Trademarks & Copyright Windows 95/98/ME and Windows NT/2000/XP/2003 Servers are registered trademarks of Microsoft Corp. All other brands and product names are trademarks of their respective companies. No part of this publication may be reproduced in any form or by any means or used to make any derivative (such as translation, transformation or adaptation) without the express written consent of the manufacturer as stipulated by the United States Copyright Act of 1976.
CONTENTS 1 INTRODUCTION ...................................................................... 1 1.1 1.2 1.3 1.4 Features ......................................................................................................... 1 Specifications.................................................................................................. 2 Package Contents .......................................................................................... 2 Wireless Network Options / Quick Tutorial...............
1 Introduction Thank you for purchasing the Hawking Technologies HWUG1 Wireless 802.11usb Adapter with removable antenna. The removable antenna enables user to upgrade to a higher power antenna for a wider wireless coverage. Designed with Turbo Mode, the HWUG1 is 108Mbps capable when paired with the hawking HWRGM1A, Wireless-G MiMo Router. The Turbo Mode increases the data transfer rate by compressing the data.
1.2 Specifications • • • • Standard: IEEE 802.11b/g Interface: USB 2.0 Type A Frequency Band: 2.4000 ~ 2.4835GHz (Industrial Scientific Medical Band) Modulation: OFDM with BPSK, QPSK, 16QAM, 64QAM (11g) BPSK, QPSK, CCK (11b) • • • • • • • • • • • Data Rate: 54/48/36/24/18/12/11/9/6/5.5/2/1Mbps auto fallback Security: 64/128-bit WEP Data Encryption, WPA, WPA21, AES and IEEE 802.
1.4 Wireless Network Options / Quick Tutorial The Peer-to-Peer Network (also known as Ad-Hoc Mode) This network installation lets you set a small wireless workgroup easily and quickly. Equipped with wireless PC Cards, wireless PCI, or Wireless USB adapters, you can share files and printers directly between each PC and laptop. You can also use one computer as an Internet Server to connect to a wired global network and share files and information with other computers via a wireless LAN.
2 Installation Procedure Before you proceed with the installation, please notice following descriptions. Note1: Please do not install the HWUG1 into your computer before installing the software program from the CD. Note2: The following installation was operated under Windows XP. (Procedures are similar for Windows 98SE/Me/2000/2003 Server.) Note3: If you have installed the Wireless adapter driver & utility before, please uninstall the old version first. A. Insert the Installation CD into your CD-ROM Drive.
D. Choose “Hawking Configuration Tool” and click Next. E. Select “Optimize for WiFi Mode” and click Next. F. The system will begin to install the software utility for the HWU54DM. Follow the instruction of the program to plug in the Mini USB Adapter into the USB port of your desktop or laptop computer.
G. When the following screen appears, click Finish to complete the software and driver installation.
2.1 Verify Device Installation To verify that the device has been properly installed in your computer and is enabled, go to Start Æ Settings Æ Control Panel Æ System (Æ Hardware) Æ Device Manager. Expand the Network adapters item. If the Hawking Wireless-G USB Adapter with Removable Antenna is listed, it means that your device is properly installed and enabled.
3 NETWORK CONNECTION Once the driver has been installed, you will need to make adjustments to your network settings. In Windows 98SE/ME 1. 2. Go to Start Æ Settings Æ Control Panel Æ Network. Make sure that you have all the following components installed. Hawking HWUG1 Wireless-G Network Adapter with Removable Antenna IPX/SPX-compatible Protocol NetBEUI TCP/IP If any components are missing, click on the Add button to install them.
4. Highlight Microsoft, and then double click on the item you want to add. Click OK. After returning to the Network screen, you can make your computer is visible on the network by enabling the File and Print Sharing. 5. Click the Identification tab. Enter a name that is unique on the network. Type the name of your workgroup, which should be the same name used by all of the other PCs on the network.
6. Click the Access Control tab. Make sure that “Share-level access control” is selected. If connecting to a Netware server, share level can be set to “User-level access control.” 7. When finished, restart your computer to activate the new device. 8. Once the computer has been rebooted, a Logon window will appear and will require you to enter a username and password. Enter a username and password and click OK. Do not click the Cancel button, or you won’t be able to log onto the network.
9. Double-click the Network Neighborhood icon on the windows desktop, and you should see the names of the other PCs on the network. In Windows 2000/XP 1. [In Windows 2000] Go to StartÆ Settings Æ Control Panel Æ Network and Dial-up Connections Æ Local Area Connection Æ Properties. [In Windows XP] Go to Start Æ Control Panel Æ Network Connections Æ Wireless Network Connection Æ Properties. 2. Make sure that you have all the following components installed.
3. After selecting the component you need, click Add… to install.
4. Select the network protocol you wish to add and click OK. This will return you to the Local Area Connections Properties window. 5. To allow your computer to be visible on the network, make sure you have checked off the File and Printer Sharing for Microsoft Networks.
4 Configuration Utility The Hawking Wireless Configuration Utility is a powerful application that helps you configure the HWUG1 and monitor the link status and statistics of your wireless connection. The Configuration Utility appears as an icon on the system tray of your Windows operating system while the adapter is running. You can open it by double-clicking on the icon.
4.2 Site Survey When you open the Configuration Utility, the system will scan all wireless channels to find all access points/stations within the accessible range of your card and automatically connect to the wireless device with the highest signal strength. When using the “Site Survey” option, all nearby networks will be listed. You can change your connection to another network or you may add one of the networks to your own profile list.
4.3 Profile The “Profiles List” is for you to manage the networks you connect to frequently. You are able to Add/Delete/Edit/Activate a profile. Parameter Description Profiles List The profiles list display all the profiles and the relative information including Profile Name, SSID, Channel, etc. Add/Delete/Edit Button Click these buttons to add/delete/edit the selected profiles. Activate Button Click “Activate” to connect to the selected profile.
4.3.1 Configure the Profile (Add/Edit a Profile) System Configuration Parameter Description Profile Name Define a recognizable profile name for you to identify the different networks. SSID The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs. You may specify a SSID for the adapter and then only the device with the same SSID can interconnect to the adapter.
Ad-Hoc – Select this mode if you want to connect to another wireless station in the Wireless LAN network without going through an Access Point or Router. Peer to Peer. Transmit Power If you wish to lower the transmit power of the card to save the power of your system, you can select the lower percentages from the list. 11B Preamble Type The preamble defines the length of the CRC block for communication among wireless stations. This option is only active in the Ad Hoc network.
4.3.2 Authentication vs. Security Under the profiles tab, you are able to specify the type of security/authentication mode used to connect with a wireless network. To access, create a new profile or click “edit” on one of the profiles and select the “Authentication and Security” tab. Parameter Description Authentication Type This setting has to be consistent with the wireless networks that the adapter intends to connect to. All security keys within a network must match to allow successful communications.
manually enters the starting password in their access point or gateway, as well as in each wireless stations in the network. WPA takes over automatically from that point, keeping unauthorized users that don't have the matching password from joining the network, while encrypting the data traveling between authorized devices. The encryption methods are including TKIP and AES. Note that this option is only available for Windows XP. WPA2 – This mode complies with the 802.11i standard.
range) or 5-digit ASCII characters (including “a-z” and “0-9”) as the encryption keys. For example: “0123456aef“ or “test1”. 128-bit – Input 26-digit Hex values (in the “A-F”, “a-f” and “0-9” range) or 13-digit ASCII characters (including “a-z” and “0-9”) as the encryption keys. For example: “01234567890123456789abcdef“ or “administrator”. 4.3.
To enable the WPA function in Windows XP, the following software systems are required: 1. Right-click the Windows wireless networks icon located on your taskbar as shown below. Select “View Available Wireless Networks” to open up the Wireless Networks window. If you get the following message below, please follow the next step. If not, skip to Step 3. 2. Right-click the Hawking Wireless Configuration Utility icon on the taskbar.
4. In the Wireless Networks tab, select your preferred wireless network you are connected to and click on “Properties”.
5. Under the Association tab, select the type of Network Authentication your wireless network uses and determine the type of data encryption, if available. Ask your administrator for network information, if you need help. A list of network authentication terms is described on the next page. 6. If you need to configure network authentication, go to the Authentication tab. 7. Click OK once finished to complete the advanced setup. Then press OK again to close the Window properties.
. - 25 -
Parameter Description Network Authentication Open –No authentication is needed among the wireless network. Shared – Only wireless stations using a shared key (WEP Key identified) are allowed to connecting each other. WPA – This mode is for enterprise with an authentication server (Radius Server), WPA-enabled access point, and a WPA-enabled client. Once WPA is enabled, all clients and access points on the network must be WPA-enabled in order to access the network.
4.4 Link Status From the “Link Status” option, you can view all the information of the network you are connecting to. You can use this tool in while at the same time repositioning the Hi-Gain antenna to find the optimal location for antenna placement. Parameter Description Status Displays the SSID and MAC ID of the network the adapter is connected to. Current Channel Display the number of the radio channel and the frequency used for the networking.
shown in the bar, the more radio signal been received by the card. This indicator helps to find the proper position of the wireless device for quality network operation. Noise Level 4.5 Measures the level of signal interference within a wireless network. The lower the noise level value, the better the connection.
4.6 Statistics This option enables you to view the available statistic information with its Tx counts (Tx success, Tx error, RTS Success and RTS Failed), and its Rx counts (Rx success, Rx error). You may reset the counters by clicking ”Reset Counter”. 4.7 Advanced This option enables you to configure more advanced settings, for example: wireless mode, protection mode and etc.
Wireless Mode 802.11 B/G mix – If you have a mix of 802.11b and 802.11g wireless stations in your network, it is recommended to setting the card to this mode. This mode is also the default setting. 802.11 B or G only – This card can be compatible with both 802.11g and 802.11b wireless stations. If there are only 802.11b wireless stations in the network, you can set the card to this mode. The same goes with 802.11g only wireless stations.
CCX 2.0 Support Cisco Compatible Extensions function: 1. LEAP turn on CCKM 2. Enable Radio Measurement: can channel measurement every 0~2000 milliseconds. 3. Enable QOS: enable Quality of Service. NOTE: These settings should only be used for advanced system administrators only.. When settings have been made, select “Apply” to place the changes into effect. 4.8 About By choosing this option, you can click view software and driver version information, IP address and gateway address.
5 UNINSTALLATION In case you need to uninstall the Utility and driver, please refer to below steps. (As you uninstall the utility, the driver will be uninstalled as well.) 1. Go to Start Æ All Programs ÆHawkingÆ Uninstall - Utility. 2. Click Remove all to complete the un-installation procedure.
6 Troubleshooting This chapter provides solutions to problems usually encountered during the installation and operation of the adapter. 1. What is the IEEE 802.11g standard? 802.11g is the new IEEE standard for high-speed wireless LAN communications that provides for up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream wireless LAN technology for the home, office and public networks. 802.11g defines the use of the same OFDM modulation technique specified in IEEE 802.
An integrated wireless and wireless and wired LAN is called an Infrastructure configuration. Infrastructure is applicable to enterprise scale for wireless access to central database, or wireless application for mobile workers. 6. What is BSS ID? A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7. What is WEP? WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .
wideband noise and is rejected (ignored) by most narrowband receivers. 13. What is Spread Spectrum? Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communication systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security.