GN-WS31N-RH AIRCRUISER N300 Mini Card Quick Start Guide http://www.gigabyte.com.tw Rev. 1.
Federal Communication Commission Interference Statement: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
NCC規範 第十二條 型式認證合格之低功率射頻電機,非經許可,公司、商號或使用者均不得擅自變更頻率、加 大功率或變更原設計之特性及功能。 第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現有干擾現象時,應立即停 用,並改善至無干擾時方得繼續使用。 前項合法通信,指依電信法規定作業之無線電通信。 低功率射頻電機須忍受合法通信或工業、科學及醫療用電波輻射性電機設備之干擾。 1
Contents CHAPTER 1 PRODUCT OVERVIEW...........................................2 1.1 1.2 1.3 1.4 INTRODUCTION TO THE AIRCRUISER N300 MINI CARD ..............................................2 FEATURES .................................................................................................................2 PRODUCT SPECIFICATIONS .........................................................................................2 SYSTEM REQUIREMENTS ...............................................................
Chapter 1 Product Overview 1.1 Introduction to the AIRCRUISER N300 Mini Card This GN-WS31N-RH 802.11b/g/n Wireless Local Area Network (WLAN) PCI-Express Mini-card adapter is composed of the MAC, Baseband, and radio components, PCI-Express mini-card interface, and two RF connectors with high throughput and MISO (Multi-Input and Single-Output) feature. It operates at 2.4GHz frequency band, providing fast (receive up to 150/300Mbps) and secure (WEP 64/128, WPA and WPA2) connections to 802.
Receive Sensitivity Legacy mode: -90 dBm @11b, -74 dBm @11g; HT20 mode: 64 dBm @ MCS7/15; HT40 mode: -63 dBm @ MCS7/15.
1.4 System Requirements For trouble free installation and operation, please assure your PC meets the following minimum system requirements: • • • Notebook or Desktop PC with a Pentium® 300 MHz or higher compatible processor with an available USB 2.0. A CD-ROM drive. 20 Mbytes of free hard disk space.
Chapter 2 Using the Wireless Utility *Please note that Gigabyte Wireless Utility does not support Windows Vista operating system. The GN-WS31N-RH Wireless Utility is a powerful application that helps you to configure the Adapter and monitor the statistics of the communication link. It also permits the configuration for parameters while the Adapter is operating – no restarting is required. It also offers more configuration options than does Windows native Zero Wireless Configuration.
Figure 3-2. Current profile Description of items in Figure 3-2 is as follows: Profile Name: A profile can be saved for various wireless settings in different environments, i.e. home, office, and the corner coffee shop. SSID: The Network Name of the wireless router or Access Point. Channel: Shows the current wireless channel. Authentication: Sever authentication types. They include “OPEN”, “Shared”, “LEAP”, “WPA”, “WPA-PSK”, “WPA2” and “WPA2-PSK”.
3-1-1. Configuration Screen If you want to ADD new profiles, or EDIT existing ones, the Configuration screen will open. Here you will Name your profile, and if you like, select an alternate network type (Ad hoc), restrict on SSID connections and more. All three tabs shown (see Figure 3-3) are related, so when you’re done with all three (Configuration, Authentication, Advanced) tabs, click OK. Figure 3-3.
Preamble will function but not PSM. Also, the Channel option will appear and 802.1X Authentication will be disabled. (Default: Infrastructure) TX Power: Select percentage of transmitted power. (Default: Auto) RTS Threshold: This is a mechanism implemented to prevent the “Hidden Node” problem, “Hidden Node” is a situation in which two stations are within range of the same Access Point, but are not within range of each other. Therefore, they are hidden nodes for each other and can not detect each other.
Authentication Type: Before a station connects to a SSID, the authentication type used by the SSID must be known. Authentication types include OPEN SYSTEM, WPA, WPA-PSK, WPA2, WPA2-PSK, LEAP and SHARED. Encryption: To prevent unauthorized access to data transmitted on the network, the Adapter and the Access Point agree on a type of data encryption. Any station that wishes to connect must have the same password and encryption scheme to connect. Different authentication types have different level of security.
Figure 3-5. 802.1X Authentication Description of items in Figure 3-5 is as follows: Authentication type: PEAP, TLS/Smart Card, TTLS and MD5-Challenge. (Default: PEAP) Session Resumption: This feature can create a new connection without the overhead of a full handshake. Identity: The Account’s User ID. Password: Passwords for users accounts can be used when LEAP and MD5-Challenge are selected as authentication types.
Protocol: Use assigned authentication type in the safe tunnel. Tunnel ID: Users’ accounts. Password: Passwords for users’ accounts. Figure 3-6.
3-1-2-2. 802.1x Settings - CA Server Tab CA Server is used when TLS, TTLS or PEAP is in use. When Use certificate chain is checked, the Client can verify if such server is reliable and then transmit Client Certificate after the verification is confirmed. Figure 3-7. CA Server Setting To verify the CA server: 1. Confirm if the Server Certificate is issued by assigned certificate issuer.
Server name must match exactly: If this option is selected, the server name of server certificate must be the same as “Server Name” or as the name of domain where the server is located. Domain name must end in specified name: If this option is selected, the certificate issuer must be the domain or secondary domain entered in “Server Name”. 3-1-3. Advanced Screen The Advanced screen is the third tab in the trio of tabs under Edit Profile (see Figure 3-8). It includes the 802.
Ad Hoc Wireless Mode: Sets Ad Hoc Wireless Protocols, including 802.11 B/G mix, 802.11 B Only and 802.11 G Only. (Default: 802.11 B/G mix) TX Burst: The longest interval between frames is normally one DIFS while frames are transmitted. When this setting is open, the longest interval between frames is one SIFS that means the system is allowed to transmit higher capacity of data in one interval.(Default: OFF) B/G Protection: 802.11b uses CCK modulation. 802.11g uses OFDM while CCK modulation for 802.
3.2. Link Status Tab The Link Status tab displays the current association information about the Adapters connection with a wireless network. (see Figure 3-9) Figure 3-9. Link Status Description of items in Figure 3-9 is as follows: Status: Shows current link status. “No Link” will appear on the screen when no connection is available. Otherwise, SSID and BSSID of a link will appear. Channel: The current channel number used by the Adapter.
the signal strength in dBm. Noise Level: Noise level during connection. 3.3. Site Survey Tab The Site Survey tab shows you the list of reachable access points and/or peer-to-peer Stations. Just double click on the SSID that you want to connect or click the Connect button. (see Figure 3-10) Figure 3-10. Site Survey Description of items in Figure 3-10 is as follows: SSID: The name of the wireless network (also known as Network Name). BSSID: Displays the MAC address of the Access Point or router.
Encryption: The security method used by the Access Point. Authentication: The authentication type used by the Access Point. Network Type: Informs you if an Access Point (infrastructure) or other stations (802.11 Ad Hoc) is connected. When it is 802.11 Ad Hoc, we can select a channel for all members in 802.11 Ad Hoc. Rescan: Rescan the available networks and then re-display results. Connect: Connects with the highlighted Access Point. Add to Profile: Adds a specific Access Point into the profile. 3.4.
Frames Transmitted Successfully: Number of frames transmitted successfully. Frames Transmitted Successfully Without Retry: Number of frames transmitted successfully, excluding packets transmitted successfully with more than one retry. Frames Transmitted Successfully After Retry[s]: Number of frames transmitted successfully with more than one retry. Frames Fail To Receive ACK After All Retries: Number of frames failing to receive ACK after many retries.
3.5. QoS The Qos tab allows you to configure the Quality of services settings. Qos configuration contains WMM Enable function, Enable WMM Power Save setting, and Enable Direct Link Setup. (see Figure 3-12) Figure 3-12. QoS Tab WMM (Wi-Fi Multimedia) is a subset of the IEEE RFC known as 802.11e. WMM is designed to support user applications and works with all three 802.11 wireless physical layer standards - 802.11a, 802.11b and 802.11g.
` Figure 3-12-1. WMM Enable Step 1. Click WMM Enable. Step 2. Click Apply. Step 3. Change to Site Survey Page. And add a AP that supports WMM features to a Profile. WMM Power Save Enable– Enable WMM power save functions. Select WMM Power Save option and click Setting for further configuration which includes AC_BK, AC_BE, AC_VI, and AC_VO.
Figure 3-12-2. WMM Power Save Enable Figure 3-12-3. Power Save Setting Step 1. Click WMM- Power Save Enable and click Setting. Step 2. Pop up Power Save dialog box. Select ACs you wan to enable and click Apply button.
Direct Link Setup Enable– Enable Direct Link Setup Enable functions. Figure 3-12-4. Direct Setup Enable Step 1. Click Direct Link Setup Enable. And click Apply button. Step 2. Change to Ste Survey Page. And add a AP that supports DLS features to a Profile. Direct Link Setup MAC Address– Specify the MAC Address of client adapter you want to direct link and click Apply to add DLS status table. Please note that to before enabling Direct Link Setup function, connect with the same AP that support DLS feature.
3.6. About Tab The About tab displays information about current drivers and physical MAC address (see Figure 3-13). Figure 3-13. About Tab GNConfig Version (Date) – The version number (and date) of the Adapter Utility Driver Version (Date) – The version number (and date) of the Adapter Driver. EEPROM Version – Hardware version number of the Adapter’s EPROM. IP Address – The current IP Address of the Adapter. Phy_Address – The MAC address of the Adapter. Sub Mask – The current Subnet Mask of the Adapter.
Chapter 3 Using Gigabyte Soft AP 4.1 Start Gigabyte Soft AP Step 1. To start Gigabyte Soft AP, right click the quick start icon located in your system tray and select “Switch to AP Mode” or “Switch to Station Mode”. Figure 4-1. Switch to AP Mode Step 2. Switch to AP mode, system will display default information. Figure 4-2.
windows taskbar as figure 4-3. You may double click it to bring up the main menu if you selected to close GNConfig menu earlier. You may also use mouse right button to close GNConfig utility. Figure 4-3.
4.2 Config Setting This page provides configuration setting and display Soft AP detail information. Figure 4-4. Gigabyte SoftAP Utility – Config Window Description of each field: SSID–AP name of user type. User also can select [Use Mac Address] to display it. System default is SoftAP-5F. Wireless Mode– Select wireless mode. Options: 802.11 B/G mix, 802.11B only, 802.11A only, 802.11G only, 802.11 B/G/N mix and 802.11 A/N mix mode are supported. When your wireless card supports 802.
1: ETSI 2: SPAIN 3: FRANCE 4: MKK 5: MKKI (TELEC) 6: ISRAEL 7: ISRAEL CH1 ~ CH10 ~ CH10 ~ CH14 ~ CH1 ~ CH3 ~ CH5 ~ CH13 CH11 CH13 CH14 CH14 CH9 CH13 Wireless Protection– Select the Wireless Protection mode. Options: Auto, on, and off. System default is auto. a. Auto: STA will dynamically change as AP announcement. b. On: Always send frame with protection. c. Off: Always send frame without protection. Beacon (ms)– The time between two beacons. Default setting is 100 ms.
4.3 Security Setting This page can configure security setting and display Soft AP detail information. Figure 4-5.
Figure 4-6. Gigabyte SoftAP Utility – Security Setting Window Description of each field: Authentication Type– There are three type of authentication modes supported by GNConfig. They are open and WPA-PSK system. Encryption Type– For open and Share authentication mode, the selected of encryption type are none and WEP. For WPA-PSK authentication mode, the encryption types are TIKP and AES. WPA Pre-shared Key– This is the shared secret between AP and STA.
4.4 Access Control This page is user setting for AP connection or disconnection with Mac address. Figure 4-7. Gigabyte SoftAP Utility –Access Panel Window Description for each field: Access Policy– Select whether AP start the function. System default is disabling. Mac Address– Manually force the Mac address using the function, and press [Add] to [Access List]. Access List– Display all Mac Address. Delete– Delete Mac address. Remove All– Remove all Mac address in [Access List].
4.5 Mac Table Mac Table window displays the station detail information of current AP connection. Figure 4-8. Gigabyte SoftAP Utility –Mac Table Window MAC Address– The station’s Mac address of current connection. AID– Raise value by current connection. Power Saving Mode– Determine the station of current connect whether support Power Saving Mode. Status– Displays current AP connection status.
4.6 Event Log This page log and display Soft AP all event time and message. Figure 4-9. Gigabyte SoftAP Utility –Event Log Window Event Time (yy/mm/dd-hh:mm:ss) – Log event time. Message– All event message.
4.7 Statistic Statistics page displays the detail counter information based on 802.11 MIB counters. This page translates that MIB counters into a format easier for user to understand. Figure 4-10. Gigabyte SoftAP Utility –Statistics Window Statistics Transmit: Frames Transmitted Successfully– Frames successfully sent. Frames Fail To Receive ACK After All Retries– Frames failed transmit after hitting retry limit. RTS Frames Successfully Receive CTS– Successfully receive CTS after sending RTS frame.
Receive Statistics: Frames Received Successfully– Frames received successfully. Frames Received With CRC Error– Frames received with CRC error. Frames Dropped Due To Out-of-Resource– Frames dropped due to resource issue. Duplicate Frames Received– Duplicate received frames.
4.8 About Figure 4-10. Gigabyte SoftAP Utility –About Window This page display the wireless card and driver version information. Connect to Gigabyte website: Gigabyte Technology, CO., LTD Display Configuration Utility, Driver and EEPROM version information. Display Wireless NIC MAC address.
Appendix A Troubleshooting This troubleshooting guide provides answers to some common problems which you may encounter while installing or using GIGABYTE Wireless Adapters. Contact the GIGABYTE Wireless Technical Support Team at www.giga-byte.com if you encounter problems not mentioned in this section. Problem: Cannot connect to an AP Advice: Make sure the SSID for the Mini Card is the same as the Access Point. Make sure the security settings are the same as that of Access Point.
Appendix B Regulatory Information CE Mark Warning: This is a Class B product. In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures. FCC Statement: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Appendix C Warranty Limited Warranty Statement (1-Year Warranty) Thank you for purchasing the GIGABYTE Product. This limited warranty statement will provide you one year warranty starting from the purchase date.