CE Mark Warning: This is a Class B product. In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures. FCC Statement: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Appendix C Warranty Limited Warranty Statement (1-Year Warranty) Thank you for purchasing the GIGABYTE Product. This limited warranty statement will provide you one year warranty starting from the purchase date.
第十二條 型式認證合格之低功率射頻電機,非經許可,公司、商號或使用者均 不得擅自變更頻率、加大功率或變更原設計之特性及功能。 第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現有 干擾現象時,應立即停用,並改善至無干擾時方得繼續使用。 前項合法通信,指依電信法規定作業之無線電通信。 低功率射頻電機須忍受合法通信或工業、科學及醫療用電波輻射性電 機設備之干擾。 5