802.11g USB2.0 WLAN Adapter User’s Guide Version: 1.0 — Dec.
Copyright Statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, whether electronic, mechanical, photocopying, recording or otherwise without the prior writing of the publisher. Windows™ 98SE/2000/ME/XP are trademarks of Microsoft® Corp. Pentium is trademark of Intel. All copyright reserved.
Regulatory Information Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Table of Contents Regulatory Information ________________________________________________2 1. Welcome __________________________________________________________4 1.1 Kit Contents______________________________________________________5 1.2 Main Features of 802.11g USB 2.0 WLAN Adapter _____________________6 1.3 Wireless Networking Scenarios ______________________________________7 1.4 Advantages for Using Wireless Network_______________________________9 2.
1. Welcome Thank you for purchasing our 802.11g USB 2.0 WLAN Adapter, and welcome to Wireless LAN—the easy way to wireless networking. This user’s guide introduces to you the 802.11g USB 2.0 WLAN Adapter and describes the most common configurations, which will help you connect to your network easily. Please read this manual to get familiar with the IEEE802.11g Wireless LAN. This manual contains detailed instructions in operation of this product. Please keep this manual for future reference.
1.1 Kit Contents The 802.11g USB 2.0 WLAN Adapter kit should include the following items: One 802.11g USB 2.0 WLAN Adapter with USB cable, one CD and one Quick Start Guide. a. One 802.11g USB 2.0 WLAN Adapter b. One USB cable c. One Software CD including: 1. Utility & Driver Installation Software 2. Acrobat Reader 3. User Manual PDF File d. Quick Start Guide If any of the items mentioned above are damaged or missing, please contact your distributor.
1.2 Main Features of 802.11g USB 2.0 WLAN Adapter A. Status LED Off: Power Off. z Blinking: The USB adapter is powered on but no wireless connection is made yet. z z Steady Green: Wireless connection is linked. B. USB Connector 802.11g USB 2.0 WLAN Adapter features: 1. 2. 3. 4. 5. 6. High-speed wireless connection, up to 54 Mbps IEEE802.11g (DSSS) standard for 2.
1.3 Wireless Networking Scenarios As our 802.11g USB 2.0 WLAN Adapter is interoperable and compatible with other IEEE 802.11g compliant products from other manufacturers, it offers you the most freedom to establish your ideal wireless network. Therefore, after installing 802.11g USB 2.0 WLAN Adapter, you can connect your computer to: a. A Peer-to-Peer Workgroup of 802.11g compliant wireless devices. b. A LAN (Local Area Network) constructed by Access Point(s) or other 802.11g compliant systems. c.
A. Peer-to-Peer Networking: An Ad Hoc Network could be easily set up with some PCs and this 802.11g USB 2.0 WLAN Adapter or our other WLAN devices. Therefore, it is very suitable to build a network for temporary use, such as for demonstration in exhibition, for new sales point/branch use and alike. B. Cooperate LAN (Local Area Networking): With some 802.11g USB 2.0 WLAN Adapters and Access Points, it is easy to construct a LAN with access to Internet for enterprise use.
1.4 Advantages for Using Wireless Network 802.11g USB 2.0 WLAN Adapter can wirelessly transmit and receive data, minimizing the need for wired connections, at a speed of up to eleven megabit per second. With the 802.11g USB 2.0 WLAN Adapter you can locate your PC wherever you want without wires and cables. The 802.11g USB 2.0 WLAN Adapter provides LAN users with an access to real-time information anywhere in their organization.
2. Quick Start to Wireless Networking 2.1 Installation 1. Insert the installation CD. WLAN Utility and Driver. 2. Follow the installation wizard to complete the software installation process and restart your computer.. Connect the 802.11g USB 2.0 WLAN Adapter to your PC/notebook PC. 3. It automatically starts the setup program for Note! Please use USB extension cable to connect the 802.11g USB 2.0 WLAN Adapter with your PC/Notebook during normal operation.
4. Operation System will detect new device and verify the driver automatically. Note! During installation procedure, each operating system may prompt different specific options: Windows 98SE: The system will request the original Windows CD during the installation process. When the installation is finished, you’ll have to restart your computer. Windows Me: Please restart your computer when the installation is finished.
2.2 Connecting to an Existing Network 1. Go to windows Startup > Program > 802.11g USB2.0 adapter Utility > 802.11g USB2.0 adapter Utility to open the utility. The 802.11g USB2.0 adapter in Windows Utility window appears. You can also see a small red icon System Tray. 2. Key in “Any” for Network name and click “Apply”. The 802.11g USB2.0 adapter will search an available network automatically. Once connected, the utility icon will becom 3 .
4 Go to “Status” Tab to view network link status. 5. For details of each tab in 802.11g USB2.0 WLAN Utility, please read User’s Guide Chapter 4.
3. Step-by-Step Installation Guide This section will lead you through the installation of 802.11g USB 2.0 WLAN Adapter and IEEE802.11g WLAN software in detail. People who are familiar with the installation and settings of wireless device may refer to quick start guide to establish a network in a snap. To establish your wireless network connection, the following steps should be executed: 1. Install the software by using the installation CD. 2. Install the 802.11g USB 2.0 WLAN Adapter. 3.
3.1 Install the 802.11g USB2.0 adapter Driver / Utility Note! Please install the 802.11g USB WLAN Driver & Utility before inserting the 802.11g USB 2.0 WLAN Adapter. 1. Insert the installation CD. Insert the installation CD into your CD-ROM drive. The setup program automatically starts. 2. Click “Next”. 3. Click “Yes”.
4. Read the destination folder and click “Next”. The default destination folder is displayed in the setup dialog box. Click “Next” to go on to Step 6. You may change the default folder by clicking “Browse” to select the destination folder you prefer (go on to Step 5). Click “ Next” to go to the next screen. 5. Select the Program Folder and click “Next”.
6. Click “Next”. 7. Click “Finish”. The installation is complete.
8. Choose “Yes” to restart computer and click “Finish”. 9. Connect the 802.11g USB 2.0 WLAN Adapter to your PC/notebook PC. To adjust the direction or position of the 802.11g USB 2.0 WLAN Adapter, please use the USB extension cable . Notebook Note! PC Please use USB extension cable to connect your 802.11g USB 2.0 WLAN Adapter with PC/Notebook during normal operation.
3.1.1 Additional Setup Processes During software installation procedure, each operating system may prompt different specific options. Mostly, you will be asked to add some necessary protocols and to edit some networking settings. 1. Windows 98SE: The system may request the original Windows CD during the installation process. Please check with the network administrator for the values of the settings. When the installation is finished, you’ll have to restart your computer. 2.
3.1.2 Disable Windows XP Zero-Configuration In Windows XP, it is recommended that you use the 802.11g USB2.0 adapter Utility. Right after the installation, before opening the Utility, please follow the steps below to disable the Windows XP Zero Configuration: 1. Go to “Control Panel” and double click “Network Connections”. 2. Right-click “Wireless Network Connection” of 802.11g USB 2.0 WLAN Adapter, and select “Properties”. 3.
3.2 Verifying the Driver/Utility 1. Windows 98SE/Me: Step 1. Right-click “My Computer” icon on the desktop and choose “Properties”. Step 2. Select “Device Manager” tab and open “Network adapters”. You should see your 802.11g USB 2.0 WLAN Adapter in the list. Highlight it and click “Properties” button. Step 3. From the “Device status”, you should see the line “This device is working properly”.
3.3 802.11g USB2.0 WLAN Utility 802.11g USB 2.0 WLAN Adapter has its own management software, named 802.11g USB2.0 Utility, and users can control all functions provided with it. The Utility icon appears in the Windows System Tray. The Utility includes seven tabs: Status, Configuration, WEP, Security, IBSS, Domain and About.
3.4 Basic Setting for Infrastructure Mode To connect with an Access Point, please follow the process below: 1. Select the “Configuration” tab 2. Select “Access Point” for Network Type 3. Select or enter the correct SSID (Network Name) 4. Press the “Apply” button. SSID is the group name that will be shared by every member of your wireless network .You will only be able to connect with an Access Point (AP), which has the same SSID. Note that the SSID will be case sensitivity.
3.5 Basic Setting for Peer-to-peer Mode If you have more computers and only want to place them in a local area network, or you want to communicate directly without using an Access Point or any connection to a wired network, then you can select the “Peer-to-peer” mode on your WLAN Utility. A. Peer-to-peer Please follow the procedures below to set the “Peer to peer”: 1. 2. 3. 4. Select “Configuration” tab. Select “Peer-to-peer” for Network Type.
3.6 Remove your 802.11g USB 2.0 WLAN Adapter You can remove the device after you finished the action with the device. However, in Windows XP/ME and Windows 2000, please follow the safe removal procedure. You can find a safe removal icon in your computer’s notification area. 1. Double click the safe removal icon. 2. The “Unplug or Eject Hardware” window will pop up. You can select the device you want to remove. Then, click the Stop button. Note! When removing the 802.11g USB 2.
3.7 Uninstall the 802.11g USB2.0 WLAN Utility / Driver 1. Make sure the Utility is closed. 2. Go to windows Startup > Program_>802.11g USB2.0 adapter Utility > Uninstall 802.11g USB2.0 adapter 3. Follow the uninstall wizard to complete the uninstallation. 4. Click “Finish” when uninstallation is completed. 5. You should restart your computer.
4. Using the Utility 4.1 Status Tab The Status menu displays information on the current status of your connection to the wireless LAN. You can display this menu by choosing the Wireless Network Status... command from the pop-up menu, or by clicking on the Status tab when the Configuration Utility is displayed on your desktop. The fields in this menu provide the following information: State: shows the association state of your computer with the wireless LAN.
• Not Associated: The adapter has not found any network with which to associate. • Hardware Radio Switch OFF: The radio has been disabled by moving the hardware radio switch to the off position. Note that not all adapters have a hardware switch. Current Tx Rate: shows the current transmit rate of the current association. Current Channel: shows the channel on which the connection is made. In Infrastructure mode, this number changes as the radio scans the available channels.
4.2 Configuration Tab The Configuration tab shows information of Network Name, Network Type. And Profiles allows you to save five sets of default settings. After entering the values of the settings (SSID, Network Type, Channel etc.), set a name in the Profiles field.
4.3 WEP Tab You may enhance the security of your network by enabling the “Encryption” function. The WEP Required Mode enables you to define the encryption keys that your 802.11g USB2.0 Adapter should use. Caution: If you wish to enable the “Encryption” function, you must enable this function for all computers of your network, and the WEP key needs to be the same for all IEEE802.11g stations. Follow the steps below to set your WEP Required Mode: 1.
a. Select “64 bit” vs “Alphanumeric” and enter 5-digit WEP key. b. Select “64 bit” vs “Hexadecimal” and enter 10-digit WEP key.
c. Select “128 bit” vs “Alphanumeric” and enter 13 digit WEP key. d. Select “128 bit” vs “Hexadecimal” and enter 26 digit WEP key.
d. You may choose “Create Keys with Passphrase”.
4.4 Security Tab Except WEP Tab in previous page, this Tab provides you the enhancement of WEP security. You may choose the authentication type “MD5-Challenge”, “LEAP”, “TTLS”, “PEAP”, “TLS/Smartcard” or “WPA-PSK” which would require you to enter “Username”,“Password” and related data, please contact with MIS administrator for the settings.
a. MD5-Challenge: MD5 is an EAP-Type for authentication. It is analogous to the PPP CHAP protocol. A challenge string is sent from the Authentication Server to the Supplicant in the MD5-Challenge Request. The challenge string with the user password is hashed using MD5 and the hash is returned in the MD5-Challenge Response. The Authentication Server performs the same hash and compares the result with that returned by the Supplicant to determine whether the authentication is a Success or Failure.
b. LEAP: LEAP (Lightweight Extensible Authentication Protocol) is a Cisco proprietary EAP-Type. It is designed to overcome some basic wireless authentication concerns through Mutual Authentication and the use of dynamic WEP keys.
C. TTLS: (Tunneled TLS) is an EAP-Type for authentication that employs a twophase authentication process. In the first phase the Authentication Server is authenticated to the Supplicant . Using TLS, a secure channel is established through which the Supplicant can be authenticated to the Authentication Server using legacy PPP authentication protocols such as PAP, CHAP, and MS-CHAP. TTLS has the advantage over TLS that it only requires a certificate at the Authentication Server.
d. PEAP: (Protected Extensible Authentication Protocol) is a two-phase authentication like TLS. In the first phase the Authentication Server is authenticated to the Supplicant. Using TLS, a secure channel is established through which any other EAP-Type can be used to authenticate the Supplicant to the Authentication Server during the second phase. A certificate is only required at the Authentication Server.
e. TLS/Smartcard: TLS is an EAP-Type for authentication based upon X.509 certificates. Because it requires both the Supplicant and the Authentication Server to have certificates, it provides explicit Mutual Authentication and is resilient to man-in-the-middle attacks. After successful authentication a secure TLS link is established to securely communicate a unique session key from the Authentication Server to the Authenticator.
f. WPA-PSK: Wi-Fi Protected Access (WPA) is a replacement security standard for WEP. It is a subset of the IEEE 802.11i standard being developed. WPA makes use of TKIP to deliver security superior to WEP. 802.1X access control is still employed. The Authentication Server provides the material for creating the keys.
4.5 IBSS Tab When communicating in a peer-to-peer network, you may specify a channel on which you prefer communications to take place. To specify a channel, click on the channel to select it, and then click the Apply button. Note that this is not necessarily the channel on which peer-to-peer communications will be established. If the IBSS network names (SSID) are the same for nodes in the peer-to-peer network but they have different preferred channels, a network can still be established.
4.6 Domain Tab A domain refers to a territory in which radio frequency transmissions must conform to the standards set by a single regulatory agency. For example, in the United States, the allowed frequencies and channels for wireless data communications are set by the FCC. Every country is free to set its own standards, although in practice many countries may use the same standards. The IEEE 802.
If you choose Strict in the 802.11d support field, your adapter will only communicate with Access Points which provide 802.11d support. In this case, the adapter scans all communications channels for an Access Point which provides information on the channels, frequencies, and power levels permitted in your location. Once it finds such an Access Point, the adapter conforms its operations to these standards.
4.7 About Tab This tab provides you the version information of Firmware, Driver and Utility.
5. Network Application This section consists of the network applications of 802.11g USB 2.0 WLAN Adapter, including: A. To Survey the network neighborhood B. To Share Your Folder with Your Network Member(s) C. To Share Your Printer with Your Network Member(s) D. To Access the Shared Folder(s)/File(s) of Your Network Members(s) E. To Use the Shared Printer(s) of Your Network Member(s) In fact, the network applications of 802.11g USB 2.0 WLAN Adapter are the same as they are in a wired network environment.
5.2 File Sharing 802.11g USB 2.0 WLAN Adapter allows the sharing of files between computers that are logged onto the same wireless network. If you want to share your folder “My Documents” with other computers of the wireless network, please highlight the folder “My Documents” and drag it to Shared Documents folder. Sharing files in the IEEE802.11g wireless network will be like sharing files on a wired LAN.
5.3 Using the Shared Folder If you would like to access a shared folder stored in other stations of same network, please follow the process below: 1. Double-click the “My Network Places” icon, and then double-click the computer where the shared folder is located. 2. Double-click the folder you want to connect to. 3. Now you may open the needed file(s). Note! If a password is required, the Windows will prompt a password column to you.
6. Product Specifications Item Frequency range Modulation technique Host interface Channels support Operation voltage Current consumption Output power(preliminary) Operation distance (preliminary) Operation System supported Dimension Security WEP Operation mode Transfer data rate Key specifications ¾ U-NII: 2.412 ~ 2.484Ghz ¾ Europe: 2.412 ~ 2.484Ghz ¾ Japan: 2.471 ~ 2.497Ghz ¾ 802.11b: DSSS (CCK, BPSK, QPSK) ¾ 802.11g: OFDM ¾ USB 2.