WLAN 802.11a/b/g USB 2.0 Adapter User’s Guide Version: 1.0 — Sep.
Copyright Statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, whether electronic, mechanical, photocopying, recording or otherwise without the prior writing of the publisher. Windows™ 2000/XP are trademarks of Microsoft® Corp. Atheros is a registered trademark of Atheros Communications, Inc. All copyright reserved.
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
Table of Contents REGULATORY INFORMATION...................................................................... 錯誤! 尚未定義書籤。 1. WELCOME............................................................................................................................................... 5 1.1 KIT CONTENTS...................................................................................................................................... 5 1.2 MAIN FEATURES OF 802.11A /B/G USB 2.0 ADAPTER ..............................
4.4.11 Using WPA Passphrase Security .................................................................... 43 4.4.12 Using Pre-Shared Key (Static WEP) Security.................................................. 44 4.5 DISPLAY S ETTING ...............................................................................................................................45 4.6 ACTIONS TOOLS ..................................................................................................................................
1. Welcome Thank you for purchasing our 802.11a/b/g USB 2.0 Adapter, and welcome to Wireless LAN—the easy way to wireless networking. This user’s guide introduces to you the 802.11a/b/g USB 2.0 Adapter and describes the most common configurations, which will help you connect to your network easily. Please read this manual to get familiar with the IEEE802.11a/b/g Wireless LAN. This manual contains detailed instructions in operation of this product. Please keep this manual for future reference.
n n n n n n n Super A/GTM and eXtended Range XRTM Technology Backward Compatible with 802.11b Roaming Support 802.1x Authentication AES-CCM & TKIP Encryption 64/128/152-bit WEP Encryption Driver Support OS Windows®2000/XP 802.11a/b/g USB 2.0 Adapter supports: n Automatic load balancing for optimized bandwidth n Advanced power management n OS Windows®2000/XP 1.3 Wireless Networking Scenarios As our 802.11a/b/g USB 2.0 Adapter is interoperable and compatible with other IEEE 802.
Peer-to-Peer Networking: An Ad Hoc Network could be easily set up with some PCs and this 802.11a/b/g USB 2.0 Adapter or our other WLAN devices. Therefore, it is very suitable to build a network for temporary use, such as for demonstration in exhibition, for new sales point/branch use and alike. Cooperate LAN (Local Area Networking): With some 802.11a/b/g USB 2.0 Adapters and Access Points, it is easy to construct a LAN with access to Internet for enterprise use. The construction is quite easy that the 802.
2. Quick Start Guide 2.1 Installation 1. Insert the installation CD. It automatically starts the setup program for software installation. 2. Follow the installation wizard to complete the software installation process. 3. Connect the WLAN 802.11a/b/g USB 2.0 Adapter to your laptop PC/desktop PC during software installation. 4. Restart your PC. NOTE! Select “Cancel” when Found New Hardware window appears. NOTE! In Windows XP, it is recommended that you use the WLAN 802.11a/b/g USB2.0 Utility.
2.2 Connecting to an Existing Network After restarting your PC, the adapter automatically connects to an unsecured network that has the best signal strength(if there’s any). Profile Name shows Default. You may also manually assign a network to connect with. Follow the steps below: 1. Open WLAN 802.11a/b/g USB 2.0 Adapter Utility (by double-clicking on the shortcut icon on the desktop), and click Profile Management tab. 2. Click Scan, and Available Infrastructure and Ad Hoc Networks list appears. 3.
3. Step-by-Step Instructions 3.1 Installation 1. Insert the installation CD into your CD-ROM drive. Click Next. 2. Select “I accept the terms of the license agreement” and click Next.
3. Click Next. You can highlight different items to choose different setup. 4. Click Yes. System reminds you the reboot step.
5. Click Next. Or click Browse to select the destination folder you prefer. 6. Click Next. Edit the Program Folder name if necessary.
7. Read the notice and click Next. 8. Click Next. WLAN 802.11a/b/g USB2.0 Adapter Utility is recommended.
9. Insert the adapter and click OK. 10. Click OK and your PC will restart. 11. A short-cut icon appears on the desktop of your PC. NOTE! Select “Cancel” when Found New Hardware window appears. NOTE! In Windows XP, it is recommended that you use the WLAN 802.11a/b/g USB2.0 Utility.
3.2 Connecting to a network NOTE! For details of Utility Configuration, please refer to Chapter 4. Status Icons : Ad Hoc Network : Low Signal Strength : Medium Signal Strength : High Signal Strength : Infrastructure Network Connected : No Signal Strength : Profile Activated : Radio Off : Secured : Infrastructure Network After restarting your PC, the adapter automatically connects to an unsecured network that has the best signal strength (if there’s any). Profile Name shows Default.
1. Open WLAN 802.11a/b/g USB 2.0 Adapter Utility (by double-clicking on the shortcut icon on the desktop), and click Profile Management tab. 2. Click Scan, and Available Infrastructure and Ad Hoc Networks list appears.
3. Click the desired network SSID and click Activate. 4. Contact the network administrator for Profile Settings: General, Security and Advanced. General Tab: Enter a Profile Name and SSID (if necessary).
Security Tab: If the connected network is secured, contact the network administrator for Security Settings. Advanced Tab: Click Advanced for other network settings. 5. Once connected, the status icon in the Windows System Tray appears. You can click Current Status tab to check the connection status.
3.3 Creating an Ad Hoc Network If you have more computers and only want to place them in a local area network, or you want to communicate directly without using an Access Point or any connection to a wired network, you can create a new Ad Hoc Network. 1. In Profile Management tab, click New button to create a profile.
2. Click Advanced to switch Network Type to Ad Hoc. 3. Click General to edit the Profile and SSID1 names.
4. Click Security to configure security options. 5. Click OK button. 3.4 Removing your 802.11a/b/g USB 2.0 Adapter You can remove the device after you finished the action with the device. However, in Windows XP and Windows 2000, please follow the safe removal procedure. You can find a safe removal icon in your computer’s notification area. 1. Double click the Safely Remove Hardware icon. 2. The “Safely Remove Hardware” window will pop up. You can select the device you want to remove.
3.5 Uninstallation 1. Make sure the Utility is closed. 2. Go to Star → Programs → WLAN 802.11a+b+g USB2.0 Adapter → Uninstall Utility. 3. Choose “Uninstall the previous installation” and click Next. 4. Click Yes. 5. Click OK.
6. Click Yes. 7. Click OK, and your PC will restart. Uninstallation is finished.
4. Using the Utility 4.1 Current Status The Current Status tab contains general information about the program and its operations. n n n n n n n n n Profile Name: The name of the current selected configuration profile. If you see Default in Profile Name, it is because you do not assign a specific SSID, and the adapter automatically searches and connects to the most suitable network. You can configure the profile name through Profile Management gModifygGeneral.
4.2 Diagnostics In Diagnostics tab, you can check Transmit and Receive Data: Multicast Packets, Broadcast Packets, Unicast Packets and Total Bytes. Adapter Information n n n n n n Card Name: The name of the wireless network adapter. MAC Address: The MAC address of the wireless network adapter. Driver: The driver name and path of the wireless network adapter driver. Driver Version: The version of the wireless network adapter driver. Driver Date: The creation date of the wireless network adapter driver.
Advanced Statistics: Shows receive and transmit statistical information for the following receive and transmit diagnostics for frames received by or transmitted to the wireless network adapter: Transmitted Frames: n Frames transmitted OK n Frames retried n Frames dropped n No ACK frames n ACK frames n RTS Frames n Clear-to-send (CTS) Frames n No CTS frames n Retried RTS frames n Retried data frames Received Frames: n Frames received OK n Beacons n Frames with errors 26
n n n n n n n n n n n n n CRC errors Encryption errors Duplicate frames AP mismatches Data rate mismatches Authentication time-out Authentication rejects: the number of AP authentication failures received by the wireless network adapter Association time-out Association rejects: the number of access point authentication rejects received by the wireless network adapter Standard MIC OK Standard MIC errors CKIP MIC OK CKIP MIC errors 4.
n n n n n Modify: To edit settings of chosen profile. Remove: To remove the chosen profile from the list. Activate: To activate the chosen profile. Import: To import a pre-set profile (pre-saved as a Config File *.prf) Export: To export the chosen profile, so you can save the profile as a Config File (*.prf) for future use. n n Scan: To scan all available network in vicinity. Order Profiles: To place the order of preferred profiles. 4.3.1 Creating or Modifying a Configuration Profile 1.
4. Edit the fields in the Security tab to configure the configuration profile. n n n n n WPA: Enables the use of Wi-Fi Protected Access (WPA). WPA Passphrase: Enables WPA Passphrase security. Click on the Configure button and fill in the WPA Passphrase. 802.1x: Enables 802.1x security. This option requires IT administration. Pre-Shared Key (Static WEP): Enables the use of pre-shared keys that are defined on both the access point and the station. None: No security (not recomme nded). 5.
n Power Save Mode: Specify: ü Maximum mode: causes the access point to buffer incoming messages for the wireless adapter. The adapter up periodically polls the access point to see if any messages are waiting. ü Normal mode: uses maxim when retrieving a large number of packets, then switches back to power save mode after retrieving the packets. ü Off: turns power saving off, thus powering up the wireless adapter continuously for a short message response time.